咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7539 条 记 录,以下是221-230 订阅
排序:
EmoNet: Exploring Facial Emotion Recognition Through Machine Learning
EmoNet: Exploring Facial Emotion Recognition Through Machine...
收藏 引用
2023 International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2023
作者: Karadbhajne, Manaswi Gomkale, Mayuri Chavhan Nekita, A. Agrawal, Rahul Dhule, Chetan G H Raisoni College of Engineering Department of Data Science IOT Cyber Security Nagpur India
This study uses a CNN model to explore deeper into the complex categorization of mask face emotion identification. There are number of application techniques which uses face emotion recognition [FER]. Ex.: - applicati... 详细信息
来源: 评论
Machine Learning Algorithm Comparison for Traffic Signal: A Design Approach  8
Machine Learning Algorithm Comparison for Traffic Signal: A ...
收藏 引用
8th International Conference on Communication and Electronics Systems, ICCES 2023
作者: Deshmukh, Saloni Parwekar, Aishwarya Danej, Bhagyashri Chavhan, N.A. Agrawal, Rahul Dhule, Chetan G H Raisoni College of Engineering Department of Data Science IOT Cyber Security Nagpur India
The number of vehicles is increasing significantly every day, especially in major cities. To control traffic flow on extensive road networks and facilitate crossing traffic flow on extensive road networks and facilita... 详细信息
来源: 评论
Review of permission-based malware detection in Android
Review of permission-based malware detection in Android
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Rawat, Nishant Amrita Singh, Avjeet Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9... 详细信息
来源: 评论
Multiclass Brain Tumor Detection using Convolutional Neural Network and Conventional Machine Learning  2
Multiclass Brain Tumor Detection using Convolutional Neural ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Vidhya, K. Vamsi Krishna, B. Haritha, M. Rajasekaran, Arun Sekar Roopa Chandrika, R. Velusamy, Jayaraj Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security School of Computer Science and Technology Coimbatore India QIS College of Engineering and Technology Department of AIMLDS Andhra Pradesh India QIS College of Engineering and Technology Department of Mechanical Engineering Andhra Pradesh India SR University Department of Electronics and Communication Engineering Telangana India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore India Nehru Institute of Engineering and Technology Department of Electronics and Communication Engineering Coimbatore India
Brain tumor (BT) affect the brain and reduce the lifespan of humans. Therefore, diagnosis and treatment of illnesses in its early stage is required. The objective of this paper is to evaluate the effectiveness of the ... 详细信息
来源: 评论
Detecting cross-site scripting attacks using machine learning: A systematic review
Detecting cross-site scripting attacks using machine learnin...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Baniya, D. Amrita Chaudhary, A. Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ... 详细信息
来源: 评论
Design of Smart Irrigation System Based on MLA
Design of Smart Irrigation System Based on MLA
收藏 引用
2023 IEEE World Conference on Applied Intelligence and Computing, AIC 2023
作者: Bobade, Gunjan Dhule, Chetan Khadilkar, Ritika Agrawal, Rahul Morris, Nekita Chavhan G H Rasioni College of Engineering IOT Cyber Security Department of Data Science Nagpur India
Agriculture has always been a fundamental aspectof Indian culture, making it the country's most efficient andimportant occupation. Over the years, smart and advanced techniques have been developed to optimize farm... 详细信息
来源: 评论
Credit Card Fraud Detection Using Machine Learning Techniques  1
Credit Card Fraud Detection Using Machine Learning Technique...
收藏 引用
1st International Conference on Advances in Electrical, Electronics and Computational Intelligence, ICAEECI 2023
作者: Murkute, Purvi Dhule, Chetan Lipte, Praneti Agrawal, Rahul Chavhan, Nekita G H Raisoni College of Engineering Department of Data Science IOT Cyber Security Nagpur India
Due to the advancement of online transactions also widespread usage of credit cards for electronic payments, credit card fraud had major concerns in the financial sectors. Efficient and effective fraud detection techn... 详细信息
来源: 评论
CNN-BO-LSTM: an ensemble framework for prognosis of liver cancer
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 1103-1109页
作者: K N, Sunil Kumar Kashyap, Pavan P. Bhyratae, Darshan A. Bhyratae, Suhas A. Kalaivani, A. Department of ISE Sri Venkateshwara College of Engineering Bangalore India Department of Electronics & amp Communication Engineering Sri Venkateshwara College of Engineering Bangalore India Computer Science and Engineering Sahyadri College of Engineering and Management Mangaluru India Department of MCA New Horizon College of Engineering Marathahalli Bangalore India Department of CSE-Cyber Security Sri Venkateshwara College of Engineering Bangalore India
computer-assisted diagnosis (CAD) is preferred for cancer identification across the globe, which relies on computerized image processing. The creation of previous CAD instruments involved a semi-automated approach tha... 详细信息
来源: 评论
Customer Segmentation Based on E-Commerce using K-Mean Clustering
Customer Segmentation Based on E-Commerce using K-Mean Clust...
收藏 引用
2023 International Conference on Recent Advances in science and engineering Technology, ICRASET 2023
作者: Bhimarapu, Harshita Bhelkar, Sakshi Chavhan, Nekita Dhule, Chetan Agrawal, Rahul G H Raisoni College of Engineering Department of Data Science IOT Cyber Security Nagpur India
Due to the increasing growth of customers in market, there is fierce competition in business. Relationships between businesses and customer will be strengthened by understanding customer needs. The importance of givin... 详细信息
来源: 评论
Perception System of Autonomous Vehicles: Sophisticated Attacks, Defense Strategies, and Future Directions  15
Perception System of Autonomous Vehicles: Sophisticated Atta...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Neethu, M.R. Remyakrishnan, P. Mukesh, Sa Barath Kumar, J. Royal, Ala Manas Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore641112 India Amrita Vishwa Vidyapeetham TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore641112 India
The advent of autonomous vehicles marks a significant milestone in the evolution of automotive technologies. Central to the operation of autonomous vehicles is the perception system that interprets the surroundings an... 详细信息
来源: 评论