咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是311-320 订阅
排序:
Green5G: Enhancing Capacity and Coverage in Device-to-Device Communication
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 1933-1950页
作者: Abdul Rehman Javed Rabia Abid Bakhtawar Aslam Hafiza Ammara Khalid Mohammad Zubair Khan Omar H.Alhazmi Muhammad Rizwan Department of Cyber Security Air UniversityIslamabadPakistan Department of Computer Science Kinnaird College for WomenLahore54000Pakistan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinahSaudi Arabia
With the popularity of green computing and the huge usage of networks,there is an acute need for expansion of the 5G network.5G is used where energy efficiency is the highest priority,and it can play a pinnacle role i... 详细信息
来源: 评论
Enhancing IoT Data security: Integrating Elliptic Galois Cryptography with Matrix XOR Steganography and Adaptive Firefly Optimization  8
Enhancing IoT Data Security: Integrating Elliptic Galois Cry...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Chinnasamy, P. Ayyasamy, Ramesh Kumar Anuradha, K. Alam, Irfan Nair, Deveendra Menon Narayanan Kiran, Ajmeera Kalasalingam Academy of Research and Education School of Computing Department of Computer Science and Engineering Tamilnadu India Faculty of Information and Communication Technology Kampar Malaysia Telangana India Scai Vit Bhopal University Cyber Security and Digital Forensics Division Kothari Kalan Sehore India Mlr Institute of Technology Department of Computer Science and Engineering Hdyerabad India
Securing the uninterrupted data flow is crucial in the fast-advancing Internet of Things (IoT) market. This work investigates the incorporation of elliptic Galois cryptography and matrix XOR coding steganography to im... 详细信息
来源: 评论
Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 153-160页
作者: Vajrobol, Vajratiya Gupta, Brij B. Gaurav, Akshat Chuang, Huan-Ming Institute of Informatics and Communication University of Delhi India International Center for AI and Cyber Security Research and Innovations. Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Ronin Institute MontclairNJ United States Department of Information Management National Yunlin University of Science and Technology Yunlin Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The... 详细信息
来源: 评论
GAN-Loc: Empowering Indoor Localization for Unknown Areas via Generative Fingerprint Map  21
GAN-Loc: Empowering Indoor Localization for Unknown Areas vi...
收藏 引用
21st Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2024
作者: Yoon, JinYi You, Yeawon Kang, Dayeon Kim, Jeewoon Lee, HyungJune Department of Computer Science Virginia Tech BlacksburgVA United States Department of Cyber Security Ewha Womans University Seoul Korea Republic of Manning College of Information & Computer Sciences University of Massachusetts AmherstMA United States Department of Computer Science University of California IrvineCA United States Department of Computer Science and Engineering Ewha Womans University Seoul Korea Republic of
As indoor localization becomes a necessity to provide intelligent location-based services for in-building users, fingerprint-based positioning has been widely adopted in numerous Wi-Fi-equipped devices. However, its r... 详细信息
来源: 评论
GLIMMER: Incorporating Graph and Lexical Features in Unsupervised Multi-Document Summarization  27
GLIMMER: Incorporating Graph and Lexical Features in Unsuper...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Liu, Ran Liu, Ming Yu, Min Jiang, Jianguo Li, Gang Zhang, Dan Li, Jingyuan Meng, Xiang Huang, Weiqing Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China School of Information Technology Deakin University Australia Department of Computer Science Beijing Technology and Business University China
Pre-trained language models are increasingly being used in multi-document summarization tasks. However, these models need large-scale corpora for pre-training and are domain-dependent. Other non-neural unsupervised su... 详细信息
来源: 评论
Designing of Creator's Information Hub using Machine Learning  2
Designing of Creator's Information Hub using Machine Learnin...
收藏 引用
2nd DMIHER International Conference on Artificial Intelligence in Healthcare, Education and Industry, IDICAIEI 2024
作者: Gabhane, Diksha Gawande, Ujwalla Gaikwad, Sanjana Gajarlewar, Swati Bhawalkar, Rita Yeshwantrao Chavan College of Engineering Dept. of Computer Science & Design Nagpur India Yeshwantrao Chavan College of Engineering Dept. of Information Technology Nagpur India NCPharmacy Wanadongri Nagpur India G H Raisoni College of Engineering and Management Dept. of Cyber Security and Data Science Pune India
The proliferation of educational content on platforms like YouTube has transformed digital learning, yet it presents challenges in effective creation, dissemination, and impact assessment. This paper proposes a strate... 详细信息
来源: 评论
Multi-View Incongruity Learning for Multimodal Sarcasm Detection  31
Multi-View Incongruity Learning for Multimodal Sarcasm Detec...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Guo, Diandian Cao, Cong Yuan, Fangfang Liu, Yanbing Zeng, Guangjie Yu, Xiaoyan Peng, Hao Yu, Philip S. Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science University of Illinois Chicago United States
Multimodal sarcasm detection (MSD) is essential for various downstream tasks. Existing MSD methods tend to rely on spurious correlations. These methods often mistakenly prioritize non-essential features yet still make... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
Quantum Resistance Group Key Management for IoTs  2
Quantum Resistance Group Key Management for IoTs
收藏 引用
2nd International Conference on Emerging Trends in Electrical, Control, and Telecommunication engineering, ETECTE 2023
作者: Samiullah, Fouzia Gan, Ming-Lee Akleylek, Sedat Aun, Yichiet Universiti Tunku Abdul Rahman Faculty of Information and Communication Technology Kampar Perak31900 Malaysia Ondokuz Mayis University Cyber Security and Information Technologies Research and Development Centre and Department of Computer Engineering Samsun Turkey University of Tartu Chair of Security and Theoretical Computer Science Estonia
Group communication plays a vital role in our interconnected society, facilitating efficient and secure data exchange among multiple endpoints. The issue pertains to the intricate nature that emerges within the limite... 详细信息
来源: 评论
Real-Time Detection of AI-Generated Deepfake Audio: A Novel Approach
Real-Time Detection of AI-Generated Deepfake Audio: A Novel ...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: Prathamesh Chiddarwar Computer Science Engineering (Specialization in Cyber Security and Forensics) MIT World Peace University Pune India
The rise of AI-generated deepfake audio presents a significant challenge in audio forensics, as traditional detection methods are inadequate against sophisticated manipulations. This study proposes a novel approach co... 详细信息
来源: 评论