咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是421-430 订阅
排序:
Face Detection in Video Live Stream Using Deep Learning  2
Face Detection in Video Live Stream Using Deep Learning
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Amrita Kumar, Rajiv Joshi, Shivani Raj, Daksh Centre for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University U.P. Greater Noida India G L Bajaj Institute of Technology and Management Department of Applied Computational Science and Engineering Nvidia Ai Learning & Research Center U.P. Greater Noida India G L Bajaj Institute of Technology and Management Department of Computer Science and Engineering U.P. Greater Noida India Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India
With the increasing popularity of live streaming platforms, there is an imperative need for robust methods for identifying individuals in real-time. The proposed system utilizes Convolutional Neural Networks (CNN) com... 详细信息
来源: 评论
Xabcd: A Better Model for Named Entity Recognition in cyber Threat Intelligence  9
Xabcd: A Better Model for Named Entity Recognition in Cyber ...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Wang, Ruiqi Zheng, Zhiqiang Ao, Shengqin Fu, Yuxia Wang, Xuren Jiang, Zhengwei Xie, Gang School of Big Data and Computer Science Guizhou Normal University Guiyang China Information Engineering College Capital Normal University Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Due to the ambiguity between naming entity nouns and daily usage nouns in cyber threat intelligence, such as hacker organizations, attack tools, and attack techniques, the understanding of their content heavily relies... 详细信息
来源: 评论
Bitcoin Price Prediction Using Cuckoo Search Algorithm for Feature Selection with LSTM Model  2
Bitcoin Price Prediction Using Cuckoo Search Algorithm for F...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Radmand, Elnaz Pirgazi, Jamshid Odeh, Mahmoud Sorki, Ali Ghanbari University of Science and Technology of Mazandaran Faculty of Electrical and Computer Engineering Behshahr Iran School of Information Technology Zarqa University Cyber Security Department Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia
Deep learning is now a top method for predicting the price of Bitcoin, providing an excellent and well thought out strategy. This technique makes use of a wealth of historical data from reliable sources covering the f... 详细信息
来源: 评论
DataJudge: Cross-Chain Data Consistency Verification Based on Extended Merkle Hash Tree  24th
DataJudge: Cross-Chain Data Consistency Verification Based o...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Zeng, Junyu Cao, Jie Dai, Shengjiang Xiang, Qiao Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Department of Electrical and Computer Engineering Queen’s University Kingston Canada School of Informatics Xiamen University Xiamen China
Consortium blockchains, with their decentralized characteristics, have found widespread applications across various industries. However, this also forms isolated data islands. These data islands have become obstacles ... 详细信息
来源: 评论
An Efficient and Privacy-Preserving Participant Selection Scheme based on Location in Mobile Crowdsensing  23
An Efficient and Privacy-Preserving Participant Selection Sc...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Cheng, Yudan Feng, Tao Liu, Zhiquan Guo, Xian Han, Lulu Ma, Jianfeng Lanzhou University of Technology School of Computer and Communication Lanzhou China Jinan University College of Cyber Security Guangzhou China Luoyang Normal University School of Information Science Luoyang China Xidian University School of Cyber Engineering Xi'an China
With the increasing demand for sensing data, the selection efficiency of task participants in mobile crowdsensing (MCS) becomes more and more important. How to efficiently choose eligible task participants while prese... 详细信息
来源: 评论
Deepfake Image and Video Detection Using Deep Learning Algorithms
Deepfake Image and Video Detection Using Deep Learning Algor...
收藏 引用
Multi-Agent Systems for Collaborative Intelligence (ICMSCI), International Conference on
作者: Srivanth Srinivasan Nischitha P Akshita Chavan Mohana Artificial Intelligence & Machine Learning Engineering RV College of Engineering® Bengaluru India Computer Science & Engineering (Cyber Security) RV College of Engineering® Bengaluru India
Deep learning (DL) algorithms are swiftly finding applications in computer vision and natural language processing. Nonetheless, they can also be employed for creating convincing deepfakes, which are challenging to dis... 详细信息
来源: 评论
ChainSafari: A General and Efficient Blockchain Verifiable Query Scheme with Real-Time Synchronization  24th
ChainSafari: A General and Efficient Blockchain Verifiable ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Dai, Shengjiang Zeng, Junyu Cao, Jie He, Ran Xiang, Qiao School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Department of Electrical and Computer Engineering Queen’s University Kingston Canada School of Informatics Xiamen University Xiamen China
With the rapid advancement of blockchain technology, its utilization has become widespread across various domains, resulting in the accumulation of significant volumes of valuable data. This trend has created an incre... 详细信息
来源: 评论
Power Load Forecasting Model Based on LSTM and Prophet algorithm  3
Power Load Forecasting Model Based on LSTM and Prophet algor...
收藏 引用
3rd International Conference on Consumer Electronics and computer engineering, ICCECE 2023
作者: Zhang, Zhiling Wang, Xu Wang, Jing Yuan, Xueyu College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China Institute of Economics and Finance Polessky State University Pinsk Brest Belarus School of Information Engineering Shaoguan University Shaoguan China
Power system load forecasting in different periods is of great practical significance to improve the economic and social benefits of the power system, while the complex and variable meteorological conditions, social e... 详细信息
来源: 评论
An Intelligent Method for Credit Card Fraud Detection using Improved CNN and Extreme Learning Machine  8
An Intelligent Method for Credit Card Fraud Detection using ...
收藏 引用
8th International Conference on Communication and Electronics Systems, ICCES 2023
作者: Yamini, Kalva Anitha, V. Polepaka, Sanjeeva Chauhan, Rahul Varshney, Yukti Singh, Mukesh Sri Ramachandra Institute of Higher Education and Research Cyber Security in Cse Tamilnadu Chennai India Imayam College of Engineering Department of Computer Science and Engineering Tamilnadu Trichy India Griet Department of Aimle Telangana Hyderabad India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Moradabad Institute of Technology Department of Computer Science & Engineering Uttar Pradesh Moradabad India Graphic Era University Department of Computer Engineering Uttarakhand Dehradun India
Credit card fraud has been on the rise in recent years. Criminals are taking advantage of the public by pretending to be legitimate businesses or individuals in order to steal their money. So, it is essential to comba... 详细信息
来源: 评论
Efficient Resource Management for Real-time AI Systems in the Cloud using Reinforcement Learning  7
Efficient Resource Management for Real-time AI Systems in th...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Mallikarjunaradhya, Vinay Sreeramulu, Madhusudhan Dasari Mohammed, Abdul Sajid Boddapati, Nagesh Gupta, Ketan Natarajan, Yuvaraj Thomson Reuters Toronto Canada American Express Department of Cyber Security United States University of the Cumberlands Department of School of Computer and Information Sciences KY United States Microsoft Department of Computer Science CharlotteNC United States University of The Cumberlands Department of Information Technology WilliamsburgKY United States Sri Shakthi Institute of Engineering and Technology Department of Computer Science Engineering Tamil Nadu Coimbatore India
The advent of artificial intelligence (AI) has driven an emergence in applications demanding online responses to immense amounts of data. Typically, the cloud-based deployment of these applications requires resource m... 详细信息
来源: 评论