咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是301-310 订阅
排序:
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection  24th
BlockWhisper: A Blockchain-Based Hybrid Covert Communication...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Zehui Xu, Yuwei Huang, Ranfeng Fan, Xinhe Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Software College Northeastern University Shenyang China College of Computer Science Nankai University Tianjin China
In light of the pervasive significance of privacy protection in contemporary society, the exploration of covert communication technology has been extensive, which is designed to safeguard communication behaviors and c... 详细信息
来源: 评论
Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’Response Against COVID Variants
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3517-3535页
作者: Hassam Tahir Muhammad Shahbaz Khan Fawad Ahmed Abdullah M.Albarrak Sultan Noman Qasem Jawad Ahmad Department of Electrical Engineering HITEC UniversityTaxila47080Pakistan Department of Cyber Security Pakistan Navy Engineering CollegeNUSTKarachi75350Pakistan Computer Science Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia School of Computing Edinburgh Napier UniversityEdinburghEH105DTU.K
TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health *** four most dominating variants are Beta,Gamma,Delta,and *** the administration of vaccine doses,an eminent d... 详细信息
来源: 评论
Polynomial-Time Assignment-Based Cell Association with Generic Utility Functions
收藏 引用
China Communications 2022年 第9期19卷 214-228页
作者: Lusheng Wang Chao Fang Hai Lin Min Peng Caihong Kai Key Laboratory of Knowledge Engineering with Big Data Ministry of Education.School of Computer Science and Information EngineeringHefei University of TechnologyHefei 230601China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education.School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Cell association is a significant research issue in future mobile communication systems due to the unacceptably large computational time of traditional *** article proposes a polynomial-time cell association scheme wh... 详细信息
来源: 评论
Supply Chain Planning of Agricultural-Products Under Water Scarcity Using Deep Learning
收藏 引用
Iranian Journal of science and Technology - Transactions of Civil engineering 2025年 1-14页
作者: Sampath, P. Mahariba, A. Jackulin Sathiyamurthi, P. Sridharan, S. Department of Computer Science and Engineering - Cyber Security Easa College of Engineering and Technology Tamil Nadu Coimbatore India Department of Computational Intelligence SRM Institute of Science and Technology Tamil Nadu Kattankulathur Chennai India Department of Electronics and Communication Engineering Bannari Amman Institute of Technology Tamil Nadu Sathyamangalam India Department of Electrical and Electronics Engineering St.Joseph’s College of Engineering Tamil Nadu Chennai India
All people on the planet expected agriculture to provide them with food to survive. The process of producing agricultural goods while integrating logistical elements is labor-intensive. Additionally, the lack of water... 详细信息
来源: 评论
Slotted ALOHA with Code Combining for IoT Networks  3
Slotted ALOHA with Code Combining for IoT Networks
收藏 引用
3rd IEEE International Mediterranean Conference on Communications and Networking, MeditCom 2023
作者: Tyrovolas, Dimitrios Chrysologou, Athanasios Chondrogiannis, Georgios Tegos, Sotiris Mekikis, Prodromos-Vasileios Diamantoulakis, Panagiotis Ioannidis, Sotiris Liaskos, Christos Chatzidiamantis, Nestor Karagiannidis, George Aristotle University of Thessaloniki Dept. of Electrical and Computer Engineering Thessaloniki Greece Technical University of Chania Dept. of Electrical and Computer Engineering Chania Greece University of Ioannina Computer Science Engineering Department Ioannina Greece Cyber Security Systems and Applied Ai Research Center Lebanon
Internet of Things (IoT) networks are expected to be a key enabler technology for smart cities, due to their ability to offer real-time monitoring. In this work, we propose a novel medium access control (MAC) protocol... 详细信息
来源: 评论
Segmenting foreground objects in a multi-modal background using modified Z-score
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1213-1227页
作者: Choudhury, Suman Kumar Sa, Pankaj Kumar Choo, Kim-Kwang Raymond Bakshi, Sambit Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela India Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Information Technology and Mathematical Sciences University of South Australia AdelaideSA5095 Australia
This article presents a background subtraction method to detect moving objects across a stationary camera view. A hybrid pixel representation is presented to minimize the effect of shadow illumination. A non-recursive... 详细信息
来源: 评论
Data Aegis Using Chebyshev Chaotic Map-Based Key Authentication Protocol  1
收藏 引用
International Conference on Intelligent Manufacturing and Energy Sustainability, ICIMES 2022
作者: Lateef, Mohammed Abdul Atheeq, C. Rahman, Mohd Abdul Faizan, Mohammed Abdul Deccan College of Engineering and Technology Hyderabad India Computer Science Deccan College of Engineering and Technology Hyderabad India Hyderabad India Cyber Forensics and Information Security Jawaharlal Nehru Technological University Hyderabad Hyderabad India
Networks with wireless connection between nodes are far more convenient than a wired connection and are under rapid development. One major factor that ensures a truly significant network is the security features it po... 详细信息
来源: 评论
Precision-guided Smart Contract Fuzzing by static Analyses  25
Precision-guided Smart Contract Fuzzing by static Analyses
收藏 引用
Proceedings of the 2025 4th International Conference on Big Data, Information and computer Network
作者: Tianyi Zhang Qi Xia Jianbin Gao Hu Xia School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China (UESTC) Chengdu Sichuan China
Different from traditional software, smart contracts operate on a world state and are driven by transactions. Therefore, classic fuzzing techniques cannot easily find the critical transaction chains in the above proce... 详细信息
来源: 评论
Enhancing IoT Data security: Integrating Elliptic Galois Cryptography with Matrix XOR Steganography and Adaptive Firefly Optimization  8
Enhancing IoT Data Security: Integrating Elliptic Galois Cry...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Chinnasamy, P. Ayyasamy, Ramesh Kumar Anuradha, K. Alam, Irfan Nair, Deveendra Menon Narayanan Kiran, Ajmeera Kalasalingam Academy of Research and Education School of Computing Department of Computer Science and Engineering Tamilnadu India Faculty of Information and Communication Technology Kampar Malaysia Telangana India Scai Vit Bhopal University Cyber Security and Digital Forensics Division Kothari Kalan Sehore India Mlr Institute of Technology Department of Computer Science and Engineering Hdyerabad India
Securing the uninterrupted data flow is crucial in the fast-advancing Internet of Things (IoT) market. This work investigates the incorporation of elliptic Galois cryptography and matrix XOR coding steganography to im... 详细信息
来源: 评论
Utilizing the Blockchain Technology for Higher Education in the Era of Pandemics: A Systematic Review  14
Utilizing the Blockchain Technology for Higher Education in ...
收藏 引用
14th International Conference on Information and Communication Systems, ICICS 2023
作者: Al-Tawara, Feda'a Qasaimeh, Malik Jarad, Dania Al-Qassas, Raad S. Princess Sumaya University for Technology Department of Software Engineering Amman Jordan Jordan University of Science and Technology Department of Software Engineering Department of Cyber Security Irbid Jordan Princess Sumaya University for Technology Department of Computer Science Amman Jordan
The availability of important characteristics such as decentralization, permanence, anonymity, and audacity has driven interest in blockchain technology more recently than ever before. This technology has been employe... 详细信息
来源: 评论