咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是121-130 订阅
排序:
A Super Learner Ensemble-based Intrusion Detection System to Mitigate Network Attacks  5
A Super Learner Ensemble-based Intrusion Detection System to...
收藏 引用
5th International Conference on Data Analytics for Business and Industry, ICDABI 2024
作者: Ajayi, Ojo John Sodiya, Adesina Simon Bagiwa, Mustapha Aminu Olowookere, Toluwase Ayobami Department of Cyber Security Abuja Nigeria Federal University of Agriculture Department of Computer Science Abeokuta Nigeria Ahmadu Bello University Department of Computer Science Zaria Nigeria Redeemer's University Department of Computer Science Ede Nigeria
Governments and corporate institutions are now mostly reliant on integrated digital infrastructures. These digital infrastructures are usually targets of cyber threats such as intrusion, for which intrusion detection ... 详细信息
来源: 评论
Unveiling the Nexus: Exploring the Societal Implications of AI-Driven cybersecurity and Data Analysis  13
Unveiling the Nexus: Exploring the Societal Implications of ...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Arif, Mohd Ahmad, Shahnawaz Nazim, Mohd Ahmad, Javed Onyarin, Ogala Justin Galgotias University Department of Computer Science Engineering and Technology Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Noida Institute of Engineering and Technology Department of Computer Science Greater Noida India University of Delta Pmb Cyber Security Department Delta State Agbor2090 Nigeria
AI when integrated with cybersecurity and data analysis forms a new field that will have great impact on the society. The present research focuses on the social consequences of integrating AI for cybersecurity and big... 详细信息
来源: 评论
Crime Against Women in India: Statistical Analysis Using Linear Regression  2
Crime Against Women in India: Statistical Analysis Using Lin...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Mim, Zarin Tasnim Paul, Rittika Foysal, Mollah Md Tohfa, Fairuz Nowshin Mahi, Shah Abrar Bangalore India Bangalore India B-Tech of Computer Science and Engineering East Delta University Chattagram Bangladesh B-Tech of Computer Science and Engineering-Cyber Security Chandigarh University Delhi India
The crime reports of offenses occurring against women all over India are increasing day by day. It has become one of today's most concerning socio-economic and cultural issues. Crime against women hampers the over... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Designing Biometric Automated Teller Machine: Opportunities and Challenges  4
Designing Biometric Automated Teller Machine: Opportunities ...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Bastos, João Baptista Muchinenyika, Simon Hlekisana Shava, Fungai Bhunu Nyambuya, Tanaka Mamvura Namibia University of Science and Technology Cyber Security Department Windhoek Namibia Namibia University of Science and Technology Software Engineering Department Windhoek Namibia
The increasing sophistication of fraud in the financial sector, particularly in Automated Teller Machine (ATM) transactions, demands advanced security measures to protect users and their accounts. Despite the widespre... 详细信息
来源: 评论
Using dummy data for RFID tag and reader authentication
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 804-813页
作者: Baha’A.Alsaify Dale R.Thompson Abdallah Alma'aitah Jia Di Department of Network Engineering and Security Jordan University of Science and TechnologyIrbid21163Jordan Computer Science and Computer Engineering Department University of ArkansasFayetteville72701ARUSA
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent *** robust authentication of RFID system components is critical in providing trustworthy data delivery from/to *** t... 详细信息
来源: 评论
APFT: Adaptive Phoneme Filter Template to Generate Anti-Compression Speech Adversarial Example in Real-Time
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 5152-5165页
作者: Huang, Yihuan Ren, Yanzhen Sun, Zongkun Zhai, Liming Wang, Jingmin Liu, Wuyang Wuhan University School of Cyber Science and Engineering Wuhan430072 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Central China Normal University School of Computer Science Wuhan430079 China
Automatic Speech Recognition (ASR) systems are widely used for speech censoring. Speech Adversarial Example (AE) offers a novel approach to protect speech privacy by forcing ASR to mistranscribe. However, existing spe... 详细信息
来源: 评论
The Future of Recruitment: Using Deep Learning to Build Intelligent Interview Bots  15
The Future of Recruitment: Using Deep Learning to Build Inte...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Ahmad, Shahnawaz Hussain, Shahadat Wasid, Mohammed Onyarin, Ogala Justin Arif, Mohd Ahmad, Javed Bennett University School of Computer Science Engineering and Technology Greater Noida India University of Delta Cyber Security Department PMB 2090 Delta State Agbor Nigeria Galgotias University Department of Computer Science Engineering and Technology Greater Noida India Sharda University Department of Computer Science Engineering and Technology Greater Noida India
The hiring process for IT positions is often complex and time-consuming, posing significant challenges for businesses seeking to maintain consistency and efficiency. Interview scheduling is complicated by manual effor... 详细信息
来源: 评论
PriFace: a privacy-preserving face recognition framework under untrusted server
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2967-2979页
作者: Zhao, Shan Zhang, Lefeng Xiong, Ping School of Information and Safety Engineering Zhongnan University of Economics and Law Wuhan China Center for Cyber Security and Privacy School of Computer Science University of Technology Sydney Sydney Australia
Alongside the rapid development of artificial intelligence and mobile Internet, face recognition has gradually become a mainstream intelligent terminal authentication technology that is widely applied in security, fin... 详细信息
来源: 评论
A Real-Time IoT-Enabled Biometric Attendance System
A Real-Time IoT-Enabled Biometric Attendance System
收藏 引用
International Conference on. Cryptology and Network security with Machine Learning, ICCNSML 2023
作者: Tripathi, Ashish Choudhary, Arjun Srivastava, Arun Kumar Kharbas, Vikash Kumar Shukla, Varun Department of CSE SCSE Galgotias University Greater Noida India Centre for Cyber Security Sardar Patel University of Police Security and Criminal Justice Jodhpur India Department of Computer Science and Engineering Lloyd Institute of Engineering & Technology Greater Noida India Department of Computer Science and Engineering Vivekananda Global University Jaipur India Kanpur India
Nowadays, biometric attendance system is applicable in various organizations to ensure the person's identity. The system takes parameters such as person's voice, fingerprint, retina, and face to authenticate t... 详细信息
来源: 评论