咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 2,991 篇 期刊文献
  • 77 册 图书

馆藏范围

  • 7,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,694 篇 工学
    • 3,658 篇 计算机科学与技术...
    • 3,023 篇 软件工程
    • 1,249 篇 信息与通信工程
    • 679 篇 控制科学与工程
    • 606 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 179 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,957 篇 理学
    • 1,054 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 312 篇 医学
    • 254 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 262 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 203 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 168 篇 computational mo...
  • 167 篇 training
  • 139 篇 privacy
  • 136 篇 protocols
  • 136 篇 cryptography
  • 135 篇 real-time system...
  • 121 篇 predictive model...
  • 120 篇 blockchain
  • 111 篇 artificial intel...
  • 105 篇 cloud computing
  • 102 篇 support vector m...
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 235 篇 school of cyber ...
  • 193 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 94 篇 school of cyber ...
  • 82 篇 college of cyber...
  • 63 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 44 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 peng cheng labor...
  • 32 篇 department of co...
  • 31 篇 school of comput...
  • 31 篇 department of co...

作者

  • 61 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 35 篇 mohana
  • 30 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 23 篇 wang wei
  • 23 篇 cao xiaochun
  • 22 篇 weng jian
  • 21 篇 chen kai
  • 21 篇 hai jin
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 bariah lina

语言

  • 6,327 篇 英文
  • 1,167 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7554 条 记 录,以下是181-190 订阅
排序:
Knee Osteoarthritis Detection Using X-Rays and DNN  3
Knee Osteoarthritis Detection Using X-Rays and DNN
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Sinha, Vaishnawi Veemaraj, Ebenezer Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Tamil Nadu Coimbatore India Division of Data Science and Cyber Security Tamil Nadu Coimbatore India
Knee osteoarthritis (OA) is a prevalent degenerative joint disease that affects millions worldwide, leading to pain, disability, and reduced quality of life. Early detection and intervention are crucial for effective ... 详细信息
来源: 评论
An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities
收藏 引用
Frontiers of computer science 2023年 第4期17卷 83-96页
作者: Muazzam MAQSOOD Sadaf YASMIN Saira GILLANI Maryam BUKHARI Seungmin RHO Sang-Soo YEO Department of Computer Science COMSATS University IslamabadAttock CampusAttock 43600Pakistan Department of Computer Science Bahria UniversityLahore 54600Pakistan Department of Industrial Security Chung-Ang UniversitySeoul 06974Republic of Korea Department of Computer Engineering Mokwon UniversityDaejeon 35349Republic of Korea
Innovations on the Internet of Everything(IoE)enabled systems are driving a change in the settings where we interact in smart units,recognized globally as smart city ***,intelligent video-surveillance systems are crit... 详细信息
来源: 评论
A Deepfake Image Classifier System for real and Doctored Image Differentiation  7
A Deepfake Image Classifier System for real and Doctored Ima...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Thomas, Juanith Mathew Ebenezer, V. Richard, Rohan Paul Karunya Institute of Technology And Sciences Division of Computer Science And Engineering Coimbatore India Karunya Institute of Technology And Sciences Division of Data Science And Cyber Security Coimbatore India
The sudden proliferation of deepfake technology has raised concerns about the authenticity and integrity of digital media. In response to these concerns, this paper presents a Deepfake image classifier system designed... 详细信息
来源: 评论
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the... 详细信息
来源: 评论
A Novel Approach for Anomaly Detection using Snort Integrated with Machine Learning  18
A Novel Approach for Anomaly Detection using Snort Integrate...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Preethi, T. Reddy, Ponnuru Rakshitha Likhitha, Lekkala Kumar, Pendyala Pavan Kamani, Abhinav Vnr Vignana Jyothi Institute of Engineering and Technology Data Science and Artificial Intelligence & Data Science Department of Cse - Cyber Security Hyderabad India
In today's digital world, it is crucial to keep a company's information safe from cyber threats. With new and more sophisticated network attacks emerging all the time, better security measures and ways to moni... 详细信息
来源: 评论
Machine Learning for Smart Agriculture: A Comprehensive Survey
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2568-2588页
作者: Mahmood, M. Rezwanul Matin, Mohammad Abdul Goudos, Sotirios K. Karagiannidis, George North South University Department of Electrical and Computer Engineering Dhaka1229 Bangladesh Aristotle University of Thessaloniki ELEDIA@AUTH Department of Physics Thessaloniki54124 Greece Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Thessaloniki54124 Greece Cyber Security Systems and Applied AI Research Center Beirut1102 2801 Lebanon
As communication technologies and equipment evolve, smart assets become smarter. The agricultural industry is also evolving in line with the implementation of modern communication protocols, intelligent sensors, and e... 详细信息
来源: 评论
Diagnosis of Plant Leaf Disease using Vision Transformer  10
Diagnosis of Plant Leaf Disease using Vision Transformer
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Sundaraj, Ashik Isravel, Deva Priya Dhas, Julia Punitha Malar Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India
In precision agriculture, it is crucial to have a reliable system for identifying diseases and suggesting measures to maintain crop health and enhance yield performance. Addressing the persistent challenge of accurate... 详细信息
来源: 评论
Investigation of Handwritten Image-To-Speech Using Deep Learning
Investigation of Handwritten Image-To-Speech Using Deep Lear...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Manju, S. Anitha, J. Sujitha Juliet, D. Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India
In the realm of accessibility technology, this paper introduces a pioneering method for converting handwritten images to speech. The work primarily focuses on recognizing handwritten text and subsequently converting i... 详细信息
来源: 评论
Sequential Masking Imitation Learning for Handling Causal Confusion in Autonomous Driving  8th
Sequential Masking Imitation Learning for Handling Causal C...
收藏 引用
8th International Workshop on Advanced Computational Intelligence and Intelligent Informatics, IWACIII 2023
作者: Zhang, Huanghui Zheng, Zhi College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China College of Control Science and Engineering Zhejiang University Hangzhou310027 China
Training agents for autonomous driving using imitation learning seems like a promising way since its only requirement is the demonstration from expert drivers. However, causal confusion is a problem existing in imitat... 详细信息
来源: 评论
Maturity Model for Corporate Sector Based on Zero Trust Adoption  10
Maturity Model for Corporate Sector Based on Zero Trust Adop...
收藏 引用
10th International Conference on engineering and Emerging Technologies, ICEET 2024
作者: Ilyas, Muhammad Akal, Mustafa Althebyan, Qutaibah Al Ain University Department of Cyber Security Abu Dhabi United Arab Emirates Altinbas University Department of Electrical and Computer Engineering Istanbul Turkey
The rapid evolution of cybersecurity threats necessitates the adoption of robust security frameworks. One such approach gaining significant attention is the concept of zero trust, which emphasizes continuous and stron... 详细信息
来源: 评论