咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 3,010 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,696 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 3,026 篇 软件工程
    • 1,252 篇 信息与通信工程
    • 681 篇 控制科学与工程
    • 608 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 333 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,959 篇 理学
    • 1,055 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 340 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 314 篇 医学
    • 255 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 163 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 265 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 202 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 173 篇 training
  • 168 篇 computational mo...
  • 143 篇 privacy
  • 138 篇 cryptography
  • 135 篇 real-time system...
  • 135 篇 protocols
  • 122 篇 blockchain
  • 121 篇 predictive model...
  • 111 篇 artificial intel...
  • 102 篇 support vector m...
  • 101 篇 cloud computing
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 232 篇 school of cyber ...
  • 194 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 83 篇 college of cyber...
  • 62 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 46 篇 college of compu...
  • 43 篇 school of cyber ...
  • 41 篇 department of co...
  • 41 篇 school of comput...
  • 39 篇 school of inform...
  • 34 篇 state key labora...
  • 33 篇 department of co...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 34 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 chen kai
  • 21 篇 cao xiaochun
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 hai jin
  • 19 篇 dehghantanha ali

语言

  • 6,346 篇 英文
  • 1,168 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7574 条 记 录,以下是4961-4970 订阅
排序:
Disassociation of Visual-proprioception Feedback to Enhance Endotracheal Intubation
Disassociation of Visual-proprioception Feedback to Enhance ...
收藏 引用
Future Trends in Smart Communities (ICFTSC), International Conference on
作者: Mahdiyeh Sadat Moosavi Jacob Williams Christophe Guillet Frédéric Merienne J. Cecil Michael Pickett Arts et Metiers Institute of Technology LISPEN HESAM Université Chalon-Sur-Saone France Department of Computer Science Oklahoma State University Stillwater Oklahoma United States of America LISPEN UBFC Université de Bourgogne Chalon-Sur-Saone Department of Computer Science Center for Cyber-Physical system Oklahoma State University Stillwater Oklahoma United States of America Department of Mechanical Engineering Oklahoma State University Stillwater Oklahoma United States of America
This paper discusses the key elements of a research study that focused on training an important procedure called “Endotracheal intubation” to novice students. Such a procedure is a virtual part of treating patients ... 详细信息
来源: 评论
Detection of Liver Disease Using Machine Learning Approach
Detection of Liver Disease Using Machine Learning Approach
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Pravin Ramdas Kshirsagar Dhoma Harshavardhan Reddy Mallika Dhingra Dharmesh Dhabliya Ankur Gupta Department of Artificial Intelligence G H Raisoni College of Engineering Nagpur Maharashtra India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Mumbai Maharashtra India Department of Mathematics and Statistics Manipal University Jaipur Jaipur Rajasthan India Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science and Engineering Vaish College of Engineering Rohtak Haryana India
For more effective therapy, it’s critical to get an early diagnosis of liver illness. Due to the disease’s modest symptoms, it is a very difficult challenge for medical experts to forecast the disease in its early s... 详细信息
来源: 评论
Blockchain Topology Optimization Based on Node Clustering
Blockchain Topology Optimization Based on Node Clustering
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Peiyun Ran Yipeng Ji Mingsheng Liu Peng Zhao Shiyuan Yu Yongjian Huang Du Wang Zakirul Alam Bhuiyan Gang Li School of Cyberspace Security of Beihang University Beijing China School of Computer Science and Engineering of Beihang University Beijing China Shijiazhuang Institute of Railway Technology Shijiazhuang China The First Hospital of Hebei Medical University Shijiazhuang China Beijing Public Security Burea Beijing China HBIS Group Co. Ltd Shijiazhuang China Shijiazhuang Tieda Kexian Information Technology Co. Ltd Shijiazhuang China Department of Computer Information Sciences Fordham University New York USA Zhongke Zidong Information Technology (Beijing) Co. Ltd Beijing China
Since blockchain was born more than ten years ago, its performance optimization has always been a hot topic in the academic community. Since blockchain is essentially a distributed system, it needs to set a consensus ...
