咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是171-180 订阅
排序:
An efficient scalar multiplication algorithm on Koblitz curves using τ3-NAF
收藏 引用
International Journal of security and Networks 2022年 第4期17卷 240-246页
作者: Ganesh, Ponnuru Surya Padmavathy, R. Pinapati, Anil Computer Science and Information Security NIT Warangal India Department of Computer Science and Engineering NIT Warangal India Department of Computer Science and Engineering NIT Calicut India
Elliptic curve cryptography (ECC) is an efficient and widely used public-key cryptosystem. It uses relatively shorter keys compared to conventional cryptosystems hence offering faster computation. The efficiency of EC... 详细信息
来源: 评论
An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities
收藏 引用
Frontiers of computer science 2023年 第4期17卷 83-96页
作者: Muazzam MAQSOOD Sadaf YASMIN Saira GILLANI Maryam BUKHARI Seungmin RHO Sang-Soo YEO Department of Computer Science COMSATS University IslamabadAttock CampusAttock 43600Pakistan Department of Computer Science Bahria UniversityLahore 54600Pakistan Department of Industrial Security Chung-Ang UniversitySeoul 06974Republic of Korea Department of Computer Engineering Mokwon UniversityDaejeon 35349Republic of Korea
Innovations on the Internet of Everything(IoE)enabled systems are driving a change in the settings where we interact in smart units,recognized globally as smart city ***,intelligent video-surveillance systems are crit... 详细信息
来源: 评论
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the... 详细信息
来源: 评论
A Novel Approach for Anomaly Detection using Snort Integrated with Machine Learning  18
A Novel Approach for Anomaly Detection using Snort Integrate...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Preethi, T. Reddy, Ponnuru Rakshitha Likhitha, Lekkala Kumar, Pendyala Pavan Kamani, Abhinav Vnr Vignana Jyothi Institute of Engineering and Technology Data Science and Artificial Intelligence & Data Science Department of Cse - Cyber Security Hyderabad India
In today's digital world, it is crucial to keep a company's information safe from cyber threats. With new and more sophisticated network attacks emerging all the time, better security measures and ways to moni... 详细信息
来源: 评论
A Deepfake Image Classifier System for real and Doctored Image Differentiation  7
A Deepfake Image Classifier System for real and Doctored Ima...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Thomas, Juanith Mathew Ebenezer, V. Richard, Rohan Paul Karunya Institute of Technology And Sciences Division of Computer Science And Engineering Coimbatore India Karunya Institute of Technology And Sciences Division of Data Science And Cyber Security Coimbatore India
The sudden proliferation of deepfake technology has raised concerns about the authenticity and integrity of digital media. In response to these concerns, this paper presents a Deepfake image classifier system designed... 详细信息
来源: 评论
Knee Osteoarthritis Detection Using X-Rays and DNN  3
Knee Osteoarthritis Detection Using X-Rays and DNN
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Sinha, Vaishnawi Veemaraj, Ebenezer Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Tamil Nadu Coimbatore India Division of Data Science and Cyber Security Tamil Nadu Coimbatore India
Knee osteoarthritis (OA) is a prevalent degenerative joint disease that affects millions worldwide, leading to pain, disability, and reduced quality of life. Early detection and intervention are crucial for effective ... 详细信息
来源: 评论
Machine Learning for Smart Agriculture: A Comprehensive Survey
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2568-2588页
作者: Mahmood, M. Rezwanul Matin, Mohammad Abdul Goudos, Sotirios K. Karagiannidis, George North South University Department of Electrical and Computer Engineering Dhaka1229 Bangladesh Aristotle University of Thessaloniki ELEDIA@AUTH Department of Physics Thessaloniki54124 Greece Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Thessaloniki54124 Greece Cyber Security Systems and Applied AI Research Center Beirut1102 2801 Lebanon
As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and e... 详细信息
来源: 评论
Machine Learning for Detecting Subtle Signs of EyeDisease  4
Machine Learning for Detecting Subtle Signs of EyeDisease
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Dafny Neola, J. Ebenezer, V. Edwin, E.Bijolin Kirubakaran, S.Stewart Thanka, M.Roshni Yona Davincy, R. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security Coimbatore India
Eye disorders can have serious repercussions, such as blindness or visual impairment, if they are not identified or addressed, Treatment that works and preventing permanent harm depend on early diagnosis and predictio... 详细信息
来源: 评论
VGG-16 based Deep Learning Approach for Plant Species Detection
VGG-16 based Deep Learning Approach for Plant Species Detect...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Praveen, Bandi Isravel, Deva Priya Malar Dhas, Julia Punitha Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India
Automated plant species detection has gained interest due to the potential benefits in agriculture to significantly increase crop yields, decrease the use of chemicals, and promote sustainable agriculture practices. A... 详细信息
来源: 评论
Guardian of the Ensembles: Introducing Pairwise Adversarially Robust Loss for Resisting Adversarial Attacks in DNN Ensembles
Guardian of the Ensembles: Introducing Pairwise Adversariall...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Shukla, Shubhi Dalui, Subhadeep Alam, Manaar Datta, Shubhajit Mondal, Arijit Mukhopadhyay, Debdeep Chakrabarti, Partha Pratim Centre for Computational and Data Sciences Iit Kharagpur India Iit Kharagpur Computer Science and Engineering Department India Center for Cyber Security New York University Abu Dhabi United Arab Emirates Iit Kharagpur Department of Artificial Intelligence India Iit Patna Computer Science and Engineering Department India
Adversarial attacks rely on transferability, where an adversarial example (AE) crafted on a surrogate classifier tends to mislead a target classifier. Recent ensemble methods demonstrate that AEs are less likely to mi... 详细信息
来源: 评论