咨询与建议

限定检索结果

文献类型

  • 1,176 篇 会议
  • 582 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,036 篇 工学
    • 875 篇 计算机科学与技术...
    • 742 篇 软件工程
    • 301 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 141 篇 电气工程
    • 136 篇 生物工程
    • 88 篇 网络空间安全
    • 76 篇 电子科学与技术(可...
    • 76 篇 生物医学工程(可授...
    • 67 篇 安全科学与工程
    • 43 篇 仪器科学与技术
    • 42 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 光学工程
  • 434 篇 理学
    • 212 篇 数学
    • 144 篇 生物学
    • 85 篇 物理学
    • 64 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 36 篇 化学
  • 314 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 111 篇 法学
    • 72 篇 社会学
    • 40 篇 法学
  • 90 篇 医学
    • 68 篇 基础医学(可授医学...
    • 68 篇 临床医学
    • 49 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 20 篇 农学
  • 12 篇 教育学
  • 9 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 110 篇 accuracy
  • 82 篇 deep learning
  • 73 篇 internet of thin...
  • 71 篇 machine learning
  • 67 篇 training
  • 64 篇 real-time system...
  • 61 篇 feature extracti...
  • 59 篇 security
  • 47 篇 computational mo...
  • 45 篇 predictive model...
  • 43 篇 support vector m...
  • 43 篇 blockchain
  • 38 篇 artificial intel...
  • 38 篇 convolutional ne...
  • 36 篇 privacy
  • 34 篇 data models
  • 33 篇 reliability
  • 32 篇 authentication
  • 32 篇 cloud computing
  • 31 篇 machine learning...

机构

  • 77 篇 school of cyber ...
  • 54 篇 institute of inf...
  • 36 篇 department of co...
  • 23 篇 college of compu...
  • 21 篇 college of cyber...
  • 17 篇 state key labora...
  • 16 篇 department of cy...
  • 16 篇 cyber security s...
  • 15 篇 key laboratory o...
  • 15 篇 center for cyber...
  • 14 篇 zarqa university...
  • 13 篇 department of cy...
  • 13 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 12 篇 engineering rese...
  • 11 篇 key laboratory o...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...
  • 10 篇 department of co...

作者

  • 43 篇 choo kim-kwang r...
  • 24 篇 kim-kwang raymon...
  • 21 篇 taher m. ghazal
  • 19 篇 mohammad kamrul ...
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 zhou pan
  • 16 篇 amjed abbas ahme...
  • 15 篇 gong yanmin
  • 15 篇 ahmed amjed abba...
  • 14 篇 yu philip s.
  • 13 篇 hasan mohammad k...
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 gupta brij b.
  • 11 篇 gan wensheng
  • 10 篇 ibrahem mohamed ...
  • 10 篇 xu li
  • 10 篇 javed abdul rehm...
  • 9 篇 parizi reza m.

