咨询与建议

限定检索结果

文献类型

  • 1,550 篇 会议
  • 934 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 372 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 215 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 113 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 82 篇 安全科学与工程
    • 61 篇 机械工程
    • 54 篇 化学工程与技术
    • 52 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 120 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 83 篇 基础医学(可授医学...
    • 81 篇 临床医学
    • 53 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 141 篇 accuracy
  • 118 篇 deep learning
  • 105 篇 feature extracti...
  • 103 篇 training
  • 94 篇 machine learning
  • 89 篇 security
  • 77 篇 computational mo...
  • 74 篇 real-time system...
  • 72 篇 internet of thin...
  • 72 篇 privacy
  • 60 篇 blockchain
  • 54 篇 support vector m...
  • 53 篇 predictive model...
  • 49 篇 data models
  • 46 篇 artificial intel...
  • 45 篇 semantics
  • 45 篇 cloud computing
  • 43 篇 convolutional ne...
  • 42 篇 data privacy
  • 40 篇 reliability

机构

  • 226 篇 school of cyber ...
  • 157 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 46 篇 college of cyber...
  • 45 篇 college of compu...
  • 44 篇 key laboratory o...
  • 36 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 school of cyber ...
  • 30 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 state key labora...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 2,245 篇 英文
  • 254 篇 其他
  • 14 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2506 条 记 录,以下是41-50 订阅
排序:
Fortifying Smart Grids: A Holistic Assessment Strategy against cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 评论
Credit Card Fraud Detection Using ML Techniques  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Junior Mishra, Alpna Department of Computer Science and Engineering Sharda University Noida India Center of Cyber Security and Cryptology Sharda University Noida India
With the increasing use of Internet, online banking transactions have also increased. Everyday more and more users are being added to the cyberspace, which has also attracted cybercriminals. These scammers use stolen ... 详细信息
来源: 评论
Blockchain-Assisted Fine-Grained Deduplication and Integrity Auditing for Outsourced Large-Scale Data in Cloud Storage
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21662-21678页
作者: Liu, Bingyun Zhang, Xiaojun Yang, Xingchun Zhang, Yuan Xue, Jingting Zhou, Rang Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu610500 China Sichuan Police College Intelligent Policing Key Laboratory of SichuanProvince Luzhou646000 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Chengdu University of Technology School of Computer Science and Cyber Security Chengdu610059 China
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing. In ... 详细信息
来源: 评论
Research on Lightweight Sensing Technology Based on Single-Antenna Multicarrier
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20678-20694页
作者: Jiang, Yu Zhu, Di Wang, Jiadong Hu, Aiqun Southeast University School of Cyber Scienc and Engineering Purple Mountain Laboratories Nanjing210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing210096 China Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Southeast University School of Cyber Science and Engineering Nanjing210096 China Southeast University School of Cyber Science and Engineering School of Information Science and Engineering Nanjing210096 China Southeast University State Key Laboratory of Mobile Communication Nanjing210096 China
Channel State Information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens... 详细信息
来源: 评论
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system
收藏 引用
Digital Communications and Networks 2022年 第2期8卷 174-185页
作者: Linbo Deng Jinsong Gui Tian Wang Jiawei Tan Xiong Li School of Computer Science and Engineering Central South UniversityChangSha410083China College of Computer Science and Technology Huaqiao UniversityXiamen361021China Institute for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengdu611731China
Sensors based on personalized healthcare systems have been widely used in the medical ***,energy limitations have greatly hindered the further development of medical *** the traditional Medium Access Control(MAC)proto... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Detecting anomalies in blockchain transactions using machine learning classifiers and explainability analysis
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 106-122页
作者: Mohammad Hasan Mohammad Shahriar Rahman Helge Janicke Iqbal H.Sarker Department of Computer Science and Engineering Premier University4000 ChitagongBangladesh Department of Computer Science and Engineering United International University1212 DhakaBangladesh Cyber Security Cooperative Research Centre 6027 PerthAustralia Centre for Securing Digital Futures Edith Cowan University6027 PerthAustralia
As the use of blockchain for digital payments continues to rise,it becomes susceptible to various malicious *** detecting anomalies within blockchain transactions is essential for bolstering trust in digital ***,the t... 详细信息
来源: 评论
ZoomViT: an observation behavior-based fine-grained recognition scheme
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 12775-12789页
作者: Ma, Zhipeng Yang, Yongquan Wang, Haicheng Huang, Lei Wei, Zhiqiang Faculty of Information Science and Engineering Ocean University of China Songling Road Shandong Qingdao266000 China College of Computer and Cyber Security Fujian Normal University Xuefu South Road Fuzhou350117 China
Fine-grained image recognition aims to distinguish many images with subtle differences and identify the sub-categories to which they belong. Recently, vision transformer (ViT) has achieved promising results in many co... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
Data Analytic for Healthcare cyber Physical System
收藏 引用
IEEE Transactions on Network science and engineering 2023年 第5期10卷 2490-2502页
作者: Gan, Wensheng Hu, Kaixia Huang, Gengsen Chien, Wei-Che Chao, Han-Chieh Meng, Weizhi Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan National Dong Hwa University Department of Electrical Engineering Hualien97401 Taiwan UCSI University Institute of Computer Science and Innovation Kuala Lumpur Malaysia Department of Applied Mathematics and Computer Science Cyber Security Section Lyngby2800 Denmark
Nowadays, a large number of AI-powered healthcare cyber-physical systems (CPSs) have been used in healthcare services. In order to provide better care, AI-powered healthcare CPSs analyze the data they collect using a ... 详细信息
来源: 评论