咨询与建议

限定检索结果

文献类型

  • 1,860 篇 会议
  • 1,222 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 3,124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,025 篇 工学
    • 1,583 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 585 篇 信息与通信工程
    • 305 篇 控制科学与工程
    • 237 篇 电气工程
    • 195 篇 生物工程
    • 180 篇 电子科学与技术(可...
    • 170 篇 网络空间安全
    • 125 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 112 篇 安全科学与工程
    • 81 篇 仪器科学与技术
    • 79 篇 光学工程
    • 75 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 812 篇 理学
    • 453 篇 数学
    • 212 篇 生物学
    • 163 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 61 篇 化学
  • 534 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 213 篇 图书情报与档案管...
    • 145 篇 工商管理
  • 139 篇 法学
    • 88 篇 社会学
  • 137 篇 医学
    • 112 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 61 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 58 篇 经济学
    • 57 篇 应用经济学
  • 29 篇 农学
  • 27 篇 军事学
  • 21 篇 文学
  • 19 篇 教育学
  • 10 篇 艺术学

主题

  • 103 篇 authentication
  • 103 篇 information secu...
  • 90 篇 security
  • 89 篇 internet of thin...
  • 89 篇 cryptography
  • 78 篇 deep learning
  • 78 篇 machine learning
  • 68 篇 accuracy
  • 66 篇 protocols
  • 59 篇 feature extracti...
  • 58 篇 privacy
  • 57 篇 training
  • 51 篇 computational mo...
  • 50 篇 blockchain
  • 48 篇 artificial intel...
  • 42 篇 computer science
  • 42 篇 computer securit...
  • 41 篇 encryption
  • 40 篇 servers
  • 40 篇 predictive model...

机构

  • 78 篇 school of cyber ...
  • 67 篇 institute of inf...
  • 55 篇 state key labora...
  • 45 篇 department of co...
  • 43 篇 department of co...
  • 40 篇 school of inform...
  • 40 篇 department of co...
  • 31 篇 department of in...
  • 30 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 security enginee...
  • 26 篇 school of inform...
  • 20 篇 department of co...
  • 20 篇 center for secur...
  • 19 篇 university of ch...
  • 17 篇 school of comput...
  • 16 篇 department of cy...
  • 16 篇 department of el...
  • 16 篇 center for cyber...
  • 15 篇 key laboratory o...

作者

  • 41 篇 choo kim-kwang r...
  • 34 篇 das ashok kumar
  • 30 篇 walid el-shafai
  • 25 篇 kim-kwang raymon...
  • 20 篇 naglaa f.soliman
  • 19 篇 susilo willy
  • 19 篇 taher m. ghazal
  • 18 篇 ashok kumar das
  • 18 篇 mohammad kamrul ...
  • 17 篇 mahmood khalid
  • 17 篇 chen kai
  • 17 篇 kai chen
  • 17 篇 cao xiaochun
  • 17 篇 ghazal taher m.
  • 16 篇 guo yuanxiong
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 15 篇 gong yanmin
  • 15 篇 hasan mohammad k...
  • 15 篇 amjed abbas ahme...

