咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7539 条 记 录,以下是151-160 订阅
排序:
A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20787-20799页
作者: Xie, Ninghai Li, Jiguo Lin, Chao Zhang, Yichen Shen, Jian Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China School of Mathematics and Statistics Key Laboratory of Analytical Mathematics and Applications Ministry of Education Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Guangzhou University Guangdong Key Laboratory of Blockchain Security Guangzhou510006 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Decentralized payment systems, such as Bitcoin, enable immutable and transparent payments in a distributed manner. To address the issue of user privacy leakage due to transaction transparency, some efforts have enhanc... 详细信息
来源: 评论
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Towards a User-Friendly Web Application Firewall  11
Towards a User-Friendly Web Application Firewall
收藏 引用
11th IEEE International Conference on Intelligent Computing and Information Systems, ICICIS 2023
作者: Omar, Fatima Ahmed, Dalia Elnakib, Omar Ahmed, Mohamed Farhan, Nada Hindy, Hanan Abdel-Hamid, Mahmoud Badawi, Yehia Ain Shams University Faculty of Computer and Information Science Cyber Security Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Computer Systems Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Cyber Security Department Giza Egypt Ain Shams University Faculty of Computer and Information Science Computer Science Department Cairo Egypt
Web Application Firewall (WAF) systems play a vital role in protecting web applications from various security vulnerabilities. However, existing WAF solutions are often costly and complex to configure, limiting their ... 详细信息
来源: 评论
Password Strength Classification Using Machine Learning Methods  7
Password Strength Classification Using Machine Learning Meth...
收藏 引用
7th Edition Global Conference on Wireless and Optical Technologies, GCWOT 2024
作者: Rehman, Habiba Ahmed, Adnan Hussain, Athar Umar, Muhamamd Siraj, Mohammad Ahmed, Waqas Muhamnad, Mir Rehman, Eesha Quaid-e-Awam University of Engineering Science and Technology Department of Computer Science Nawabshah Pakistan Quaid-e-Awam University of Engineering Science and Technology Department of Cyber Security Nawabshah Pakistan College of Engineering King Saud University Electrical Engineering Department Riyadh11421 Saudi Arabia
Passwords remain a critical component of authentication systems due to their ease of implementation, despite the availability of more secure methods such as biometrics and smart cards. However, password-based systems ... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Mahdi, Ali Jafer Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq AI-Zahraa University for Women Department of Scientific Affairs Bangi43600 Malaysia College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Innovative grid technology leverages Information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home... 详细信息
来源: 评论
Advancements in Operational Transconductance Amplifiers (OTAs) for Design, Applications & Performance Optimization Techniques with Hardware Implementation  3
Advancements in Operational Transconductance Amplifiers (OTA...
收藏 引用
3rd IEEE International Conference of Electron Devices Society Kolkata Chapter, EDKCON 2024
作者: Pramath, V. Pavithra, G. Ninawe, Swapnil S. Manjunath, T.C. Bengaluru India Dayananda Sagar College of Engineering Department of Electronics & Communication Engineering Karnataka Bangalore India Rajarajeswari College of Engineering Department of Computer Science & Engineering IoT Cyber Security & Block Chain Technology Karnataka Bangalore India
This research paper presents the design and simulation of a novel architecture for Multiple Path Fully Differential Operational Transconductance Amplifiers (OTAs) with a Dual Flipped Voltage Follower, specifically dev... 详细信息
来源: 评论
Sustainable Energy Provision in Wireless Sensor Networks: An Overview Leveraging Mobile Sink Strategies  21
Sustainable Energy Provision in Wireless Sensor Networks: An...
收藏 引用
21st International Multi-Conference on Systems, Signals and Devices, SSD 2024
作者: Lateef, Hadeel Majid Al-Qurabat, Ali Kadhum M. College of Sciences Al-Mustaqbal University Department of Cyber Security Babylon51001 Iraq College of Science for Women University of Babylon Department of Computer Science Babylon Iraq
Wireless sensor networks (WSNs) can effectively address the hot-spot or sink-hole problem caused by multi-hop routing with the static sink by data collecting using mobile sinks (MS). The optimal path's design, how... 详细信息
来源: 评论
IoMT-Based Healthcare Framework for Ambient Assisted Living Using a Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6867-6878页
作者: Waleed T.Al-Sit Nidal A.Al-Dmour Taher M.Ghazal Ghassan F.Issa Department of Computer Engineering Mutah UniversityAl-KarakJordanHigher Colleges of TechnologyDubaiUAE Department of Computer Engineering College of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKM43600BangiSelangorMalaysia
In the age of universal computing,human life is becoming smarter owing to the recent developments in the Internet of Medical Things(IoMT),wearable sensors,and telecommunication innovations,which provide more effective... 详细信息
来源: 评论
A Survey on Trustworthy Edge Intelligence: From security and Reliability To Transparency and Sustainability
收藏 引用
IEEE Communications Surveys and Tutorials 2024年 第3期27卷 1-1页
作者: Wang, Xiaojie Wang, Beibei Wu, Yu Ning, Zhaolong Guo, Song Yu, Fei Richard School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon Hong Kong China School of Information Technology Carleton University Ottawa ON Canada
Edge Intelligence (EI) integrates Edge Computing (EC) and Artificial Intelligence (AI) to push the capabilities of AI to the network edge for real-time, efficient and secure intelligent decision-making and computation... 详细信息
来源: 评论
Semi‑supervised contour‑driven broad learning system for autonomous segmentation of concealed prohibited baggage items
收藏 引用
Visual Computing for Industry,Biomedicine,and Art 2024年 第1期7卷 1-18页
作者: Divya Velayudhan Abdelfatah Ahmed Taimur Hassan Muhammad Owais Neha Gour Mohammed Bennamoun Ernesto Damiani Naoufel Werghi Department of Electrical Engineering and Computer Sciences Center for Cyber‑Physical SystemsKhalifa University of Science and TechnologyAbu Dhabi 127788United Arab Emirates Department of Electrical Computer and Biomedical EngineeringAbu Dhabi UniversityAbu Dhabi 59911United Arab Emirates Department of Computer Science and Software Engineering the University of Western AustraliaPerthWA 6009Australia
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,... 详细信息
来源: 评论