咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是411-420 订阅
排序:
Prompt Based Tri-Channel Graph Convolution Neural Network for Aspect Sentiment Triplet Extraction
Prompt Based Tri-Channel Graph Convolution Neural Network fo...
收藏 引用
2024 SIAM International Conference on Data Mining, SDM 2024
作者: Peng, Kun Jiang, Lei Peng, Hao Liu, Rui Yu, Zhengtao Ren, Jiaqian Hao, Zhifeng Philip, S.Yu. Institute of Information Engineering Chinese Academy of Sciences China School of Cyberspace Security University of Chinese Academy of Sciences China School of Cyber Science and Technology Beihang University China Faculty of Information Engineering and Automation Kunming University of Science and Technology China College of Science University of Shantou China University of Illinois at Chicago Department of Computer Science United States
Aspect Sentiment Triplet Extraction (ASTE) is an emerging task to extract a given sentence's triplets, which consist of aspects, opinions, and sentiments. Recent studies tend to address this task with a table-fill... 详细信息
来源: 评论
Video key concept extraction using Convolution Neural Network  3
Video key concept extraction using Convolution Neural Networ...
收藏 引用
3rd IEEE International Conference on AI in cybersecurity, ICAIC 2024
作者: Sardar, Tanvir H Amin Hazarika, Ruhul Pandey, Bishwajeet Guru Prasad, M.S. Mahmudul Hassan, Sk Dodmane, Radhakrishna Gohel, Hardik Dept. of Computer Science & Engg Bengaluru India Manipal Institute of Technology Department of Information Technology Bengaluru India Astana It University Department of Intelligent System and Cyber Security Kazakhstan Dept. of Computer Science & Engg. Dehradun India VIT-AP School of Computer Science and Engineering India Nmam Institute of Technology Department of Computer Science & Engg. Nitte India University of Houston Department of Cse Victoria United States
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video ***: The methodology comprises extractin... 详细信息
来源: 评论
SecureSem: Sensitive Text Classification Based on Semantic Feature Optimization  15th
SecureSem: Sensitive Text Classification Based on Semantic ...
收藏 引用
15th EAI International Conference on Digital Forensics and cyber Crime, ICDF2C 2024
作者: Qin, Kangyuan Liu, Ran Yu, Min Li, Gang Liu, Mingqi Li, Jingyuan Huang, Weiqing Jiang, Jianguo Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Information Technology Deakin University Geelong Australia Department of Computer Science Beijing Technology and Business University Beijing China
With the development of big data technology, the management of sensitive information online has become increasingly challenging, requiring innovative approaches for its effective control and classification. This paper... 详细信息
来源: 评论
Intelligent Kidney Abnormality Detection in CT Images Using GLCM and Neural Networks  4
Intelligent Kidney Abnormality Detection in CT Images Using ...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Bajpai, Chhavi Anitha, S. Gaur, Manish Raghini, M. Kaliappan, S. Khan, Imran Centre for Advanced Studies Aktu Department of Computer Science and Engineering Lucknow India Acs College of Engineering Department of CSE-Cyber Security Bangalore India Institute of Engineering and Technology Aktu Department of Computer Science & Engineering Lucknow India Velammal College of Engineering and Technology Department of Artificial Intell igence and Data Science Madurai India Lovely Professional University Department of Research and Development Jalandhar India Sharda School of Nursing Science and Research Sharda University Department of Medical Surgical Nursing Greater Noida India
Kidney stone illness, one of the most common medical problems worldwide, relieves pain and drives people to the ER. Diagnoses often use imaging, but educated doctors must interpret them. computer-aided diagnostics (CA... 详细信息
来源: 评论
Big Data Analysis of Cognitive Cloud Computing Based Intelligent Healthcare System  10
Big Data Analysis of Cognitive Cloud Computing Based Intelli...