来源: 评论
A reliable color image encryption scheme based on a novel dual-wing hyperchaotic map
收藏 引用
Expert Systems with Applications 2025年 289卷
作者: Obaid, Mohammed Jabbar Neamah, Ammar Ali Shukur, Ali A. Pham, Viet-Thanh Grassi, Giuseppe Department of Cyber Security College of Sciences Al-Mustaqbal University Babylon51001 Iraq Faculty of Computer Science and Mathematics University of Kufa Najaf Iraq Faculty of Electronics Technology Industrial University of Ho Chi Minh City Ho Chi Minh City Viet Nam Department of Engineering for Innovation University of Salento Lecce Italy
A symmetric image encryption algorithm based on a chaotic higher dimensional map is proposed to protect color images against unauthorized access. The algorithm employs a two-phase process: chaotic pixel shuffling for ... 详细信息
来源: 评论
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network
收藏 引用
computer Systems science & engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论
A Review on Application of Deep Learning in Natural Language Processing
A Review on Application of Deep Learning in Natural Language...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Pravin Ramdas Kshirsagar Dhoma Harshavardhan Reddy Mallika Dhingra Dharmesh Dhabliya Ankur Gupta Department of Artificial Intelligence G H Raisoni College of Engineering Nagpur Maharashtra India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Mumbai Maharashtra India Department of Mathematics and Statistics Manipal University Jaipur Jaipur Rajasthan India Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science and Engineering Vaish College of Engineering Rohtak Haryana India
Natural Language Processing (NLP) is a developing method utilized in building different sorts of Artificial Intelligence (AI) that is available in today’s time. More intellectual applications will tend to be a primar... 详细信息
来源: 评论
Enhancing knowledge distillation via genetic recombination
收藏 引用
Applied Soft Computing 2025年 181卷
作者: Yangjie Cao Chuanjin Zhou Minglin Liu Weiqi Luo Xiangyang Luo School of Cyber Science and Engineering Zhengzhou University Zhengzhou 450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou 510000 China School of Computer and Engineering Sun Yat-sen University Guangzhou 510000 China
Diverging from conventional knowledge distillation methods that solely emphasize improving the utilization of the teacher’s knowledge, this paper explores the generation of stronger student models within available kn...
来源: 评论
Adaptive Decoding Mechanisms for UAV-enabled Double-Uplink Coordinated NOMA
arXiv
收藏 引用
arXiv 2022年
作者: Nguyen, Thanh Luan Kaddoum, Georges Do, Tri Nhu da Costa, Daniel Benevides Haas, Zygmunt J. Université du Québec MontréalQCH3C 1K3 Canada Cyber Security Systems and Applied AI Research Center Lebanese American University Lebanon The Technology Innovation Institute Masdar City Abu Dhabi9639 United Arab Emirates The Department of Computer Science University of Texas at Dallas RichardsonTX75080 United States The School of Electrical and Computer Engineering Cornell University IthacaNY14853 United States
In this paper, we propose a novel adaptive decoding mechanism (ADM) for the unmanned aerial vehicle (UAV)enabled uplink (UL) non-orthogonal multiple access (NOMA) communications. Specifically, considering a harsh UAV ... 详细信息
来源: 评论
A Review on Comparative study of 4G, 5G and 6G Networks
A Review on Comparative study of 4G, 5G and 6G Networks
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Pravin Ramdas Kshirsagar Dhoma Harshavardhan Reddy Mallika Dhingra Dharmesh Dhabliya Ankur Gupta Department of Artificial Intelligence G H Raisoni College of Engineering Nagpur Maharashtra India Trainee Security Analyst JunoClinic Davman Technology Services Pvt. Ltd Mumbai Maharashtra India Department of Mathematics and Statistics Manipal University Jaipur Jaipur Rajasthan India Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science and Engineering Vaish College of Engineering Rohtak Haryana India
In the previous several years, wireless telecommunications technology has seen a significant change. The term “generation” in the context of wireless communication typically describes to a shift in the essential cha... 详细信息
来源: 评论
Reversible data hiding in encrypted 3D mesh models via reference vertex circulation strategy
收藏 引用
Multimedia Tools and Applications 2025年 1-21页
作者: Liu, Jui-Chuan Chang, Ching-Chun Gao, Kai Chang, Chin-Chen Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan Information and Communication Security Research Center Feng Chia University Taichung407 Taiwan
As information technology has quickly developed, many different industries have emerged along with it. Fields using 3D models as their fundamental data formats are no exception. This study examines applying reversible... 详细信息
来源: 评论