咨询与建议

限定检索结果

文献类型

  • 4,462 篇 会议
  • 3,037 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,747 篇 工学
    • 3,707 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,267 篇 信息与通信工程
    • 710 篇 控制科学与工程
    • 622 篇 电气工程
    • 528 篇 生物工程
    • 400 篇 电子科学与技术(可...
    • 336 篇 网络空间安全
    • 294 篇 生物医学工程(可授...
    • 276 篇 机械工程
    • 248 篇 安全科学与工程
    • 215 篇 光学工程
    • 181 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 171 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,975 篇 理学
    • 1,058 篇 数学
    • 578 篇 生物学
    • 381 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 251 篇 系统科学
    • 168 篇 化学
  • 1,224 篇 管理学
    • 770 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 257 篇 社会学
    • 150 篇 法学
  • 315 篇 医学
    • 254 篇 临床医学
    • 235 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 161 篇 应用经济学
  • 78 篇 农学
  • 59 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 250 篇 deep learning
  • 220 篇 security
  • 209 篇 machine learning
  • 197 篇 feature extracti...
  • 196 篇 internet of thin...
  • 180 篇 authentication
  • 169 篇 training
  • 165 篇 computational mo...
  • 141 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 124 篇 blockchain
  • 118 篇 predictive model...
  • 107 篇 artificial intel...
  • 101 篇 support vector m...
  • 100 篇 cloud computing
  • 96 篇 data privacy
  • 93 篇 wireless sensor ...

机构

  • 229 篇 school of cyber ...
  • 190 篇 institute of inf...
  • 97 篇 school of cyber ...
  • 92 篇 school of cyber ...
  • 79 篇 college of cyber...
  • 60 篇 school of comput...
  • 60 篇 department of co...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 46 篇 college of compu...
  • 44 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 40 篇 school of inform...
  • 32 篇 peng cheng labor...
  • 32 篇 state key labora...
  • 31 篇 school of comput...
  • 31 篇 southeast univer...

作者

  • 61 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 26 篇 mohammad kamrul ...
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 hai jin
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 cao xiaochun
  • 20 篇 liu yang
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,832 篇 英文
  • 680 篇 其他
  • 69 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7577 条 记 录,以下是11-20 订阅
排序:
Feature-Based Augmentation in Sarcasm Detection Using Reverse Generative Adversarial Network
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3637-3657页
作者: Derwin Suhartono Alif Tri Handoyo Franz Adeta Junior Computer Science Department School of Computer ScienceBina Nusantara UniversityJakarta11480Indonesia Cyber Security Program Computer Science DepartmentSchool of Computer ScienceBina Nusantara UniversityJakarta11480Indonesia
Sarcasm detection in text data is an increasingly vital area of research due to the prevalence of sarcastic content in online *** study addresses challenges associated with small datasets and class imbalances in sarca... 详细信息
来源: 评论
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, Xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论
LCEFL: A Lightweight Contribution Evaluation Approach for Federated Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6643-6657页
作者: Guo, Jingjing Li, Jiaxing Liu, Zhiquan Xiong, Yupeng Ma, Yong Vasilakos, Athanasios V. Li, Xinghua Ma, Jianfeng Xidian University School of Cyber Engineering Xi’an710071 China Jinan University College of Cyber Security Guangzhou510632 China Jiangxi Normal University Department of Computer Science and Technology Nanchang330022 China Department of Networks and Communications College of Computer Science and Information Technology Dammam31441 Saudi Arabia Grimstad4879 Norway
The prerequisite for implementing incentive mechanisms and reliable participant selection schemes in federated learning is to obtain the contribution of each participant. Available evaluation methods for participant c... 详细信息
来源: 评论
ArchSentry: Enhanced Android Malware Detection via Hierarchical Semantic Extraction
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2822-2837页
作者: Wang, Tianbo Liu, Mengyao Li, Huacheng Zhao, Lei Jiang, Changnan Xia, Chunhe Cui, Baojiang Beihang University School of Cyber Science and Technology Beijing100191 China Beihang University School of Computer Science and Engineering Beijing China Wuhan University School of Cyber Science and Engineering Wuhan China Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing China
Android malware poses a significant challenge for mobile platforms. To evade detection, contemporary malware variants use API substitution or obfuscation techniques to hide malicious activities and mask their shallow ... 详细信息
来源: 评论
A Post-Quantum Privacy-Preserving Payment Protocol in Vehicle to Grid Networks
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-13页
作者: Chen, Ying He, Debiao Bao, Zijian Luo, Min Choo, Kim-Kwang Raymond School of Cyber Science and Engineering Wuhan University Wuhan China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX USA
In Vehicle to Grid (V2G) networks, the frequent charging and discharging activities of electric vehicles at specific locations underscore the importance to address the challenges associated with identity and location ... 详细信息
来源: 评论
Malicious PE File Detection Using Machine Learning: An Analysis of Header Features
Malicious PE File Detection Using Machine Learning: An Analy...
收藏 引用
2024 IEEE International Conference on Computing, Semiconductor, Mechatronics, Intelligent Systems and Communications, COSMIC 2024
作者: Shyam Kumar, S. Shetty, Jyothi Department of Cyber Security Nitte574 110 India Department of Computer Science and Engineering Nitte574 110 India
Portable Executable (PE) files serve as the foundation of the Windows operating system, containing executable code, object code, and Dynamic Link Libraries (DLLs). Their importance lies in their capacity to execute ta... 详细信息
来源: 评论
Advancing Android Malware Detection with BioSentinel Neural Network using Hybrid Deep Learning Techniques  18
Advancing Android Malware Detection with BioSentinel Neural ...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Rani, D. Sandhya Gnaneshwar, K. Sampurnima Pattem, K. Sekhar, Soma Krishna, G. Bala Kakarla, Shirisha Cvr College of Engineering Department of Computer Science Engineering Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engineering-Cyber Security Hyderabad India Vardhaman College of Engineering Department of Computer Science Engineering Hyderabad India
The paper introduces the BioSentinel Neural Network (BSNN), a novel hybrid deep learning model designed to enhance malware detection, particularly focusing on zero-day threats. The BSNN model integrates diverse neural... 详细信息
来源: 评论
Energy Efficiency Maximization for Cooperative NOMA with Hardware Impairments
收藏 引用
China Communications 2024年 第12期21卷 80-91页
作者: Wang Zhengqiang Chang Ruifei Wan Xiaoyu Fan Zifu Duo Bin School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this... 详细信息
来源: 评论
EEG-VARNet: An Advanced Deep Learning Model for AccuratePrediction and Classification of Major Depressive Disorder Using EEG Data  6
EEG-VARNet: An Advanced Deep Learning Model for AccuratePred...
收藏 引用
6th International Conference on cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Mahender, Udutala Sathiyasuntharam, V. Annamalai University Department of Computer Science and Engineering Tamilnadu Chidambaram India CMR Engineering College Department of Cyber Security Hyderabad India
The correct and early identification of Major Depressive Disorder (MDD) is challenging because of its complicated causes and symptoms that are similar to those of other mental diseases. This study introduces a new met... 详细信息
来源: 评论
Effective Tool Augmented Multi-Agent Framework for Data Analysis
收藏 引用
Data Intelligence 2024年 第4期6卷 923-945页
作者: Xilin Zhang Zhixin Mao Ziwen Chen Shen Gao School of Automation Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Computer Science and Engineering(School of Cyber Security) University of Electronic Science and Technology of ChinaChengdu 611731China
Data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(L... 详细信息
来源: 评论