语言

  • 1,680 篇 英文
  • 94 篇 其他
  • 5 篇 中文
检索条件"机构=Department of Computer Engineering and Cyber Security"
1778 条 记 录,以下是11-20 订阅
排序:
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems  17
A Novel Key Management Framework for Secure and Scalable Dec...
收藏 引用
17th International Conference on security of Information and Networks, SIN 2024
作者: Yildiz, Mert Bahtiyar, Serif Istanbul Technical University Cyber Security and Privacy Research Lab SPFLab Department of Computer Engineering Istanbul Turkey
The rise of decentralized identity systems has posed significant challenges in the secure and scalable management of keys, especially in large-scale national identity programs. In this paper, we propose a new secure a... 详细信息
来源: 评论
Generative Adversarial Networks for Synthetic Jamming Attacks on UAVs  9
Generative Adversarial Networks for Synthetic Jamming Attack...
收藏 引用
9th International Conference on computer Science and engineering, UBMK 2024
作者: Sarikaya, Burcu Sönmez Bahtiyar, Şerif Istanbul Technical University Cyber Security and Privacy Research Lab SPFLab Department of Computer Engineering Istanbul Turkey
Intrusion Detection Systems (IDS) have been significant for Unmanned Aerial Vehicles (UAVs) since high connectivity is essential for such vehicles. Recently, machine learning-based defense mechanisms have contributed ... 详细信息
来源: 评论
LCEFL: A Lightweight Contribution Evaluation Approach for Federated Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 6643-6657页
作者: Guo, Jingjing Li, Jiaxing Liu, Zhiquan Xiong, Yupeng Ma, Yong Vasilakos, Athanasios V. Li, Xinghua Ma, Jianfeng Xidian University School of Cyber Engineering Xi'an710071 China Jinan University College of Cyber Security Guangzhou510632 China Jiangxi Normal University Department of Computer Science and Technology Nanchang330022 China IAU Department of Networks and Communications College of Computer Science and Information Technology Dammam31441 Saudi Arabia Grimstad Norway
The prerequisite for implementing incentive mechanisms and reliable participant selection schemes in federated learning is to obtain the contribution of each participant. Available evaluation methods for participant c... 详细信息
来源: 评论
Exploring the landscape of network security: a comparative analysis of attack detection strategies
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3211-3228页
作者: Rajesh Kanna, P. Santhi, P. Department of Computer Science and Engineering Bannari Amman Institute of Technology Tamil Nadu Erode India TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Tamil Nadu Coimbatore India
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the prim... 详细信息
来源: 评论
The Role of AI in Vehicle-to-Infrastructure Communication for Tolling Systems
The Role of AI in Vehicle-to-Infrastructure Communication fo...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Mahalakshmi, S. Baskaran, Nithiya Partheeban, Pachaivanna Krishnara, Kowsalyadevi Arjun, S. Chennai Institute of Technology Department of Computer Science and Engineering Kundrathur Chennai India Chennai Institute of Technology Department Cyber Security Kundrathur Chennai India Chennai Institute of Technology Department Civil EngDepartment Cyber Security Kundrathur Chennai India Sona Institute of Technology Department of Cyber Security Salem India
The number of vehicles people use is substantial;thus, surveillance must be accurate. License plates are detected and recognized by detecting static and real-time images captured by the camera using OCR technology, Co... 详细信息
来源: 评论
Electromagnetic Radiation Effects in Human and Animal Health  14
Electromagnetic Radiation Effects in Human and Animal Health
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Singh, Jagjot Kumar, Sanu Johnson, Derick Mathew Savita Department of Computer Science Engineering Spl. Digital Forensics and Cyber Security India
Electromagnetic (EM) radiations are the waves of electromagnetic and magnetic field which are generated from electromagnetic devices. These radiations are dangerous to humans as well as animal health. Talking medicall... 详细信息
来源: 评论
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2119-2135页
作者: Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... 详细信息
来源: 评论
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques  1
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
1st International Conference for Women in Computing, InCoWoCo 2024
作者: Roshan, Rahul G. Salanke, Vishal S Nagasundari, S. Research Center for Information Security Forensics and Cyber Resilience PES University Department of Computer Science and Engineering Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
An Early Warning Model of Telecommunication Network Fraud Based on User Portrait
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1561-1576页
作者: Wen Deng Guangjun Liang Chenfei Yu Kefan Yao Chengrui Wang Xuan Zhang Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Department of Public Security of Jiangsu Province Key Laboratory of Digital ForensicsNanjingChina
With the frequent occurrence of telecommunications and networkfraud crimes in recent years, new frauds have emerged one after another whichhas caused huge losses to the people. However, due to the lack of an effective... 详细信息
来源: 评论
TU-IR Apple Image Dataset: Benchmarking, Challenges, and Asymmetric Characterization for Bruise Detection in Application of Automatic Harvesting
IEEE Transactions on AgriFood Electronics
收藏 引用
IEEE Transactions on AgriFood Electronics 2024年 第1期2卷 105-124页
作者: Das, Dipak Hrishi Roy, Sourav Dey Saha, Priya Bhowmik, Mrinal Kanti Government Degree College Department of Information Technology Santirbazar 799144 India Department of Computer Science and Engineering Suryamaninagar 799022 India Department of Cyber Security and Digital Forensics Agartala799001 India
With the blooming interest in computer vision-based technologies for future automation of food producers, there is a need for incorporating an automatic bruise detection module in robotic apple harvesting because of d... 详细信息
来源: 评论