咨询与建议

限定检索结果

文献类型

  • 1,176 篇 会议
  • 582 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 1,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,036 篇 工学
    • 875 篇 计算机科学与技术...
    • 742 篇 软件工程
    • 301 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 141 篇 电气工程
    • 136 篇 生物工程
    • 88 篇 网络空间安全
    • 76 篇 电子科学与技术(可...
    • 76 篇 生物医学工程(可授...
    • 67 篇 安全科学与工程
    • 43 篇 仪器科学与技术
    • 42 篇 机械工程
    • 39 篇 交通运输工程
    • 36 篇 光学工程
  • 434 篇 理学
    • 212 篇 数学
    • 144 篇 生物学
    • 85 篇 物理学
    • 64 篇 系统科学
    • 64 篇 统计学(可授理学、...
    • 36 篇 化学
  • 314 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 124 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 111 篇 法学
    • 72 篇 社会学
    • 40 篇 法学
  • 90 篇 医学
    • 68 篇 基础医学(可授医学...
    • 68 篇 临床医学
    • 49 篇 公共卫生与预防医...
    • 38 篇 药学(可授医学、理...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 20 篇 农学
  • 12 篇 教育学
  • 9 篇 军事学
  • 8 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 110 篇 accuracy
  • 82 篇 deep learning
  • 73 篇 internet of thin...
  • 71 篇 machine learning
  • 67 篇 training
  • 64 篇 real-time system...
  • 61 篇 feature extracti...
  • 59 篇 security
  • 47 篇 computational mo...
  • 45 篇 predictive model...
  • 43 篇 support vector m...
  • 43 篇 blockchain
  • 38 篇 artificial intel...
  • 38 篇 convolutional ne...
  • 36 篇 privacy
  • 34 篇 data models
  • 33 篇 reliability
  • 32 篇 authentication
  • 32 篇 cloud computing
  • 31 篇 machine learning...

机构

  • 77 篇 school of cyber ...
  • 54 篇 institute of inf...
  • 36 篇 department of co...
  • 23 篇 college of compu...
  • 21 篇 college of cyber...
  • 17 篇 state key labora...
  • 16 篇 department of cy...
  • 16 篇 cyber security s...
  • 15 篇 key laboratory o...
  • 15 篇 center for cyber...
  • 14 篇 zarqa university...
  • 13 篇 department of cy...
  • 13 篇 center for cyber...
  • 13 篇 school of cyber ...
  • 12 篇 school of comput...
  • 12 篇 engineering rese...
  • 11 篇 key laboratory o...
  • 10 篇 school of cyber ...
  • 10 篇 department of co...
  • 10 篇 department of co...

作者

  • 43 篇 choo kim-kwang r...
  • 24 篇 kim-kwang raymon...
  • 21 篇 taher m. ghazal
  • 19 篇 mohammad kamrul ...
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 zhou pan
  • 16 篇 amjed abbas ahme...
  • 15 篇 gong yanmin
  • 15 篇 ahmed amjed abba...
  • 14 篇 yu philip s.
  • 13 篇 hasan mohammad k...
  • 12 篇 peng hao
  • 12 篇 dehghantanha ali
  • 12 篇 gupta brij b.
  • 11 篇 gan wensheng
  • 10 篇 ibrahem mohamed ...
  • 10 篇 xu li
  • 10 篇 javed abdul rehm...
  • 9 篇 parizi reza m.

