咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 3,010 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,696 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,026 篇 软件工程
    • 1,252 篇 信息与通信工程
    • 681 篇 控制科学与工程
    • 608 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 333 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,959 篇 理学
    • 1,055 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 340 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 314 篇 医学
    • 255 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 163 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 202 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 173 篇 training
  • 168 篇 computational mo...
  • 143 篇 privacy
  • 138 篇 cryptography
  • 135 篇 real-time system...
  • 135 篇 protocols
  • 122 篇 blockchain
  • 121 篇 predictive model...
  • 111 篇 artificial intel...
  • 102 篇 support vector m...
  • 101 篇 cloud computing
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 232 篇 school of cyber ...
  • 194 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 83 篇 college of cyber...
  • 62 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 46 篇 college of compu...
  • 43 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 39 篇 school of inform...
  • 34 篇 state key labora...
  • 33 篇 department of co...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 34 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 chen kai
  • 21 篇 cao xiaochun
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 hai jin
  • 19 篇 dehghantanha ali

语言

  • 6,346 篇 英文
  • 1,168 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7574 条 记 录,以下是261-270 订阅
排序:
Learners' Privacy-Preserving Scheme for Ranking Data Sensitivity in Mobile Learning System
Learners' Privacy-Preserving Scheme for Ranking Data Sensiti...
收藏 引用
2024 International Conference on Electrical and computer engineering Researches, ICECER 2024
作者: Muhammad, Muhammad Kudu Olaniyi, Olayemi Mikail Osang, Francis Oyefolahan, Ishaq Oyebisi Adebayo, Ojeniyi Joseph Kolo, Idris Mohammed Federal University Technology Department of Computer Science Minna Nigeria National Open University of Nigeria Department of Cyber Security Abuja Nigeria National Open University of Nigeria Department of Computer Science Abuja Nigeria National Open University of Nigeria Africa Centre of Excellence on Technology Enhanced Learning Abuja Nigeria Federal University Technology Department of Cyber Security Minna Nigeria
Mobile Learning System (MLS) is facing new challenges in terms of privacy, such as data collection, storage, and sharing because of the core infrastructure and network that enables cloud computing services. Most of th... 详细信息
来源: 评论
Statistical Analysis of a Deep Learning Based Trimodal Biometric System Using Paired Sampling T-Test
Statistical Analysis of a Deep Learning Based Trimodal Biome...
收藏 引用
2023 International Conference on science, engineering and Business for Sustainable Development Goals, SEB-SDG 2023
作者: Atanda, Oladayo Gbenga Ismaila, Wasiu Afolabi, Adeolu Olabode Awodoye, Olufemi Adeyanju Falohun, Adeleye Samuel Oguntoye, Jonathan Ponmile Landmark University Department of Computer Science Omu-Aran Nigeria Sdg 11 Sustainable Cities and Community Nigeria Lautech Department of Cyber-security Science Ogbomoso Nigeria Lautech Department of Computer Engineering Ogbomoso Nigeria Ajayi Crowther University Department of Computer Engineering Oyo Nigeria
Biometrics of individuals is distinctive to them and is constant over the course of a person's lifespan. A few trimodal biometric systems involving passive biometrics have adopted Convolutional Neural Network (CNN... 详细信息
来源: 评论
Modeling of Improved Solar Energy Installation for Efficient Power Systems  14
Modeling of Improved Solar Energy Installation for Efficient...
收藏 引用
14th International Conference on Advanced computer Information Technologies, ACIT 2024
作者: Satsyk, Viktor Reshetylo, Oleksandr Markina, Lyudmila Khrystynets, Nataliia Bahniuk, Nataliia Melnychuk, Yuliia Lutsk National Technical University Automation and Computer-Integrated Technologies Department Lutsk Ukraine Lutsk National Technical University Department of Automation and Computer-Integrated Technologies Lutsk Ukraine Lutsk National Technical University Computer Engineering and Cyber Security Department Lutsk Ukraine Lutsk National Technical University Department of Computer Engineering and Cyber Security Lutsk Ukraine Lutsk National Technical University Department of Digital Educational Technologies Lutsk Ukraine
in the article we develop modeling and creating a prototype of improved solar power plant for economical power supply systems for consumers which require simple autonomous inexpensive practical energy solutions. On th... 详细信息
来源: 评论
Comparison of Multiple Regression Particle Swarm Optimization Algorithms and Multiple Regression Multi-Objective Seven-Spot Ladybird Optimization for Host Overload / Under-Loaded Detection in Cloud Datacenter  3
Comparison of Multiple Regression Particle Swarm Optimizatio...
