咨询与建议

限定检索结果

文献类型

  • 4,462 篇 会议
  • 3,037 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,747 篇 工学
    • 3,707 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,267 篇 信息与通信工程
    • 710 篇 控制科学与工程
    • 622 篇 电气工程
    • 528 篇 生物工程
    • 400 篇 电子科学与技术(可...
    • 336 篇 网络空间安全
    • 294 篇 生物医学工程(可授...
    • 276 篇 机械工程
    • 248 篇 安全科学与工程
    • 215 篇 光学工程
    • 181 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 171 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,975 篇 理学
    • 1,058 篇 数学
    • 578 篇 生物学
    • 381 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 251 篇 系统科学
    • 168 篇 化学
  • 1,224 篇 管理学
    • 770 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 257 篇 社会学
    • 150 篇 法学
  • 315 篇 医学
    • 254 篇 临床医学
    • 235 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 161 篇 应用经济学
  • 78 篇 农学
  • 59 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 250 篇 deep learning
  • 220 篇 security
  • 209 篇 machine learning
  • 197 篇 feature extracti...
  • 196 篇 internet of thin...
  • 180 篇 authentication
  • 169 篇 training
  • 165 篇 computational mo...
  • 141 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 124 篇 blockchain
  • 118 篇 predictive model...
  • 107 篇 artificial intel...
  • 101 篇 support vector m...
  • 100 篇 cloud computing
  • 96 篇 data privacy
  • 93 篇 wireless sensor ...

机构

  • 229 篇 school of cyber ...
  • 190 篇 institute of inf...
  • 97 篇 school of cyber ...
  • 92 篇 school of cyber ...
  • 79 篇 college of cyber...
  • 60 篇 school of comput...
  • 60 篇 department of co...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 46 篇 college of compu...
  • 44 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 40 篇 school of inform...
  • 32 篇 peng cheng labor...
  • 32 篇 state key labora...
  • 31 篇 school of comput...
  • 31 篇 southeast univer...

作者

  • 61 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 26 篇 mohammad kamrul ...
  • 25 篇 hu shengshan
  • 25 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 hai jin
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 cao xiaochun
  • 20 篇 liu yang
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,832 篇 英文
  • 680 篇 其他
  • 69 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering - Cyber Security"
7577 条 记 录,以下是61-70 订阅
排序:
CSA4Rec: Collaborative Signals Augmentation Model Based on GCN for Recommendation  25th
CSA4Rec: Collaborative Signals Augmentation Model Based on ...
收藏 引用
25th International Conference on Web Information Systems engineering, WISE 2024
作者: Liu, Haibo Yu, Lianjie Si, Yali Liu, Jinglian School of Cyber Security and Computer Hebei University Baoding Baoding China School of Computer Science and Engineering Changshu Institute of Technology Suzhou China
Graph Convolution Network (GCN) is a potent deep learning methodology and GCN-based graph data augmentation methods excel in recommender systems. The augmented data, as the higher-order collaborative signals, is gener... 详细信息
来源: 评论
Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1093-1105页
作者: Rupo Ma Siping Gao College of Command and Control Engineering Army Engineering UniversityNanjing210007China Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Department of Electrical and Computer Engineering National University of Singapore119260Singapore
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is ... 详细信息
来源: 评论
Evaluation of Traditional and Modern Inpainting Algorithms for Image Restoration  11
Evaluation of Traditional and Modern Inpainting Algorithms f...
收藏 引用
11th International Conference on Information Technology, computer and Electrical engineering, ICITACEE 2024
作者: Kurniawan, Aditya Thjahyadi, Kirsten Winther Trinita, Vinny Surya School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia School of Computer Science Bina Nusantara University Cyber Security Jakarta Indonesia
Image restoration remains a critical area of study in digital forensics and computer vision, requiring dependable tools to reconstruct missing or damaged parts of images. Four prominent inpainting algorithms, such as ... 详细信息
来源: 评论
security, Trust, and Privacy in cyber-physical Systems (CPS)  2
Security, Trust, and Privacy in Cyber-physical Systems (CPS)
收藏 引用
2nd International Conference on cyber Physical Systems, Power Electronics and Electric Vehicles, ICPEEV 2024
作者: Busari, Wareez A. Bello, Abeeb A. Department of Cyber Security Science Federal University of Technology Niger State Minna Nigeria Department of Electrical and Computer Engineering Mahindra University Hyderabad India
This paper explores the convergence of physical and computational components in cyber-Physical Systems (CPS). security, trust, and privacy are paramount for reliable and resilient operation of these interconnected sys... 详细信息
来源: 评论
Ensemble of deep learning models with Walrus Optimization Algorithm for accurate botnet recognition and classification
收藏 引用
Iran Journal of computer science 2025年 1-18页
作者: Chacko, Ashwathy Anda Edwin, E. Bijolin Thanka, M. Roshni Ebenezer, V. Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The rapid growth of Internet of Things (IoT) networks has introduced significant security challenges, with botnet attacks being one of the most prevalent threats. These attacks exploit vulnerabilities in IoT devices, ... 详细信息
来源: 评论
Unleashing the power of pseudo-code for binary code similarity analysis
收藏 引用
cybersecurity 2023年 第2期6卷 44-61页
作者: Weiwei Zhang Zhengzi Xu Yang Xiao Yinxing Xue School of Computer Science and Engineering University of Science and Technology of ChinaHefeiChina School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most... 详细信息
来源: 评论
Randomization Strategies in Image Steganography Techniques:A Review
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3139-3171页
作者: AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)BangiSelangor43600Malaysia Department of Information and Communication Engineering Pabna University of Science and TechnologyPabna6600Bangladesh
Image steganography is one of the prominent technologies in data hiding *** system performance mostly depends on the embedding *** goal is to embed strictly confidential information into images without causing percept... 详细信息
来源: 评论
Privacy-Enhanced Federated Learning Through Homomorphic Encryption With Cloud Federation  22
Privacy-Enhanced Federated Learning Through Homomorphic Encr...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Xie, Qiqi Zhang, Hong Wang, Miao Wu, Wanqing Sun, Zhibo Hebei University School of Cyber Security and Computer Baoding China Drexel University Department of Computer Science Philadelphia United States
With the exponential growth of data at edge environments, federated learning has emerged. Nevertheless, it encounters persistent challenges in defending against malicious attacks, such as inference attacks and reconst... 详细信息
来源: 评论
Implementing Three Factors Authentication System (3FA) to Maintain Employee Attendance Record to Enhance security  3
Implementing Three Factors Authentication System (3FA) to Ma...
收藏 引用
3rd IEEE International Conference on Intelligent Technologies, CONIT 2023
作者: Johnson, Plezzant Columbus Kant, Shri Kumar, Sandeep Sharda University Department of Computer Science Engineering India Sharda University Center for Cyber Security and Cryptology India
Today as we all know that maintaining of employee credential have been some major issues around the world. Finding it more difficult to keep track of employees. With this, the company, institution, or government entit... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论