语言

  • 2,871 篇 英文
  • 211 篇 其他
  • 43 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Information Security"
3124 条 记 录,以下是81-90 订阅
排序:
The Effect of Data Partitioning Strategy on Model Generalizability: A Case Study of Morphological Segmentation
The Effect of Data Partitioning Strategy on Model Generaliza...
收藏 引用
2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, NAACL 2024
作者: Liu, Zoey Dorr, Bonnie J. Department of Linguistics University FL United States Computer & Information Science & Engineering Florida Institute for National Security University FL United States
Recent work to enhance data partitioning strategies for more realistic model evaluation face challenges in providing a clear optimal choice. This study addresses these challenges, focusing on morphological segmentatio... 详细信息
来源: 评论
Hiding information in a Reordered Codebook Using Pairwise Adjustments in Codewords  5
Hiding Information in a Reordered Codebook Using Pairwise Ad...
收藏 引用
5th International Conference on computer Vision and Computational Intelligence, CVCI 2024
作者: Chang, Chin-Chen Liu, Jui-Chuan Chang, Ching-Chun Lin, Yijie Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan Information and Communication Security Research Center Feng Chia University Taichung407 Taiwan
The fundamental data structure of our proposed scheme is a pixel pair. The pixel values are adjusted through simple yet well-designed equations depending on different conditions. The computation method provides an eas... 详细信息
来源: 评论
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 316-331页
作者: Urmi, Wahida Ferdose Uddin, Mohammed Nasir Uddin, Md Ashraf Talukder, Md. Alamin Hasan, Md. Rahat Paul, Souvik Chanda, Moumita Ayoade, John Khraisat, Ansam Hossen, Rakib Imran, Faisal Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia School of Information Technology Crown Institute of Higher Education 116 Pacific Highway North SydneyNSW2060 Australia Department of Cyber Security Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakoir Gazipur1750 Bangladesh Department of Electrical and Computer Engineering University of Ottawa Canada
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. Cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ... 详细信息
来源: 评论
SHAPRFs: SHapley Additive eXplanation-Based Random Forests Algorithm for Classification Problems  4th
SHAPRFs: SHapley Additive eXplanation-Based Random Forests A...
收藏 引用
4th International Conference on Frontiers in Computing and Systems, COMSYS 2023
作者: Jain, Nishant Shukla, Shipra Department of Computer Science and Engineering School of Computer Science and Engineering Manipal University Jaipur Jaipur303007 India School of Information Security and Data Science Manipal University Jaipur Jaipur303007 India
"Tree-based ensemble algorithms" (TEAs) are extensively employed for classification and regression problems. However, existing TEAs lag behind the trade-off between TEA interpretability and achieving cutting... 详细信息
来源: 评论
Personalized Food Recommendations: A Machine Learning Model for Enhanced Dining Choices  14
Personalized Food Recommendations: A Machine Learning Model ...
收藏 引用
14th IEEE International Conference on Control System, Computing and engineering, ICCSCE 2024
作者: Al-Hubaishi, Mohammed Ali, Musab A. M. Tahir, Nooritawati Md Halic University Department of Computer Engineering Istanbul Turkey University of Technology and Applied Sciences College of Computing and Information Sciences Oman International Information Technology University Department of Computer Engineering and Information Security Kazakhstan Universiti Teknologi MARA Malaysia Universiti Teknologi MARA College of Engineering Malaysia Riyadh Saudi Arabia
This research introduces an innovative approach to enhance dining experiences through a personalized meal suggestion system. Our method leverages decision tree-based machine learning to predict user preferences by ana... 详细信息
来源: 评论
Machine Learning Supported Network Attack Detection with a Novel Method Based on Random Forest-Based Feature Fusion  17
Machine Learning Supported Network Attack Detection with a N...
收藏 引用
17th International Conference on information security and Cryptology, ISCTurkiye 2024
作者: Cinar, Cihan Dogru, Ibrahim Alper Atacak, Ismail Information Security Engineering Graduate School of Natural and Applied Sciences Gazi University Ankara Turkey Department of Computer Engineering Faculty of Technology Gazi University Ankara Turkey
Nowadays, Innovative techniques, including artificial intelligence and machine learning (ML), have been employed in attack detection systems across numerous domains to create effective detection mechanisms that identi... 详细信息
来源: 评论
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques
收藏 引用
Journal of Cyber security and Mobility 2022年 第3期11卷 279-320页
作者: Somesha, M. Pais, Alwyn R. Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology karnataka Karnataka Surathkal575025 India
Email phishing is a cyber-attack, bringing substantial financial damage to corporate and commercial organizations. A phishing email is a special type of spamming, used to trick the user to disclose personal informatio... 详细信息
来源: 评论
An Explainable Deep Learning-based Approach for Multivariate Time Series Anomaly Detection in IoT  20
An Explainable Deep Learning-based Approach for Multivariate...
收藏 引用
20th International Conference on Frontiers of information Technology, FIT 2023
作者: Toor, Aafan Ahmad Lin, Jia-Chun Gran, Ernst Gunnar Lee, Ming-Chang Department of Information Security and Communication Technology Gjovik Norway Electrical Engineering and Mathematical Sciences Department of Computer Science Bergen Norway
Detecting anomalies from Internet of Things (IoT) data is important for a smooth flow of events. Timely detection of anomalies and raising alarms can help avoid any potential health and safety hazards in an IoT enviro... 详细信息
来源: 评论
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1901-1924页
作者: Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling School of Information and Cybersecurity People’s Public Security University of ChinaBeijing100038China Cyber Investigation Technology Research and Development Center The Third Research Institute of the Ministry of Public SecurityShanghai201204China Department of Cybersecurity Defense Beijing Police CollegeBeijing102202China School of Computer Science Henan Institute of EngineeringZhengzhou451191China
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal *** deep learning-based text classifiers offer promise,they often exhibit suboptimal performa... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Fadhil, Saif Aamer Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad10011 Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论