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Aqlan Alhammadi, Akram Saeed Raman, Jayakrishnan Anilakkad Mosleh, Mohammed A.S. Ali Abdullah, Hesham Mohammed It College Taiz University Aljanad University Alsaeed Faculty Engineering Engineering of Computer Networkand Cyber Security Department Taiz Yemen Cyber Forensic Consultant CyberSec Analytics Kerala India Al-Fayha College Jubail Industrial City Department of Computer Science and Engendering Saudi Arabia Jouf University Department of Computer Science and It Sakaka Saudi Arabia
Power consumption of the data centers in recent times is a big challenge presently. Virtualization plays a key role in improving efficacy. Virtual Machine consolidation (VMC) is a technique for efficient usage of a re... 详细信息
来源: 评论
Machine learning approaches to soil-structure interaction under seismic loading: predictive modeling and analysis
收藏 引用
Asian Journal of Civil engineering 2024年 第8期25卷 5781-5792页
作者: Alkhdour, Ahmad shraa, Tamer Department of Civil Engineering Faculty of Engineering Al-Balqa Applied University Al-Salt Jordan Faculty of Science and Information Technology Irbid National University Cyber Security Irbid Jordan
Soil-structure interaction (SSI) under seismic loading is a rather complex phenomenon that has immense effects on the seismic performance of structures. Traditional approaches are the finite element method (FEM) and t... 详细信息
来源: 评论
Oral Cancer Using Deep Learning and Auto-Fluorescence Image Analysis
Oral Cancer Using Deep Learning and Auto-Fluorescence Image ...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering science, AMATHE 2024
作者: Muhammed Yaseer, P. Arul Xavier, V.M. Shyni, S.S. Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Tamilnadu Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Tamilnadu Coimbatore India
Poor treatment outcomes result from the fact that oral cancer is frequently identified at an advanced stage, making it a serious and sometimes lethal disease. Thus, it is essential to develop quick and accurate proced... 详细信息
来源: 评论
Toward Correlated Sequential Rules
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第10期5卷 5340-5351页
作者: Chen, Lili Gan, Wensheng Chen, Chien-Ming Tongji University Department of Computer Science and Technology Shanghai200082 China Jinan University College of Cyber Security Guangzhou510632 China Pazhou Laboratory Guangzhou510330 China Nanjing University of Information Science and Technology School of Artificial Intelligence Nanjing210044 China
The goal of high-utility sequential pattern mining (HUSPM) is to efficiently discover profitable or useful sequential patterns in a large number of sequences. However, simply being aware of utility-eligible patterns i... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Artificial Intelligent based Cost Optimized Smart Energy Distribution and Management  2
Artificial Intelligent based Cost Optimized Smart Energy Dis...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Anitha, R. Siva Prasad, G. Senthil, M. Sarfaraz Ahmed, A. Raja, Laxmi Vijayakumar, S.D. Government Engineering College Department of Electronics and Communication Engineering Kerala India QIS College of Engineering and Technology Department of Computer Science and Engineering Andhra Pradesh India Sri Eshwar College of Engineering Department of Computer Science and Engineering Tamil Nadu Coimbatore India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore India Builders Engineering College Department of Electronics and Communication Engineering Tamil Nadu India
The ever-increasing need for energy, along with the requirement to cut emissions of greenhouse gases and maximize efficiency in energy use, has been a driving force behind the development of cutting-edge technology in... 详细信息
来源: 评论
Navigating intent-based networking: from user descriptions to deployable configurations
收藏 引用
Neural Computing and Applications 2025年 1-36页
作者: AlSamarneh, Ala’ A. Al-Hammouri, Ahmad T. Al-Jarrah, Omar Y. Department of Network Engineering and Security Jordan University of Science and Technology P.O. Box 3030 Irbid22110 Jordan The Beacom College of Computer and Cyber Sciences Dakota State University 820 N Washington Ave. MadisonSD57042 United States
Network automation development has accompanied network evolution due to its significant role in speeding up and simplifying network operations. Emerging networking and computing paradigms such as information-centric n... 详细信息
来源: 评论