咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是21-30 订阅
排序:
Endogenous security of FQn Networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Electromagnetic Radiation Effects in Human and Animal Health  14
Electromagnetic Radiation Effects in Human and Animal Health
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Singh, Jagjot Kumar, Sanu Johnson, Derick Mathew Savita Department of Computer Science Engineering Spl. Digital Forensics and Cyber Security India
Electromagnetic (EM) radiations are the waves of electromagnetic and magnetic field which are generated from electromagnetic devices. These radiations are dangerous to humans as well as animal health. Talking medicall... 详细信息
来源: 评论
Exploring the landscape of network security: a comparative analysis of attack detection strategies
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3211-3228页
作者: Rajesh Kanna, P. Santhi, P. Department of Computer Science and Engineering Bannari Amman Institute of Technology Tamil Nadu Erode India TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Tamil Nadu Coimbatore India
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the prim... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Adapting to Evasive Tactics through Resilient Adversarial Machine Learning for Malware Detection  18
Adapting to Evasive Tactics through Resilient Adversarial Ma...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Krishna, G. Bala Sravan Kumar, G. Ramachandra, Mummadi Sampurnima Pattem, K. Rani, D. Sandhya Kakarla, Geeta Cvr College of Engineering Department of Computer Science Engg. Rangareddy Ibrahimpatnam India Cvr College of Engineering Department of Computer Science Engg.-Cyber Security Rangareddy Ibrahimpatnam India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Hyderabad India Sreenidhi Institute of Science and Technology Department of Computer Science Engg. Cyber Security Hyderabad India
This paper presents the Adaptive Resilience-based Convolutional Network (ARCNet), a sophisticated machine learning framework specifically designed to detect advanced, evasive malware. ARCNet combines convolutional and... 详细信息
来源: 评论
IDCE:Integrated Data Compression and Encryption for Enhanced security and Efficiency
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 1029-1048页
作者: Muhammad Usama Arshad Aziz Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev Department of Cyber Security Pakistan Navy Engineering CollegeNational University of Sciences and TechnologyKarachi75350Pakistan Department of Computer Science Main CampusIqra UniversityKarachi75500Pakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Informatics and Its Teaching Methods Tashkent State Pedagogical UniversityTashkent100170Uzbekistan
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t... 详细信息
来源: 评论
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques  1
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
1st International Conference for Women in Computing, InCoWoCo 2024
作者: Roshan, Rahul G. Salanke, Vishal S Nagasundari, S. Research Center for Information Security Forensics and Cyber Resilience PES University Department of Computer Science and Engineering Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
Electronic Medical Records Management and Administration: Current Trends, Issues, Solutions, and Future Directions
收藏 引用
SN computer science 2024年 第5期5卷 460页
作者: Abdulkadir, Umar Waziri, Victor Onomza Alhassan, John Kolo Ismaila, Idris Department of Cyber Security Science Federal University of Technology Minna Nigeria Department of Computer Science Federal University of Technology Minna Nigeria
Electronic Medical Records (EMR) is often used to refer to as electronic personal health (EPH) records or electronic healthcare records (EHR). These are considered vivacious assets of health facilities and patients. T... 详细信息
来源: 评论
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 1-12页
作者: WANG Zhibo LIU Kaixin HU Jiahui REN Ju GUO Hengchang YUAN Wei School of Cyber Science and Engineering Wuhan University School of Cyber Science and Technology Zhejiang University Department of Computer Science and Technology Tsinghua University
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive inform... 详细信息
来源: 评论
Blockchain-Empowered Asynchronous Federated Reinforcement Learning for IoT-Based Traffic Trajectory Prediction
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17095-17109页
作者: Wang, Bin Tian, Zhao Tang, Fengxiao Pan, Heng She, Wei Liu, Wei Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450002 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450002 China Central South University School of Computer Science and Engineering Changsha410083 China Zhongyuan University of Technology School of Cyber Space Security Zhengzhou450007 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou Key Laboratory of Blockchain and Data Intelligence Zhengzhou450002 China
Vehicle trajectory prediction plays a crucial role in IoT-based intelligent transportation systems, which can effectively address key issues, such as driving safety and multivehicle collaboration. However, the sensiti... 详细信息
来源: 评论