咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是401-410 订阅
排序:
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment  29
DarkTrans: A Blockchain-based Covert Communication Scheme wi...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Xu, Yuwei Wu, Zehui Cao, Jie Xu, Jingdong Cheng, Guang Southeast University School of Cyber Science and Engineering Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Nankai University College of Computer Science Tianjin China
Covert communication technology serves as a crucial tool for safeguarding not only the content of communication but also the identities of the parties involved. In this regard, blockchain emerges as a promising soluti... 详细信息
来源: 评论
Low Resource Chinese Geological Text Named Entity Recognition Based on Prompt Learning
收藏 引用
Journal of Earth science 2024年 第3期35卷 1035-1043页
作者: Hang He Chao Ma Shan Ye Wenqiang Tang Yuxuan Zhou Zhen Yu Jiaxin Yi Li Hou Mingcai Hou State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation Institute of Sedimentary GeologyCollege of Computer Science and Cyber SecurityChengdu University of TechnologyChengdu 610059China Key Laboratory of Deep-Time Geography and Environment Reconstruction and Applications of Ministry of Natural Resources Chengdu University of TechnologyChengdu 610059China School of Information Engineering China University of Geosciences(Beijing)Beijing 100083China
Geological reports are a significant accomplishment for geologists involved in geological investigations and scientific research as they contain rich data and textual *** the rapid development of science and technolog... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography security of Financial Data
收藏 引用
SN computer science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
Optimized Data Storage Algorithm of IoT Based on Cloud Computing in Distributed System
Optimized Data Storage Algorithm of IoT Based on Cloud Compu...
收藏 引用
2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Deepthi, K.Jaya Balakrishnan, T.Suresh Krishnan, Prabhakar Ebenezar, U.Samson Nageshwari Mohan Babu University Department of Aiml AP Tirupati India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy620009 India
IoT and cloud technology are vital for large systems. An improved data storage technique for IoT applications and cloud distribution is described in this research. Scalability, reliability, latency, and resource usage... 详细信息
来源: 评论
Blockchain-Based Railway Ticketing: Enhancing security and Efficiency with QR Codes and Smart Contract  4
Blockchain-Based Railway Ticketing: Enhancing Security and E...
收藏 引用
4th International Conference on Computing and Information Technology, ICCIT 2025
作者: Farhan, Maruf Nur, Abdullah Hafez Sulaiman, Rejwan Bin Butt, Usman Zaman, Snigdha Northumbria University Department of Computer Science and Engineering Northumbria United Kingdom International Islamic University Chittagong Department of Electronic and Telecommunication Engineering Chittagong Bangladesh Cyber Security the British University in Dubai Dubai United Arab Emirates International Islamic University Chittagong Department of Computer Science and Engineering Chittagong Bangladesh
In light of the increasing prevalence of railway ticketing fraud, it is imperative to implement advanced technological solutions to guarantee the integrity and security of ticket transactions. The blockchain technolog... 详细信息
来源: 评论
Performance Analysis of Cloud-Based Applications with Cloud Analyst
Performance Analysis of Cloud-Based Applications with Cloud ...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International Conference on
作者: Navya Singh Harshil Kundety Mohana HV Ravish Aradhya Electronics & Communication Engineering RV College of Engineering® Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Cloud computing changed the way data is accessed and stored, as well as providing the ways of implementing applications through internet. It aims at identifying fundamental units like IaaS, PaaS and their consequences... 详细信息
来源: 评论
Sentiment Analysis with LSTM Recurrent Neural Network Approach for Movie Reviews using Deep Learning
Sentiment Analysis with LSTM Recurrent Neural Network Approa...
收藏 引用
International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)
作者: Sachin J Hegde H M Madhunandana Mohana Computer Science and Engineering RV College of Engineering® Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
In this research work, an integrated sentiment analysis system is designed specifically for movie reviews. Leveraging LSTM-based sentiment analysis, Proposed implementation simplifies model training using pre-trained ...
来源: 评论
Machine Learning-Enhanced Analysis of Genomic Data for Precision Medicine
Machine Learning-Enhanced Analysis of Genomic Data for Preci...
收藏 引用
2024 OPJU International Technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Sasikala, R. Deepthi, K. Jaya Balakrishnan, T. Suresh Krishnan, Prabhakar Ebenezar, U. Samson Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy620009 India Mohan Babu University Department of Aiml Ap Tirupati India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-Campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
Precision medicine employs genetic data, which is enhanced with machine learning algorithms, to determine the most relevant treatment method per patient's genotype. We have zoned in on the area of a machine learni... 详细信息
来源: 评论
A Context for Human Behavior Recognition Using Facial Expression
A Context for Human Behavior Recognition Using Facial Expres...
收藏 引用
Computational, Communication and Information Technology (ICCCIT), International Conference on
作者: Mubeen Ahmed Khan Durbadal Chattaraj Sharanbasappa Tadkal Tanveer Habib Sardar Ankita Chourasia Pankaj Malik Department of Computer Science and Engineering (Cyber Security) Dayananda Sagar University Bengaluru Karnataka India Department of Computer Science and Engineering Medicaps University Indore M.P India
Human beings are born to show facial expressions, and this is the only behavior that identifies the specialty of a human being. This feature of humans makes him unique and expressive to handle different situations in ... 详细信息
来源: 评论
An Intelligent Vehicle License Plate Detection for an Emergency Notification System  5
An Intelligent Vehicle License Plate Detection for an Emerge...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Raja, Laxmi Bharathi, V.C. Ananthi, S. Sathya, R. Kathirvel, T. Razack, T. Shahin Abdul Karpagam Academy of Higher Education Faculty of Engineering Department of Cyber Security Coimbatore India VIT-AP University School of Computer Science and Engineering Andhra Pradesh Amaravati India Sri Eshwar College of Engineering Department of Cse Coimbatore India Kongunadu College of Engineering and Technology Department of It Tamil Nadu Trichy India
This research presents a vehicle license plate recognition and emergency notification system utilizing advanced image processing techniques. The system captures input images and employs Optical Character Recognition (... 详细信息
来源: 评论