语言

  • 1,680 篇 英文
  • 94 篇 其他
  • 5 篇 中文
检索条件"机构=Department of Computer Engineering and Cyber Security"
1778 条 记 录,以下是31-40 订阅
排序:
Data Analytic for Healthcare cyber Physical System
收藏 引用
IEEE Transactions on Network Science and engineering 2023年 第5期10卷 2490-2502页
作者: Gan, Wensheng Hu, Kaixia Huang, Gengsen Chien, Wei-Che Chao, Han-Chieh Meng, Weizhi Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan National Dong Hwa University Department of Electrical Engineering Hualien97401 Taiwan UCSI University Institute of Computer Science and Innovation Kuala Lumpur Malaysia Department of Applied Mathematics and Computer Science Cyber Security Section Lyngby2800 Denmark
Nowadays, a large number of AI-powered healthcare cyber-physical systems (CPSs) have been used in healthcare services. In order to provide better care, AI-powered healthcare CPSs analyze the data they collect using a ... 详细信息
来源: 评论
Adapting to Evasive Tactics through Resilient Adversarial Machine Learning for Malware Detection  18
Adapting to Evasive Tactics through Resilient Adversarial Ma...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Krishna, G. Bala Sravan Kumar, G. Ramachandra, Mummadi Sampurnima Pattem, K. Rani, D. Sandhya Kakarla, Geeta Cvr College of Engineering Department of Computer Science Engg. Rangareddy Ibrahimpatnam India Cvr College of Engineering Department of Computer Science Engg.-Cyber Security Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Hyderabad India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Cyber Security Hyderabad India
This paper presents the Adaptive Resilience-based Convolutional Network (ARCNet), a sophisticated machine learning framework specifically designed to detect advanced, evasive malware. ARCNet combines convolutional and... 详细信息
来源: 评论
Advancing Stance Detection of Political Fan Pages: A Multimodal Approach  24
Advancing Stance Detection of Political Fan Pages: A Multimo...
收藏 引用
33rd Companion of the ACM World Wide Web Conference, WWW 2023
作者: Kuo, Kuan-Hung Wang, Ming-Hung Kao, Hung-Yu Dai, Yu-Chen National Chung Cheng University Department of Computer Science and Information Engineering Chiayi Taiwan National Institute of Cyber Security Taipei Taiwan
The evolution of political campaigns is evident with the ascent of social media. Ideological beliefs are increasingly disseminated through political-affiliated fan pages. The interaction between politicians and the ge... 详细信息
来源: 评论
Machine Learning for Smart Agriculture: A Comprehensive Survey
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2568-2588页
作者: Mahmood, M. Rezwanul Matin, Mohammad Abdul Goudos, Sotirios K. Karagiannidis, George North South University Department of Electrical and Computer Engineering Dhaka1229 Bangladesh Aristotle University of Thessaloniki ELEDIA@AUTH Department of Physics Thessaloniki54124 Greece Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Thessaloniki54124 Greece Cyber Security Systems and Applied AI Research Center Beirut1102 2801 Lebanon
As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and e... 详细信息
来源: 评论
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION  15
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Goyal, Devansh Mishra, Santosh Kumar Rai, Vikash Kumar Department of Computer Science and Engineering RGIPT Jais Amethi India School of Cyber Security and Digital Forensics NFSU Goa Goa India
Sarcasm and satire are common ways to communicate complicated ideas with humor and irony, both expressing criticism or mockery. Detecting sarcasm vs. satire in real life can foster better communication by understandin... 详细信息
来源: 评论
security, Trust, and Privacy in cyber-physical Systems (CPS)  2
Security, Trust, and Privacy in Cyber-physical Systems (CPS)
收藏 引用
2nd International Conference on cyber Physical Systems, Power Electronics and Electric Vehicles, ICPEEV 2024
作者: Busari, Wareez A. Bello, Abeeb A. Department of Cyber Security Science Federal University of Technology Niger State Minna Nigeria Department of Electrical and Computer Engineering Mahindra University Hyderabad India
This paper explores the convergence of physical and computational components in cyber-Physical Systems (CPS). security, trust, and privacy are paramount for reliable and resilient operation of these interconnected sys... 详细信息
来源: 评论
Panoptic Region Slicing Segmentation and Optimized Alexnet-Based CNN for Early Melanoma Diagnosis
收藏 引用
SN computer Science 2024年 第6期5卷 756页
作者: Ganesh, V.N. Gulappagol, Laxmi Pushparani, M.K. Ganesh, K. Department of Electronics and Communication Engineering Alvas Institute of Engineering and Technology Department of Internet of Things and Cyber Security including Block chain Technology A J Institute of Engineering and Technology Department of Computer Science & amp Design Alvas Institute of Engineering and Technology
Early and accurate diagnosis of melanoma, a potentially life-threatening skin cancer, is crucial for improving patient outcomes. In this study, we propose a novel approach for melanoma detection, termed Panoptic Regio... 详细信息
来源: 评论
Research on Metaverse security and Forensics
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论
Maturity Model for Corporate Sector Based on Zero Trust Adoption  10
Maturity Model for Corporate Sector Based on Zero Trust Adop...
收藏 引用
10th International Conference on engineering and Emerging Technologies, ICEET 2024
作者: Ilyas, Muhammad Akal, Mustafa Althebyan, Qutaibah Al Ain University Department of Cyber Security Abu Dhabi United Arab Emirates Altinbas University Department of Electrical and Computer Engineering Istanbul Turkey
The rapid evolution of cybersecurity threats necessitates the adoption of robust security frameworks. One such approach gaining significant attention is the concept of zero trust, which emphasizes continuous and stron... 详细信息
来源: 评论
Deployment of Co-operative Farming Ecosystems Using Blockchain  22nd
Deployment of Co-operative Farming Ecosystems Using Blockcha...
收藏 引用
22nd International Conference on Hybrid Intelligent Systems, HIS 2022 and the 18th International Conference on Information Assurance and security, IAS 2022
作者: Mahapatra, Aishwarya Gupta, Pranav Swarnkar, Latika Gupta, Deeya Kar, Jayaprakash Centre for Cryptography Cyber Security and Digital Forensics Department of Computer Science & Engineering Department of Communication & Computer Engineering The LNM Institute of Information Technology Jaipur India
Blockchain has helped us in designing and developing decentralised distributed systems. This, in turn, has proved to be quite beneficial for various industries grappling with problems regarding a centralised system. S... 详细信息
来源: 评论