咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是81-90 订阅
排序:
A Deepfake Image Classifier System for real and Doctored Image Differentiation  7
A Deepfake Image Classifier System for real and Doctored Ima...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Thomas, Juanith Mathew Ebenezer, V. Richard, Rohan Paul Karunya Institute of Technology And Sciences Division of Computer Science And Engineering Coimbatore India Karunya Institute of Technology And Sciences Division of Data Science And Cyber Security Coimbatore India
The sudden proliferation of deepfake technology has raised concerns about the authenticity and integrity of digital media. In response to these concerns, this paper presents a Deepfake image classifier system designed... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data  5
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
5th International Conference on Control, Communication and Computing, ICCC 2023
作者: Varghese, Varsha Mahalakshmi, S. Senthilkumar, K.B. ER&DCI Institute of Technology Cyber Forensics and Information Security Department of Computer Science & Engineering Thiruvananthapuram India Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram India
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat... 详细信息
来源: 评论
Combating Terrorism: Detecting and Analyzing Extremist Content on X (Formerly Twitter)  3
Combating Terrorism: Detecting and Analyzing Extremist Conte...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Mwendwa, Gideon Chouhan, Lokesh Etyang, Felix Mandela, Ngaira Gift, Uwineza School of Cyber Security and Digital Forensics National Forensic Sciences University Goa India Cochin University of Science and Technology School of Engineering Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Jinja Uganda
This study investigates the efficacy of machine learning algorithms in detecting and evaluating extremist content on social media platforms, and we employ X, formerly known as Twitter. We therefore utilize Kaggle'... 详细信息
来源: 评论
Diagnosis of Plant Leaf Disease using Vision Transformer  10
Diagnosis of Plant Leaf Disease using Vision Transformer
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Sundaraj, Ashik Isravel, Deva Priya Dhas, Julia Punitha Malar Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India
In precision agriculture, it is crucial to have a reliable system for identifying diseases and suggesting measures to maintain crop health and enhance yield performance. Addressing the persistent challenge of accurate... 详细信息
来源: 评论
Investigation of Handwritten Image-To-Speech Using Deep Learning
Investigation of Handwritten Image-To-Speech Using Deep Lear...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Manju, S. Anitha, J. Sujitha Juliet, D. Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India
In the realm of accessibility technology, this paper introduces a pioneering method for converting handwritten images to speech. The work primarily focuses on recognizing handwritten text and subsequently converting i... 详细信息
来源: 评论
Sequential Masking Imitation Learning for Handling Causal Confusion in Autonomous Driving  8th
Sequential Masking Imitation Learning for Handling Causal C...
收藏 引用
8th International Workshop on Advanced Computational Intelligence and Intelligent Informatics, IWACIII 2023
作者: Zhang, Huanghui Zheng, Zhi College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China College of Control Science and Engineering Zhejiang University Hangzhou310027 China
Training agents for autonomous driving using imitation learning seems like a promising way since its only requirement is the demonstration from expert drivers. However, causal confusion is a problem existing in imitat... 详细信息
来源: 评论
Marine Life Ecosystem Analysis Based on Climate Change Detection Using Deep Learning Algorithms
收藏 引用
Remote Sensing in Earth Systems sciences 2025年 第2期8卷 545-554页
作者: Rebecca, B. Sandhya, A. Pokkuluri, Kiran Sree Kanishka, Gunipati Shaik, Khasimbee Krishna, B. Murali Department of Computer Science and Engineering Marri Laxman Reddy Institute of Technology and Management Telangana Dundigal 500043 India Department of CSE SRM Institute of Science and Technology Chennai Ramapuram India Department of Computer Science and Engineering Shri Vishnu Engineering College for Women Andhra Pradesh Bhimavaram India Computer Science and Engineering (Cyber Security) Madanapalle Institute of Technology & Science Madanapalle India Department of Computer Science and Engineering Aditya University Andhra Pradesh Surampalem India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
The surrounding environmental and climatic conditions have a significant impact on the utilisation of ecosystem services for recreational purposes. Climate change poses a threat to future natural leisure opportunities... 详细信息
来源: 评论
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论
security, Trust, and Privacy in cyber-physical Systems (CPS)  2
Security, Trust, and Privacy in Cyber-physical Systems (CPS)
收藏 引用
2nd International Conference on cyber Physical Systems, Power Electronics and Electric Vehicles, ICPEEV 2024
作者: Busari, Wareez A. Bello, Abeeb A. Department of Cyber Security Science Federal University of Technology Niger State Minna Nigeria Department of Electrical and Computer Engineering Mahindra University Hyderabad India
This paper explores the convergence of physical and computational components in cyber-Physical Systems (CPS). security, trust, and privacy are paramount for reliable and resilient operation of these interconnected sys... 详细信息
来源: 评论
Enhancing Computational Model for Human Motion Recognition Using Deep Learning
Enhancing Computational Model for Human Motion Recognition U...
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Yadav, Ram Kumar Daniel, A. Kumar, Birendra Sakhare, Apeksha Moriwal, Rahul Pawar, Raju Amity university Gwalior Department of Computer Science and Engineering Gwalior India G H Raisoni college of engineering Department of Data Science Internet of Things and Cyber Security Nagpur India G H Raisoni college of engineering Department of Computer Science and Engineering Nagpur India
Human motion recognition (HMR) is a fundamental task in computer vision with applications in healthcare, surveillance, human-computer interaction, and intelligent environments. This paper proposes a better-performing ... 详细信息
来源: 评论