咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 3,010 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,696 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,026 篇 软件工程
    • 1,252 篇 信息与通信工程
    • 681 篇 控制科学与工程
    • 608 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 333 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,959 篇 理学
    • 1,055 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 340 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 314 篇 医学
    • 255 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 163 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 202 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 173 篇 training
  • 168 篇 computational mo...
  • 143 篇 privacy
  • 138 篇 cryptography
  • 135 篇 real-time system...
  • 135 篇 protocols
  • 122 篇 blockchain
  • 121 篇 predictive model...
  • 111 篇 artificial intel...
  • 102 篇 support vector m...
  • 101 篇 cloud computing
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 232 篇 school of cyber ...
  • 194 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 83 篇 college of cyber...
  • 62 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 46 篇 college of compu...
  • 43 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 39 篇 school of inform...
  • 34 篇 state key labora...
  • 33 篇 department of co...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 34 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 chen kai
  • 21 篇 cao xiaochun
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 hai jin
  • 19 篇 dehghantanha ali

语言

  • 6,346 篇 英文
  • 1,168 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7574 条 记 录,以下是271-280 订阅
排序:
Automated Crop Growth Monitoring and Optimizing the Yield with Reinforcement Learning  3
Automated Crop Growth Monitoring and Optimizing the Yield wi...
收藏 引用
3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: Gorantla, Snehitha Veluchamy, S. Amrita School of Computing Department of Computer Science and Engineering - Artificial Intelligence Amrita Vishwa Vidyapeetham Chennai601103 India Amrita School of Computing Department of Computer Science and Engineering - Cyber Security Amrita Vishwa Vidyapeetham Chennai601103 India
A reinforcement learning agent for optimal green-house management through Proximal Policy Optimisation is developed and evaluated in this work. With variable elements like lighting, irrigation, humidity, and temperatu... 详细信息
来源: 评论
Terahertz metasurface biosensor for high-sensitivity salinity detection and data encoding with machine learning optimization based on random forest regression
收藏 引用
Optical and Quantum Electronics 2024年 第11期56卷 1-39页
作者: Wekalao, Jacob Mandela, Ngaira Department of Optics and Optical Engineering University of Science and Technology of China Hefei230026 China School of Digital Forensics and Cyber Security National Forensic Sciences University Gujarat Gandhinagar382007 India
This research presents a terahertz-based biosensor for high-precision salinity detection, employing a synergistic integration of graphene, gold, and silver in a metasurface configuration. The sensor exhibits exception... 详细信息
来源: 评论
Vision transformer for contactless fingerprint classification
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Kaplesh, Pooja Gupta, Aastha Bansal, Divya Sofat, Sanjeev Mittal, Ajay Cyber Security Research Centre Punjab Engineering College Chandigarh160012 India STME SVKM’s NMIMS University Chandigarh160014 India Computer Science and Engineering Punjab Engineering College Chandigarh160012 India UIET Panjab University Chandigarh160014 India
Contactless fingerprint recognition has gained attention due to its data security and hygiene as compared to the contact-based counterpart. In the previous years, deep learning models, mainly Convolutional Neural Netw... 详细信息
来源: 评论
Personalized Educational Video Evaluation Combining Student's Cognitive and Teaching Style
Personalized Educational Video Evaluation Combining Student'...
收藏 引用
2023 IEEE International Conference on Systems, Man, and cybernetics, SMC 2023
作者: Weng, Jinta Dong, Haoyu Deng, Yifan Hu, Yue Wu, Hao Huang, Heyan School of Cyber Security University of Chinese Academy of Sciences China School of Computer Science and Cyber Engineering Guangzhou University China School of Computer Science and Technology Southeast Academy of Information Technology Beijing Institute of Technology China
AI-powered technologies, like ChatGPT and learning analytic technologies, have encouraged the sharing of online teaching resources and the transformation of teaching methods and learning pathways. However, the mixed r...
来源: 评论
Analysis of Tomato Leaf Diseases Detection Models  8th
Analysis of Tomato Leaf Diseases Detection Models
收藏 引用
8th International Conference on Intelligent Technologies, ICIT 2023
作者: Satyarthi, Devshri Arya, K.V. Rathore, Santosh Singh Mishra, Richa Multimedia and Information Security Research Group Department of Computer Science and Engineering ABV-IIITM 474015 Gwalior India
Plant leaf disease distresses the growth of the plant. Therefore, early detection and classification of plant leaf disease is vital for healthy crops such as tomatoes. This early detection of tomato leaf disease in pl... 详细信息
来源: 评论
Public Awareness of Phishing in Indonesia: System Literature Review
Public Awareness of Phishing in Indonesia: System Literature...
收藏 引用
2023 International Conference on Data science and Its Applications, ICoDSA 2023
作者: Chandra, Anthony William Chandiarta, Zefanya Setiyawan, Lutfi Gunawan, Alexander Agung Santoso Edbert, Ivan Sebastian Bina Nusantara University Cyber Security Program School of Computer Science Jakarta11480 Indonesia Bina Nusantara University School of Computer Science Computer Science Department Jakarta11480 Indonesia
In an era where technology is advancing at an unprecedented rate, the internet has become an indispensable tool for everyday life, offering both convenience and efficiency. While the internet has simplified tasks rang... 详细信息
来源: 评论
IoT-Based Plant Health Monitor Using NodeMCU and ESP8266  5
IoT-Based Plant Health Monitor Using NodeMCU and ESP8266
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Tandel, Rajat Ebenezer, V. Santhiya, P. Edwin, Bijolin Stewart Kirubakaran, S. Thanka, Roshni Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Division of Data Sciences and Cyber Security Coimbatore India
Plant Monitor Using NodeMCU(ESP8266)is a technology that is advanced;it uses IoT-Internet of Things to measure and monitor different plant phenomena. This system, which is based on sensors that collect data on differe... 详细信息
来源: 评论
A novel medical image data protection scheme for smart healthcare system
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 821-836页
作者: Mujeeb Ur Rehman Arslan Shafique Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad School of Computer Science and Informatics Cyber Technology InstituteDe Montfort UniversityLeicesterUK Department of Biomedical Engineering University of GlasgowGlasgowUK School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghUK Robotics and Internet‐of‐Things Laboratory Prince Sultan UniversityRiyadhSaudi Arabia Department of Computer Science Al Ain UniversityAl AinUnited Arab Emirates Department of Computer Engineering College of Computer Science King Khalid UniversityAbhaSaudi Arabia Computer Sciences Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,parti... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
Vehicular Intrusion Detection System Based on Hybrid Quantum Neural Networks
Vehicular Intrusion Detection System Based on Hybrid Quantum...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhou, Jianhua Liu, Yueheng Li, Sifan Cao, Yue Chen, Wenkai Ahmed, Naveed Wuhan University School of Cyber Science and Engineering China Wuhan Cyber Security Association China Technology Co. Ltd China Prince Sultan University College of Computer and Information Sciences Riyadh Saudi Arabia
Traditional Deep Learning (DL) method is increasingly used in vehicular Intrusion Detection Systems (IDSs). However, there are still some limitations. It combines various models, resulting in a massive model size and ... 详细信息
来源: 评论