咨询与建议

限定检索结果

文献类型

  • 4,381 篇 会议
  • 2,970 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,429 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,617 篇 工学
    • 3,605 篇 计算机科学与技术...
    • 2,994 篇 软件工程
    • 1,230 篇 信息与通信工程
    • 653 篇 控制科学与工程
    • 591 篇 电气工程
    • 527 篇 生物工程
    • 389 篇 电子科学与技术(可...
    • 322 篇 网络空间安全
    • 291 篇 生物医学工程(可授...
    • 269 篇 机械工程
    • 239 篇 安全科学与工程
    • 211 篇 光学工程
    • 176 篇 仪器科学与技术
    • 171 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 153 篇 化学工程与技术
  • 1,946 篇 理学
    • 1,046 篇 数学
    • 572 篇 生物学
    • 374 篇 物理学
    • 339 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 162 篇 化学
  • 1,198 篇 管理学
    • 755 篇 管理科学与工程(可...
    • 504 篇 图书情报与档案管...
    • 366 篇 工商管理
  • 393 篇 法学
    • 254 篇 社会学
    • 148 篇 法学
  • 311 篇 医学
    • 252 篇 临床医学
    • 232 篇 基础医学(可授医学...
  • 160 篇 经济学
    • 159 篇 应用经济学
  • 74 篇 农学
  • 58 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 255 篇 accuracy
  • 240 篇 deep learning
  • 213 篇 security
  • 207 篇 machine learning
  • 195 篇 internet of thin...
  • 195 篇 feature extracti...
  • 176 篇 authentication
  • 168 篇 training
  • 163 篇 computational mo...
  • 139 篇 privacy
  • 138 篇 cryptography
  • 133 篇 real-time system...
  • 128 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 108 篇 artificial intel...
  • 101 篇 support vector m...
  • 100 篇 cloud computing
  • 94 篇 data privacy
  • 94 篇 encryption

机构

  • 221 篇 school of cyber ...
  • 182 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 89 篇 school of cyber ...
  • 78 篇 college of cyber...
  • 60 篇 department of co...
  • 57 篇 school of comput...
  • 52 篇 school of comput...
  • 51 篇 key laboratory o...
  • 49 篇 department of co...
  • 46 篇 school of cyber ...
  • 45 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 school of cyber ...
  • 40 篇 school of inform...
  • 39 篇 school of comput...
  • 37 篇 state key labora...
  • 34 篇 department of co...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 61 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 26 篇 mohammad kamrul ...
  • 23 篇 wang wei
  • 23 篇 hai jin
  • 23 篇 cao xiaochun
  • 22 篇 hu shengshan
  • 22 篇 weng jian
  • 21 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,967 篇 英文
  • 398 篇 其他
  • 61 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7429 条 记 录,以下是41-50 订阅
排序:
PPO-Based Mobile Robot Path Planning with Dense Bootstrap Reward in Partially Observable Environments  21
PPO-Based Mobile Robot Path Planning with Dense Bootstrap Re...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Shujie, Zhou School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu611731 China
Path planning in large, complex environments poses significant challenges, as a single robot must efficiently navigate to its target while avoiding obstacles. Traditional algorithms often struggle to balance computati... 详细信息
来源: 评论
The Role of AI in Vehicle-to-Infrastructure Communication for Tolling Systems
The Role of AI in Vehicle-to-Infrastructure Communication fo...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Mahalakshmi, S. Baskaran, Nithiya Partheeban, Pachaivanna Krishnara, Kowsalyadevi Arjun, S. Chennai Institute of Technology Department of Computer Science and Engineering Kundrathur Chennai India Chennai Institute of Technology Department Cyber Security Kundrathur Chennai India Chennai Institute of Technology Department Civil EngDepartment Cyber Security Kundrathur Chennai India Sona Institute of Technology Department of Cyber Security Salem India
The number of vehicles people use is substantial;thus, surveillance must be accurate. License plates are detected and recognized by detecting static and real-time images captured by the camera using OCR technology, Co... 详细信息
来源: 评论
MODELGUARD: Information-Theoretic Defense Against Model Extraction Attacks  33
MODELGUARD: Information-Theoretic Defense Against Model Extr...
收藏 引用
33rd USENIX security Symposium, USENIX security 2024
作者: Tang, Minxue Dai, Anna DiValentin, Louis Ding, Aolin Hass, Amin Gong, Neil Zhenqiang Chen, Yiran Li, Hai Department of Electrical and Computer Engineering Duke University United States Cyber Security Lab Accenture
Malicious utilization of a query interface can compromise the confidentiality of ML-as-a-Service (MLaaS) systems via model extraction attacks. Previous studies have proposed to perturb the predictions of the MLaaS sys... 详细信息
来源: 评论
FEDA: Private-Preserving Data Aggregation for Smart Grid via Functional Encryption  21
FEDA: Private-Preserving Data Aggregation for Smart Grid via...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Zhenjiang, Li Hongwei, Li Xinyuan, Qian School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu611731 China
Privacy-preserving data aggregation (P2DA) is a technique that enables the simultaneous availability of data and the preservation of privacy in smart grid systems. However, existing methods are only capable of fulfill... 详细信息
来源: 评论
Coronary Heart Disease Prediction Using CNN, RNN, LSTM and Attention DNN Model
Coronary Heart Disease Prediction Using CNN, RNN, LSTM and A...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Dhawale, Hrutuja Thakare, Dhanashree Dhule, Chetan Agrawal, Rahul Morris, Nekita Chavan IOT Cyber Security GH Raisoni College of Engineering Department of Data Science Nagpur India
Coronary Heart Disease popularly referred to as CHD is one of the leading causes of death and illness across the global population making it imperative for the identification of an effective approach to its predictive... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Machine Learning for Threat Detection
Machine Learning for Threat Detection
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Sutanto, Dustin Fransisca, Febri Liem, Steven Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila School of Computer Science Cyber Security Program Computer Science Department Bina Nusantara Jakarta Indonesia School of Computer Science Computer Science Program Computer Science Department Bina Nusantara Jakarta Indonesia
These days almost all people in the world use the Internet as the internet is constantly evolving. cyber attack scale are increased thanks to cybercriminals that have become sophisticated in employing threats. Since t... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
security Challenges and Issues in Cloud Computing
Security Challenges and Issues in Cloud Computing
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Zakiyyah, Rika Permana, Daniel Valenecio, Devan Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila Cyber Security Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia Computer Science Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论