咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是391-400 订阅
排序:
Machine Learning-Based Crop Recommendation System  4
Machine Learning-Based Crop Recommendation System
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Ebenezer, V. Nair, Akash Stewart Kirubakaran, S. Praising Linijah, N.L. Rajan, Jerlin Santhiya, P. Karunya Institute of Technology and Sciences Division of Data Sciences and Cyber Security Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya School of Management Karunya Institute of Technology and Sciences Coimbatore India
The time-honored way that farmers have been used to apply to the identification of the best crops for better yield is not exhaustive. Under this technique, the management process of powerful and productive resources, ... 详细信息
来源: 评论
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward security  1st
Efficient Wildcard Searchable Symmetric Encryption with For...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Zhang, Xi Su, Ye Wei, Zhongkai Shen, Wenting Qin, Jing College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Information Science and Engineering Shandong Normal University Jinan250358 China School of Mathematics Shandong University Jinan250100 China College of Computer Science and Technology Qingdao University Qingdao266071 China
Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as ... 详细信息
来源: 评论
Internet Public Safety Event Grading and Hybrid Storage Based on Multi-feature Fusion for Social Media Texts  28th
Internet Public Safety Event Grading and Hybrid Storage Bas...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Hu, Die Xie, Yulai Feng, Dan Zhao, Shixun Fu, Pengyu Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the rapid development of mobile Internet technology, various public events appear on social media platforms and attract a lot of attention. Since netizens can express their opinions freely on the Internet, some e... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors  39
NumbOD: A Spatial-Frequency Fusion Attack Against Object Det...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
A comprehensive study and performance analysis of deep neural network-based approaches in wind time-series forecasting
收藏 引用
Journal of Reliable Intelligent Environments 2023年 第2期9卷 183-200页
作者: Rahman, Md. Mijanur Shakeri, Mohammad Khatun, Fatema Tiong, Sieh Kiong Alkahtani, Ammar Ahmed Samsudin, Nurul Asma Amin, Nowshad Pasupuleti, Jagadeesh Hasan, Mohammad Kamrul Department of Computer Science and Engineering Jatiya Kabi Kazi Nazrul Islam University Trishal Mymensingh2224 Bangladesh Department of Electrical and Electronic Engineering Bangabandhu Sheikh Mujibur Rahman Science & Technology University Gopalganj Dhaka8100 Bangladesh Jalan Ikram-Uniten Selangor Kajang43000 Malaysia Center for Cyber Security School of Information Science and Technology Universiti Kebangsaan Malaysia UKM Selangor Bangi43600 Malaysia
The increasing energy demand and expansion of power plants are provoking the effects of greenhouse gas emissions and global warming. To mitigate these issues, renewable energies (like solar, wind, and hydropower) are ... 详细信息
来源: 评论
Speech-to-text Emotion Detection System using SVM, CNN, and BERT  1
Speech-to-text Emotion Detection System using SVM, CNN, and ...
收藏 引用
1st IEEE International Conference on Smart Power Control and Renewable Energy, ICSPCRE 2024
作者: Yadav, Uma Bondre, Shweta Thakre, Bhakti Likhar, Kiran Shri Ramdeobaba College of Engineering and Management Nagpur India Shri Ramdeobaba College of Engineering and Management Information Technology Department Nagpur India St. Vincent Pallotti College of Engineering and Technology Cyber Security Department Nagpur India Computer Science & Engineering G H Raisoni Institute of Engineering and Technology Nagpur India
Emotions have a tremendous impact on human experiences and decision-making processes. People are frequently motivated to repeat happy behaviors while avoiding depressing ones. Emotions may spread like wildfire in the ... 详细信息
来源: 评论
S-chain: A Shard-based Blockchain Scheme for Cross-chain Supervision  29
S-chain: A Shard-based Blockchain Scheme for Cross-chain Sup...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Xu, Yuwei Song, Yuxing Zeng, Junyu He, Ran Xu, Jingdong Southeast University School of Cyber Science and Engineering Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Nankai University College of Computer Science Tianjin China
With the popularization of consortium blockchain, how to supervise numerous business chains has become a problem. Recently, some researchers have proposed the concept of 'governing chain by chain', which means... 详细信息
来源: 评论
An unsupervised medical image registration network for intelligent medical education
收藏 引用
Neural Computing and Applications 2024年 第19期37卷 13251-13266页
作者: Shi, Ke Mu, Jie Xu, Jian Zhang, Jing Yan, Tiantian Wang, Wei Zhang, Hua Ren, Wenqi Institute of Information Engineering Chinese Academy of Sciences Sanlihe-52 Beijing100045 China School of Cyber Security University of Chinese Academy of Sciences Yuquan-19 Beijing100049 China School of Data Science and Artificial Intelligence Dongbei University of Finance and Economics Jianshan-217 Liaoning Dalian116025 China The National and Local Joint Engineering Laboratory of Computer Aided Design Dalian University Xuefu-10 Liaoning Dalian116622 China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Xinhu-666 Guangdong Shenzhen528406 China
Intelligent education, which applies artificial intelligence technologies to the education field, has attracted increasing attention in recent years. Intelligent medical education is an effective learning way to assis... 详细信息
来源: 评论
Combined Effort Estimation Framework for Heterogeneous Projects Using Machine Learning: A Comparative Analysis
Combined Effort Estimation Framework for Heterogeneous Proje...
收藏 引用
Next Generation Communication & Information Processing (INCIP), International Conference on
作者: Amrita Sharma Neha Chaudhary Anand Sharma Department of Computer Science Indus University Ahmedabad India Computer Science & Engineering Manipal University Jaipur India Cyber Resilience Eventus Security Ahmedabad India
The essential role of software development effort estimation is to predict the required work to develop software. The three main types of cost estimation approaches are algorithmic models, non-algorithmic models, and ... 详细信息
来源: 评论
An overview Scientific Cloud computing Web-based cloud services issues and challenges  5
An overview Scientific Cloud computing Web-based cloud servi...
收藏 引用
5th International Conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Majumder, Sayan Raju, Kommisetti Murthy Arya, Nancy Shaik, Nazeer Tiwari, Sanjay Singh, Akanksha Department of cyber security The Heritage Academy Kolkata India Department of Electronics and Communication Engineering Shri Vishnu Engineering College For Women Bhimavaram India Department of Computer Science and Engineering Shree Guru Gobind Singh Tricentenary University Gurugram India Department Of Computer Science and Engineering Srinivasa Ramanujan Institute Of Technology-Autonomous-Anantapur Andhra Pradesh India Department of Computer Science and Engineering ARYA Institute of Engineering Technology and Management Jaipur India Computer Science and Engineering Babu Banarasi Das University Lucknow India
This research investigates the crucial role of cloud computing services in web development for creating scalable applications. Our study explores the benefits, challenges, and best practices associated with leveraging... 详细信息
来源: 评论