咨询与建议

限定检索结果

文献类型

  • 1,550 篇 会议
  • 934 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,506 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 372 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 215 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 113 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 82 篇 安全科学与工程
    • 61 篇 机械工程
    • 54 篇 化学工程与技术
    • 52 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 120 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 83 篇 基础医学(可授医学...
    • 81 篇 临床医学
    • 53 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 141 篇 accuracy
  • 118 篇 deep learning
  • 105 篇 feature extracti...
  • 103 篇 training
  • 94 篇 machine learning
  • 89 篇 security
  • 77 篇 computational mo...
  • 74 篇 real-time system...
  • 72 篇 internet of thin...
  • 72 篇 privacy
  • 60 篇 blockchain
  • 54 篇 support vector m...
  • 53 篇 predictive model...
  • 49 篇 data models
  • 46 篇 artificial intel...
  • 45 篇 semantics
  • 45 篇 cloud computing
  • 43 篇 convolutional ne...
  • 42 篇 data privacy
  • 40 篇 reliability

机构

  • 226 篇 school of cyber ...
  • 157 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 46 篇 college of cyber...
  • 45 篇 college of compu...
  • 44 篇 key laboratory o...
  • 36 篇 school of comput...
  • 32 篇 school of comput...
  • 31 篇 school of cyber ...
  • 31 篇 school of cyber ...
  • 30 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 state key labora...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 2,245 篇 英文
  • 254 篇 其他
  • 14 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2506 条 记 录,以下是51-60 订阅
排序:
Detecting Deepfake Videos using Face Recognition and Neural Networks  1
Detecting Deepfake Videos using Face Recognition and Neural ...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Murugan, Muthu Aravind Mathu, T. Priya, S Jeba Karunya Institute of Technology and Sciences Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Data Science and Cyber Security Coimbatore India
Deepfake videos created using advanced artificial intelligence techniques, pose a significant threat to digital media credibility. This project introduces a holistic strategy for identifying these videos, incorporatin... 详细信息
来源: 评论
Advancing Multiclass Emotion Recognition with CNN-RNN Architecture and Illuminating Module for Real-time Precision using Facial Expressions
Advancing Multiclass Emotion Recognition with CNN-RNN Archit...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Prince, Simrith C. Babu, Nirmal Varghese Computer Science And Engineering Karunya Institute Of Technology And Sciences Coimbatore India Data Science And Cyber Security Karunya Institute Of Technology And Sciences Coimbatore India
Emotions, intrinsic to the human experience, serve as the catalyst for a groundbreaking technological innovation in multiclass emotion recognition through facial expressions. This study introduces a revolutionary syst... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
Identifying The Coconut Leaf Disease Using Deep Transfer Learning Approach  4
Identifying The Coconut Leaf Disease Using Deep Transfer Lea...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Tuhin, Hemayet Hossain Kayum, Md Abdul Rahmatul Kabir Rasel Sarker, Md. Tanvir Siddiquee, Shah Md Pandey, Bishwajeet Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Intelligent System and Cyber Security Astana IT University Kazakhstan
Coconut is one of the main economic crops in Bangladesh. It is a tree whose every part is useful in one way or another in public life. The leaves, flowers, fruits, stems, and roots of this tree are used as raw materia... 详细信息
来源: 评论
Crime Against Women in India: Statistical Analysis Using Linear Regression  2
Crime Against Women in India: Statistical Analysis Using Lin...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Mim, Zarin Tasnim Paul, Rittika Foysal, Mollah Md Tohfa, Fairuz Nowshin Mahi, Shah Abrar Bangalore India Bangalore India B-Tech of Computer Science and Engineering East Delta University Chattagram Bangladesh B-Tech of Computer Science and Engineering-Cyber Security Chandigarh University Delhi India
The crime reports of offenses occurring against women all over India are increasing day by day. It has become one of today's most concerning socio-economic and cultural issues. Crime against women hampers the over... 详细信息
来源: 评论
Advancing Stance Detection of Political Fan Pages: A Multimodal Approach  24
Advancing Stance Detection of Political Fan Pages: A Multimo...
收藏 引用
33rd Companion of the ACM World Wide Web Conference, WWW 2023
作者: Kuo, Kuan-Hung Wang, Ming-Hung Kao, Hung-Yu Dai, Yu-Chen National Chung Cheng University Department of Computer Science and Information Engineering Chiayi Taiwan National Institute of Cyber Security Taipei Taiwan
The evolution of political campaigns is evident with the ascent of social media. Ideological beliefs are increasingly disseminated through political-affiliated fan pages. The interaction between politicians and the ge... 详细信息
来源: 评论
APFT: Adaptive Phoneme Filter Template to Generate Anti-Compression Speech Adversarial Example in Real-Time
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 5152-5165页
作者: Huang, Yihuan Ren, Yanzhen Sun, Zongkun Zhai, Liming Wang, Jingmin Liu, Wuyang Wuhan University School of Cyber Science and Engineering Wuhan430072 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Central China Normal University School of Computer Science Wuhan430079 China
Automatic Speech Recognition (ASR) systems are widely used for speech censoring. Speech Adversarial Example (AE) offers a novel approach to protect speech privacy by forcing ASR to mistranscribe. However, existing spe... 详细信息
来源: 评论
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION  15
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Goyal, Devansh Mishra, Santosh Kumar Rai, Vikash Kumar Department of Computer Science and Engineering RGIPT Jais Amethi India School of Cyber Security and Digital Forensics NFSU Goa Goa India
Sarcasm and satire are common ways to communicate complicated ideas with humor and irony, both expressing criticism or mockery. Detecting sarcasm vs. satire in real life can foster better communication by understandin... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
PriFace: a privacy-preserving face recognition framework under untrusted server
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2967-2979页
作者: Zhao, Shan Zhang, Lefeng Xiong, Ping School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China Center for Cyber Security and Privacy School of Computer Science University of Technology Sydney Sydney Australia
Alongside the rapid development of artificial intelligence and mobile Internet, face recognition has gradually become a mainstream intelligent terminal authentication technology that is widely applied in security, fin... 详细信息
来源: 评论