收藏 引用
10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer engineering, UPCON 2023
作者: Shah, Nirav Saxena, Aakansha Kumar, Yogesh Silveroak University Department of Cse Ahmedabad India School of It Artificial Intelligence & Cyber Security Rashtirya Raksha University India Pandit Deendayal Energy University Department of Computer Science and Engineering Gujarat Gandhinagar India
The medical sector domain is one of the most rapidly rising and demanding fields in the current era. With the increased usage of technology and the internet, it has become critical for healthcare professionals to adap... 详细信息
来源: 评论
Deep Learning Algorithms for Early Alzheimer's Diagnosis: From Data to Prognosis
Deep Learning Algorithms for Early Alzheimer's Diagnosis: Fr...
收藏 引用
Self Sustainable Artificial Intelligence Systems (ICSSAS), International Conference on
作者: Buchepalli Praneeth P Siva Deekshith Reddy P Bhuvaneshwar Mohana Minal Moharir Ashok Kumar A R Computer Science and Engineering RV College of Engineering® Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Alzheimer's disease (AD) is a neurological condition that worsens over time and affects millions of older people worldwide. An early diagnosis and correct classification of AD are essential for improving patient c...
来源: 评论
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense  28
Every Time Can Be Different: A Data Dynamic Protection Metho...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Tang, Zhimin Ma, Duohe Sun, Xiaoyan Chen, Kai Wang, Liming Jiang, Junye Institute of Information Engineering Chinese Academy of Sciences Beijing China California State University Department of Computer Science Sacramento United States School of Cyber Security University of Chinese Academy of Sciences Beijing China
Traditional defense methods are hard to change the inherent vulnerabilities of static data storage, single data access, and deterministic data content, leading to frequent data leakage incidents. Moving target defense... 详细信息
来源: 评论
Analysis of Credit Card Fraudulent Transactions Using Machine Learning and Artificial Intelligence
Analysis of Credit Card Fraudulent Transactions Using Machin...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Sriprada Ramesh Simna T M Mohana Department of Chemical Engineering RV College of Engineering® Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
The reliance on credit cards for everyday purchases has become ubiquitous in modern society. This poses security threats as cybercriminals are constantly adopting new techniques to commit fraudulent activities. The ne... 详细信息
来源: 评论
Towards Robust Temporal Activity Localization Learning with Noisy Labels  30
Towards Robust Temporal Activity Localization Learning with ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Liu, Daizong Qu, Xiaoye Fang, Xiang Dong, Jianfeng Zhou, Pan Nan, Guoshun Tang, Keke Fang, Wanlong Cheng, Yu Wangxuan Institute of Computer Technology Peking University China School of Cyber Science and Engineering Huazhong University of Science of Technology China Interdisciplinary Graduate Programme Nanyang Technological University Singapore College of Computer Science and Technology Zhejiang Gongshang University China School of Cyberspace Security Beijing University of Posts and Telecommunications China Cyberspace Institute of Advanced Technology Guangzhou University China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
This paper addresses the task of temporal activity localization (TAL). Although recent works have made significant progress in TAL research, almost all of them implicitly assume that the dense frame-level corresponden... 详细信息
来源: 评论
Image Forgery Detection using Convolutional Neural Networks and Blockchain Technology  24
Image Forgery Detection using Convolutional Neural Networks ...
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Khalaf, Luay Ibrahim Jumaili, Mustafa Lateef Fadhil Almashhadany, Mohammed Thakir Mahmood Aljanabi, Mohammed S. Hasan, Taif S. Algburi, Sameer Department of Computer Science College of Computer Science and Mathematics Tikrit University Iraq Computer Engineering Techniques Dept Al-Maarif University College Al Anbar Iraq Artificial Intelligence Engineering Department College of Engineering Al-Ayen University Thi-Qar Iraq Computer Science Department Bayan University Erbil Kurdistan Iraq Department of Computer Engineering Techniques Al Hikma University College Baghdad Iraq Department of Cyber Security and Cloud Computing Al-Ma'moon University College Al-Washash Baghdad Iraq Al-Kitab University Kirkuk36015 Iraq
In the era of digital media, the growth of picture forgeries poses a huge threat to content validity and reliability. Previous techniques for picture forgery detection have found constraints in accuracy and scalabilit... 详细信息
来源: 评论