咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是331-340 订阅
排序:
IDEA-PTLMS: Designing Secure Image Encoding and Decoding Algorithms using Pixel Transposition and Logistic Map based Substitutions
IDEA-PTLMS: Designing Secure Image Encoding and Decoding Alg...
收藏 引用
Electrical, Electronics, Information and Communication Technologies (ICEEICT), International Conference on
作者: Prajwal N Halvi Prajwalasimha S N Durbadal Chattaraj Naveen Kulkarni Deepthika Karuppusamy Department of Computer Science and Engineering (Cyber Security) School of Engineering (SoE) Dayananda Sagar University Bangalore India
In this paper, a hybrid approach based on Pseudo Hadamard transformation and Logistic Substitution is proposed. Inter pixel redundancy and strong correlation between the adjacent pixels in an image is condensed by imp... 详细信息
来源: 评论
Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection
Universal Watermark Vaccine: Universal Adversarial Perturbat...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Chen, Jianbo Liu, Xinwei Liang, Siyuan Jia, Xiaojun Xun, Yuan Hunan University College of Computer Science and Electronic Engineering Hunan China Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
As computing ability continues to rapidly develop, neural networks have found widespread use in various fields. However, in the realm of visible watermarking for image copyright protection, neural networks have made i... 详细信息
来源: 评论
ZKCross: An Efficient and Reliable Cross-Chain Authentication Scheme Based on Lightweight Attribute-Based Zero-Knowledge Proof  1
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Cai, Hailang Chen, Jialuo Xiang, Qiao Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China School of Informatics Xiamen University Xiamen China College of Computer Science Nankai University Tianjin China
The consortium blockchain finds wide application in finance and logistics. However, these independent networks create information silos. Cross-chain authentication aims to bridge these gaps. It verifies qualifications... 详细信息
来源: 评论
Investigation of Red Fox Algorithm for Solving Task Assignment Problem in Heterogeneous Unmanned Aerial Vehicle Swarm  3
Investigation of Red Fox Algorithm for Solving Task Assignme...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Manaswitha, K. Issac, Titus Silas, Salaja Terance, J Sebastian Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Artificial Intelligence and Machine Learning Karunya Institute of Technology and Sciences Coimbatore India
In recent years, there have been significant advancements in Unmanned Aerial Vehicles (UAVs), leading to their integration into everyday life. UAVs are constrained by limited energy, communication, and localization. T... 详细信息
来源: 评论
AI-Driven Intelligent IoT Systems for Real-Time Food Quality Monitoring and Analysis  2
AI-Driven Intelligent IoT Systems for Real-Time Food Quality...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Krishnan, Prabhakar Ebenezar, U. Samson Ranitha, R. Purushotham, N. Balakrishnan, T. Suresh Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Mohan Babu University Department of Computer Science and Engineering Mr.palliAP India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
The system will monitor and analyse food quality along the supply chain in real time. The system has high performance due to the CNN algorithms. In terms of accuracy, CNN has a high performance (95.2%), precision (92.... 详细信息
来源: 评论
CHESS: Optimizing LLM Inference via Channel-Wise Thresholding and Selective Sparsification
CHESS: Optimizing LLM Inference via Channel-Wise Thresholdin...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: He, Junhui Wu, Shangyu Wen, Weidong Xue, Chun Jason Li, Qingan Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University China School of Computer Science Wuhan University China MBZUAI United Arab Emirates City University of Hong Kong Hong Kong
Deploying large language models (LLMs) on edge devices presents significant challenges due to the substantial computational overhead and memory *** sparsification can mitigate these resource challenges by reducing the... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Fadhil, Saif Aamer Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad10011 Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection  24th
BlockWhisper: A Blockchain-Based Hybrid Covert Communication...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Zehui Xu, Yuwei Huang, Ranfeng Fan, Xinhe Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Software College Northeastern University Shenyang China College of Computer Science Nankai University Tianjin China
In light of the pervasive significance of privacy protection in contemporary society, the exploration of covert communication technology has been extensive, which is designed to safeguard communication behaviors and c... 详细信息
来源: 评论
Prediction of the SARS-CoV-2 Derived T-Cell Epitopes’Response Against COVID Variants
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3517-3535页
作者: Hassam Tahir Muhammad Shahbaz Khan Fawad Ahmed Abdullah M.Albarrak Sultan Noman Qasem Jawad Ahmad Department of Electrical Engineering HITEC UniversityTaxila47080Pakistan Department of Cyber Security Pakistan Navy Engineering CollegeNUSTKarachi75350Pakistan Computer Science Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia School of Computing Edinburgh Napier UniversityEdinburghEH105DTU.K
TheCOVID-19 outbreak began in December 2019 andwas declared a global health emergency by the World Health *** four most dominating variants are Beta,Gamma,Delta,and *** the administration of vaccine doses,an eminent d... 详细信息
来源: 评论
Polynomial-Time Assignment-Based Cell Association with Generic Utility Functions
收藏 引用
China Communications 2022年 第9期19卷 214-228页
作者: Lusheng Wang Chao Fang Hai Lin Min Peng Caihong Kai Key Laboratory of Knowledge Engineering with Big Data Ministry of Education.School of Computer Science and Information EngineeringHefei University of TechnologyHefei 230601China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education.School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Cell association is a significant research issue in future mobile communication systems due to the unacceptably large computational time of traditional *** article proposes a polynomial-time cell association scheme wh... 详细信息
来源: 评论