咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是91-100 订阅
排序:
A New Method of Free rider Attack Based on Disguise in Federated Learning  10
A New Method of Free rider Attack Based on Disguise in Feder...
收藏 引用
10th Symposium on Novel Optoelectronic Detection Technology and Applications
作者: Luo, Haibo Zhou, Rang Su, Yifei Huang, Jiajie Li, Wanpeng School of Computer Science and Cyber Security Chengdu University of Technology Chengdu China Department of Computing Science University of Aberdeen Aberdeen United Kingdom
Free-rider attacks in federated learning enable attackers to disguise their participation in the training process, enabling them to obtain the final aggregated model without contributing any data or computational reso... 详细信息
来源: 评论
RCDS:a right-confirmable data-sharing model based on symbol mapping coding and blockchain
收藏 引用
Frontiers of Information Technology & Electronic engineering 2023年 第8期24卷 1194-1213页
作者: Liang WANG Shunjiu HUANG Lina ZUO Jun LI Wenyuan LIU School of Cyber Security and Computer Hebei UniversityBaoding071000China Xiong’an Intelligent City Innovation Federation Xiong’an071700China School of Information Science and Engineering Yanshan UniversityQinhuangdao066000China
The problem of data right confirmation is a long-term bottleneck in data *** methods for confirming data rights lack credibility owing to poor supervision,and work only with specific data types because of their techni... 详细信息
来源: 评论
Framework for Cloud-Based Data Management in Autonomous Vehicles
Framework for Cloud-Based Data Management in Autonomous Vehi...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Pallapothu, Harshith Gopi Krishna, G. Sunil, Digvijay Teja Yadav, S. Nagasundari, S. Pes University Dept. of Computer Science & Engineering Bengaluru India Research Center for Information Security Forensics and Cyber Resilience Pes University Dept. of Computer Science & Engineering Bengaluru India
The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr... 详细信息
来源: 评论
Fortifying Smart Grids: A Holistic Assessment Strategy against cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data  5
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
5th International Conference on Control, Communication and Computing, ICCC 2023
作者: Varghese, Varsha Mahalakshmi, S. Senthilkumar, K.B. ER&DCI Institute of Technology Cyber Forensics and Information Security Department of Computer Science & Engineering Thiruvananthapuram India Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram India
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat... 详细信息
来源: 评论
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2119-2135页
作者: Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... 详细信息
来源: 评论
Enhanced Deep Learning Approaches for Robust Darknet Traffic Classification  3
Enhanced Deep Learning Approaches for Robust Darknet Traffic...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Etyang, Felix Pavithran, Pramod Mwendwa, Gideon Mandela, Ngaira Hillary, Musiime School of Engineering Cochin University of Science & Technology Department of Computer Science Cochin India School of Cyber Security and Digital Forensics National Forensics Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensics Sciences University Jinja Uganda
The classification of darknet traffic remains a pivotal task in modern cybersecurity efforts, necessitating advanced analytical techniques to address malicious activities pre-emptively. This study introduces and compa... 详细信息
来源: 评论
A Review on Crop Yield Prediction using Deep Learning  8
A Review on Crop Yield Prediction using Deep Learning
收藏 引用
8th International Conference on Inventive Systems and Control, ICISC 202
作者: Verma, Sheily Singh, Shubham CUC-Ulster University Department of Computer Science/ Cyber Security Doha Qatar Era Smith Technology Noida India
The integration of cutting-edge technology into agricultural practices has catalyzed a transformative shift in global agriculture. This research study focuses on the revolutionary impact of deep learning approaches on... 详细信息
来源: 评论
Blockchain-Assisted Fine-Grained Deduplication and Integrity Auditing for Outsourced Large-Scale Data in Cloud Storage
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21662-21678页
作者: Liu, Bingyun Zhang, Xiaojun Yang, Xingchun Zhang, Yuan Xue, Jingting Zhou, Rang Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu610500 China Sichuan Police College Intelligent Policing Key Laboratory of SichuanProvince Luzhou646000 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Chengdu University of Technology School of Computer Science and Cyber Security Chengdu610059 China
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing. In ... 详细信息
来源: 评论