咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 3,010 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,696 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,026 篇 软件工程
    • 1,252 篇 信息与通信工程
    • 681 篇 控制科学与工程
    • 608 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 333 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,959 篇 理学
    • 1,055 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 340 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 314 篇 医学
    • 255 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 163 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 202 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 173 篇 training
  • 168 篇 computational mo...
  • 143 篇 privacy
  • 138 篇 cryptography
  • 135 篇 real-time system...
  • 135 篇 protocols
  • 122 篇 blockchain
  • 121 篇 predictive model...
  • 111 篇 artificial intel...
  • 102 篇 support vector m...
  • 101 篇 cloud computing
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 232 篇 school of cyber ...
  • 194 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 83 篇 college of cyber...
  • 62 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 46 篇 college of compu...
  • 43 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 39 篇 school of inform...
  • 34 篇 state key labora...
  • 33 篇 department of co...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 34 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 chen kai
  • 21 篇 cao xiaochun
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 hai jin
  • 19 篇 dehghantanha ali

语言

  • 6,346 篇 英文
  • 1,168 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7574 条 记 录,以下是151-160 订阅
排序:
Intermittent Fault Diagnosis of Split-Star Networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, Issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Application of Support Vector Machine to Lassa Fever Diagnosis
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 165-177页
作者: Nwankwo, Wilson Adigwe, Wilfred Umezuruike, Chinecherem Acheme, Ijegwa D. Nwankwo, Chukwuemeka Pascal Ojei, Emmanuel Oghorodi, Duke Department of Computer Science Edo State University Uzairue Nigeria Department of Computer Science Delta State University of Science and Technology Ozoro Nigeria College of Computing and Communication Studies Bowen University Iwo Nigeria Department of Software Engineering Delta State University of Science and Technology Ozoro Nigeria Department of Cyber Security Delta State University of Science and Technology Ozoro Nigeria
Lassa fever is a type of viral hemorrhagic fever with high fatality rate. Precise and prompt diagnosis and successful treatment of this disease is very important in the control and prevention of the spread as unrestri... 详细信息
来源: 评论
HoLens:A visual analytics design for higher-order movement modeling and visualization
收藏 引用
Computational Visual Media 2024年 第6期10卷 1079-1100页
作者: Zezheng Feng Fang Zhu Hongjun Wang Jianing Hao Shuang-Hua Yang Wei Zeng Huamin Qu Department of Computer Science and Engineering The Hong Kong University of Science and TechnologyHong KongChina Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Thrust of Computational Media and Arts(CMA) The Hong Kong University of Science and Technology(Guangzhou)Guangzhou 511458China Department of Computer Science University of ReadingBerkshire RG66AHUK Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and TechnologyShenzhen 518055China
Higher-order patterns reveal sequential multistep state transitions,which are usually superior to origin-destination analyses that depict only first-order geospatial movement *** methods for higher-order movement mode... 详细信息
来源: 评论
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding  2
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Recep...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Waseem, Ahsan Kamil, Mohd Azhan Umar Bhardwaj, Abhisehek Razim, Abdul Qadeer, Mohammed Abdul Ghazal, Taher M. Aligarh Muslim University Department Of Electrical Engineering Aligarh India Aligarh Muslim University Department Of Computer Engineering Aligarh India Stony Brook University Department Of Electrical And Computer Engineering New York United States Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
This study examines the growing number of satellites, this paper explores the importance of satellite tracking and highlights NOAA-15 for information transmission and weather monitoring. It offers a low-cost configura... 详细信息
来源: 评论
Efficient and Secure Federated Knowledge Transfer Under Non-IID Settings in IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24644-24655页
作者: Liu, Shuying Xie, Rongpeng Miao, Yinbin Peng, Jinye Leng, Tao Liu, Zhiquan Choo, Kim-Kwang Raymond Northwest University School of Information Science and Technology Xi’an710119 China Xian Yang Normal University Department of Computer Xian Yang712000 China Xidian University School of Cyber Engineering Xi’an710071 China Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province Luzhou646000 China Jinan University College of Cyber Security Guangzhou510632 China Technology Ltd Beijing100020 China The University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
In the era of Internet of Things (IoT) and Federated Learning (FL), where distributed training models are essential, the FL paradigm has come into the spotlight for researchers. However, the inconsistency in the sourc... 详细信息
来源: 评论
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Towards a User-Friendly Web Application Firewall  11
Towards a User-Friendly Web Application Firewall
收藏 引用
11th IEEE International Conference on Intelligent Computing and Information Systems, ICICIS 2023
作者: Omar, Fatima Ahmed, Dalia Elnakib, Omar Ahmed, Mohamed Farhan, Nada Hindy, Hanan Abdel-Hamid, Mahmoud Badawi, Yehia Ain Shams University Faculty of Computer and Information Science Cyber Security Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Computer Systems Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Cyber Security Department Giza Egypt Ain Shams University Faculty of Computer and Information Science Computer Science Department Cairo Egypt
Web Application Firewall (WAF) systems play a vital role in protecting web applications from various security vulnerabilities. However, existing WAF solutions are often costly and complex to configure, limiting their ... 详细信息
来源: 评论
A Traceable Privacy-Preserving Transaction Protocol With Evolutionary Threshold Authentication
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20787-20799页
作者: Xie, Ninghai Li, Jiguo Lin, Chao Zhang, Yichen Shen, Jian Fujian Normal University College of Computer and Cyber Security Fuzhou350117 China School of Mathematics and Statistics Key Laboratory of Analytical Mathematics and Applications Ministry of Education Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Guangzhou University Guangdong Key Laboratory of Blockchain Security Guangzhou510006 China Zhejiang Sci-Tech University School of Information Science and Engineering Hangzhou310018 China
Decentralized payment systems, such as Bitcoin, enable immutable and transparent payments in a distributed manner. To address the issue of user privacy leakage due to transaction transparency, some efforts have enhanc... 详细信息
来源: 评论
Password Strength Classification Using Machine Learning Methods  7
Password Strength Classification Using Machine Learning Meth...
收藏 引用
7th Edition Global Conference on Wireless and Optical Technologies, GCWOT 2024
作者: Rehman, Habiba Ahmed, Adnan Hussain, Athar Umar, Muhamamd Siraj, Mohammad Ahmed, Waqas Muhamnad, Mir Rehman, Eesha Quaid-e-Awam University of Engineering Science and Technology Department of Computer Science Nawabshah Pakistan Quaid-e-Awam University of Engineering Science and Technology Department of Cyber Security Nawabshah Pakistan College of Engineering King Saud University Electrical Engineering Department Riyadh11421 Saudi Arabia
Passwords remain a critical component of authentication systems due to their ease of implementation, despite the availability of more secure methods such as biometrics and smart cards. However, password-based systems ... 详细信息
来源: 评论