咨询与建议

限定检索结果

文献类型

  • 1,176 篇 会议
  • 587 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,040 篇 工学
    • 877 篇 计算机科学与技术...
    • 743 篇 软件工程
    • 302 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 143 篇 电气工程
    • 136 篇 生物工程
    • 88 篇 网络空间安全
    • 76 篇 电子科学与技术(可...
    • 76 篇 生物医学工程(可授...
    • 68 篇 安全科学与工程
    • 43 篇 仪器科学与技术
    • 42 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 光学工程
  • 434 篇 理学
    • 212 篇 数学
    • 144 篇 生物学
    • 85 篇 物理学
    • 64 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 36 篇 化学
  • 314 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 112 篇 法学
    • 72 篇 社会学
    • 41 篇 法学
  • 90 篇 医学
    • 68 篇 基础医学(可授医学...
    • 68 篇 临床医学
    • 49 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 20 篇 农学
  • 12 篇 教育学
  • 10 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 109 篇 accuracy
  • 81 篇 deep learning
  • 73 篇 internet of thin...
  • 70 篇 machine learning
  • 66 篇 training
  • 64 篇 real-time system...
  • 61 篇 feature extracti...
  • 59 篇 security
  • 46 篇 computational mo...
  • 45 篇 predictive model...
  • 43 篇 support vector m...
  • 43 篇 blockchain
  • 39 篇 convolutional ne...
  • 38 篇 artificial intel...
  • 36 篇 privacy
  • 33 篇 reliability
  • 33 篇 data models
  • 32 篇 authentication
  • 32 篇 cloud computing
  • 31 篇 machine learning...

机构

  • 77 篇 school of cyber ...
  • 54 篇 institute of inf...
  • 36 篇 department of co...
  • 23 篇 college of compu...
  • 21 篇 college of cyber...
  • 17 篇 state key labora...
  • 16 篇 department of cy...
  • 16 篇 cyber security s...
  • 15 篇 key laboratory o...
  • 15 篇 center for cyber...
  • 14 篇 zarqa university...
  • 13 篇 department of cy...
  • 13 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 12 篇 engineering rese...
  • 11 篇 key laboratory o...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...
  • 10 篇 department of co...

作者

  • 43 篇 choo kim-kwang r...
  • 24 篇 kim-kwang raymon...
  • 21 篇 taher m. ghazal
  • 19 篇 mohammad kamrul ...
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 zhou pan
  • 16 篇 amjed abbas ahme...
  • 15 篇 gong yanmin
  • 15 篇 ahmed amjed abba...
  • 14 篇 hasan mohammad k...
  • 14 篇 yu philip s.
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 gupta brij b.
  • 11 篇 xu li
  • 11 篇 gan wensheng
  • 10 篇 ibrahem mohamed ...
  • 10 篇 javed abdul rehm...
  • 9 篇 parizi reza m.

语言

  • 1,683 篇 英文
  • 96 篇 其他
  • 5 篇 中文
检索条件"机构=Department of Computer Engineering and Cyber Security"
1783 条 记 录,以下是1-10 订阅
排序:
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science and Engineering University College of EngineeringTindivanamMelpakkamTamil nadu 604001India Department of Computer Engineering National Institute of Technology KurukshetraIndia
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri... 详细信息
来源: 评论
3GPP Edge–Fog federation: Transparent 3rd-party authentication and application mobility
收藏 引用
computer Communications 2024年 222卷 220-229页
作者: Ali, Asad Islam, Minhajul Mallick, Tushin Islam, Mohammad Sakibul Sakib, Sadman Shohrab Hossain, Md. Lin, Ying-Dar National Institute of Cyber Security Ministry of Digital Affairs Taiwan Department of Computer Science National Yang Ming Chiao Tung University Hsinchu Taiwan Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Bangladesh
3GPP edge and fog computing paradigms provide computational services to users at low latency. These paradigms alone are not enough to fulfill the users’ requirements completely. Therefore, a federation among these co... 详细信息
来源: 评论
A hybrid encryption for secure data deduplication the cloud
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 295-307页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Department of Computer Science and Engineering Cyber Security IIIT Kottayam India Department of Computer Applications National Institute of Technology Tiruchirappalli India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda... 详细信息
来源: 评论
MODELGUARD: Information-Theoretic Defense Against Model Extraction Attacks  33
MODELGUARD: Information-Theoretic Defense Against Model Extr...
收藏 引用
33rd USENIX security Symposium, USENIX security 2024
作者: Tang, Minxue Dai, Anna DiValentin, Louis Ding, Aolin Hass, Amin Gong, Neil Zhenqiang Chen, Yiran Li, Hai Department of Electrical and Computer Engineering Duke University United States Cyber Security Lab Accenture
Malicious utilization of a query interface can compromise the confidentiality of ML-as-a-Service (MLaaS) systems via model extraction attacks. Previous studies have proposed to perturb the predictions of the MLaaS sys... 详细信息
来源: 评论
security Flaw in TCP/IP and Proposed Measures  1
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Upadhyay, Sourav Kumar Kumar, Prakash Department of Computer Science and Engineering BIT Sindri Dhanbad India Department of Computer Science and Cyber Security JRSU Ranchi India
The whole Internet is based on TCP/IP protocol suite. The inherent flaw in the TCP/IP makes a cascading effect for other attacks like flooding, fingerprinting, and many more. All the switching and routing mechanisms a... 详细信息
来源: 评论
Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1093-1105页
作者: Rupo Ma Siping Gao College of Command and Control Engineering Army Engineering UniversityNanjing210007China Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Department of Electrical and Computer Engineering National University of Singapore119260Singapore
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is ... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
Malicious PE File Detection Using Machine Learning: An Analysis of Header Features
Malicious PE File Detection Using Machine Learning: An Analy...
收藏 引用
2024 IEEE International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications, COSMIC 2024
作者: Shyam Kumar, S. Shetty, Jyothi Department of Cyber Security Nitte574 110 India Department of Computer Science and Engineering Nitte574 110 India
Portable Executable (PE) files serve as the foundation of the Windows operating system, containing executable code, object code, and Dynamic Link Libraries (DLLs). Their importance lies in their capacity to execute ta... 详细信息
来源: 评论
EEG-VARNet: An Advanced Deep Learning Model for AccuratePrediction and Classification of Major Depressive Disorder Using EEG Data  6
EEG-VARNet: An Advanced Deep Learning Model for AccuratePred...
收藏 引用
6th International Conference on cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Mahender, Udutala Sathiyasuntharam, V. Annamalai University Department of Computer Science and Engineering Tamilnadu Chidambaram India CMR Engineering College Department of Cyber Security Hyderabad India
The correct and early identification of Major Depressive Disorder (MDD) is challenging because of its complicated causes and symptoms that are similar to those of other mental diseases. This study introduces a new met... 详细信息
来源: 评论