咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 3,010 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,696 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,026 篇 软件工程
    • 1,252 篇 信息与通信工程
    • 681 篇 控制科学与工程
    • 608 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 333 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,959 篇 理学
    • 1,055 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 340 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 314 篇 医学
    • 255 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 163 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 202 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 173 篇 training
  • 168 篇 computational mo...
  • 143 篇 privacy
  • 138 篇 cryptography
  • 135 篇 real-time system...
  • 135 篇 protocols
  • 122 篇 blockchain
  • 121 篇 predictive model...
  • 111 篇 artificial intel...
  • 102 篇 support vector m...
  • 101 篇 cloud computing
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 232 篇 school of cyber ...
  • 194 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 83 篇 college of cyber...
  • 62 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 46 篇 college of compu...
  • 43 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 39 篇 school of inform...
  • 34 篇 state key labora...
  • 33 篇 department of co...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 34 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 chen kai
  • 21 篇 cao xiaochun
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 hai jin
  • 19 篇 dehghantanha ali

语言

  • 6,346 篇 英文
  • 1,168 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7574 条 记 录,以下是231-240 订阅
排序:
Detecting cross-site scripting attacks using machine learning: A systematic review
Detecting cross-site scripting attacks using machine learnin...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Baniya, D. Amrita Chaudhary, A. Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ... 详细信息
来源: 评论
Credit Card Fraud Detection Using Machine Learning Techniques  1
Credit Card Fraud Detection Using Machine Learning Technique...
收藏 引用
1st International Conference on Advances in Electrical, Electronics and Computational Intelligence, ICAEECI 2023
作者: Murkute, Purvi Dhule, Chetan Lipte, Praneti Agrawal, Rahul Chavhan, Nekita G H Raisoni College of Engineering Department of Data Science IOT Cyber Security Nagpur India
Due to the advancement of online transactions also widespread usage of credit cards for electronic payments, credit card fraud had major concerns in the financial sectors. Efficient and effective fraud detection techn... 详细信息
来源: 评论
Design of Smart Irrigation System Based on MLA
Design of Smart Irrigation System Based on MLA
收藏 引用
2023 IEEE World Conference on Applied Intelligence and Computing, AIC 2023
作者: Bobade, Gunjan Dhule, Chetan Khadilkar, Ritika Agrawal, Rahul Morris, Nekita Chavhan G H Rasioni College of Engineering IOT Cyber Security Department of Data Science Nagpur India
Agriculture has always been a fundamental aspectof Indian culture, making it the country's most efficient andimportant occupation. Over the years, smart and advanced techniques have been developed to optimize farm... 详细信息
来源: 评论
CNN-BO-LSTM: an ensemble framework for prognosis of liver cancer
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 1103-1109页
作者: K N, Sunil Kumar Kashyap, Pavan P. Bhyratae, Darshan A. Bhyratae, Suhas A. Kalaivani, A. Department of ISE Sri Venkateshwara College of Engineering Bangalore India Department of Electronics & amp Communication Engineering Sri Venkateshwara College of Engineering Bangalore India Computer Science and Engineering Sahyadri College of Engineering and Management Mangaluru India Department of MCA New Horizon College of Engineering Marathahalli Bangalore India Department of CSE-Cyber Security Sri Venkateshwara College of Engineering Bangalore India
computer-assisted diagnosis (CAD) is preferred for cancer identification across the globe, which relies on computerized image processing. The creation of previous CAD instruments involved a semi-automated approach tha... 详细信息
来源: 评论
Fake News Detection Using Machine Learning Algorithm  2
Fake News Detection Using Machine Learning Algorithm
收藏 引用
2nd IEEE International Conference on Communication, security and Artificial Intelligence, ICCSAI 2023
作者: Narkhede, Apurva Patharkar, Devyani Chavan, Nekita Agrawal, Rahul Dhule, Chetan Iot Cyber Security G H Raisoni College of Engineering Department of Data Science Nagpur India
Fake news is a big concern since it spreads widely over social media and other media channels, creating significant social and national damage with devastating consequences. In order to address this issue, substantial... 详细信息
来源: 评论
Customer Segmentation Based on E-Commerce using K-Mean Clustering
Customer Segmentation Based on E-Commerce using K-Mean Clust...
收藏 引用
2023 International Conference on Recent Advances in science and engineering Technology, ICRASET 2023
作者: Bhimarapu, Harshita Bhelkar, Sakshi Chavhan, Nekita Dhule, Chetan Agrawal, Rahul G H Raisoni College of Engineering Department of Data Science IOT Cyber Security Nagpur India
Due to the increasing growth of customers in market, there is fierce competition in business. Relationships between businesses and customer will be strengthened by understanding customer needs. The importance of givin... 详细信息
来源: 评论
Perception System of Autonomous Vehicles: Sophisticated Attacks, Defense Strategies, and Future Directions  15
Perception System of Autonomous Vehicles: Sophisticated Atta...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Neethu, M.R. Remyakrishnan, P. Mukesh, Sa Barath Kumar, J. Royal, Ala Manas Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore641112 India Amrita Vishwa Vidyapeetham TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore641112 India
The advent of autonomous vehicles marks a significant milestone in the evolution of automotive technologies. Central to the operation of autonomous vehicles is the perception system that interprets the surroundings an... 详细信息
来源: 评论
Encryption Using Residue Number System: Research Trends and Future Challenges  14
Encryption Using Residue Number System: Research Trends and ...
收藏 引用
14th International Conference on Advanced computer Information Technologies, ACIT 2024
作者: Shevchuk, Ruslan Yakymenko, Igor Kasianchuk, Mykhailo West Ukrainian National University Department of Computer Science Ternopil Ukraine University of Bielsko-Biala Department of Computer Science and Automatics Bielsko-Biala Poland Ukrainian National University Department of Cyber Security West Ternopil Ukraine
This paper presents a comprehensive knowledge mapping and in-depth analysis of the application of residue number system in encryption technique research to understand better global trends and directions in this field ... 详细信息
来源: 评论
Polynomial sharings on two secrets: Buy one, get one free
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024年 第3期2024卷 671-706页
作者: Arnold, Paula Berndt, Sebastian Eisenbarth, Thomas Orlt, Maximilian Institute for IT security University of Lübeck Lübeck Germany Department of Electrical Engineering and Computer Science Technische Hochschule Lübeck Lübeck Germany Department of Computer Science TU Darmstadt Darmstadt Germany University of Lübeck Germany
While passive side-channel attacks and active fault attacks have been studied intensively in the last few decades, strong attackers combining these attacks have only been studied relatively recently. Due to its simpli... 详细信息
来源: 评论
Shared Resource Entanglement Attacks against Serverless Computing
Shared Resource Entanglement Attacks against Serverless Comp...
收藏 引用
2024 IEEE Conference on Communications and Network security, CNS 2024
作者: Cui, Yuwen Wei, Mingkui Lu, Zhuo Liu, Yao University of South Florida Department of Computer United States George Mason University Department of Cyber Security Engineering United States University of South Florida Department of Electrical Engineering United States
Serverless computing has emerged as a popular paradigm for building and deploying applications in the cloud. At the heart of this paradigm lies the concept of serverless functions, which have gained significant popula... 详细信息
来源: 评论