咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是71-80 订阅
排序:
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
An Efficient Key Establishment and Distribution Scheme for Wireless Body Area Networks
An Efficient Key Establishment and Distribution Scheme for W...
收藏 引用
2024 International Conference on science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Taofeek, Yusuf Victor, Waziri Onomza Olalere, Morufu Abdullahi, Muhammad Bashir Federal University of Technology Cyber Security Science Department Minna Nigeria Federal University of Technology Computer Science Department Minna Nigeria
Secure communication in wireless body area network (WBAN) depends on efficient key management system. However, to ensure robustness, key management schemes must not only be lightweight but also support the establishme... 详细信息
来源: 评论
Enhancing Computational Model for Human Motion Recognition Using Deep Learning
Enhancing Computational Model for Human Motion Recognition U...
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Yadav, Ram Kumar Daniel, A. Kumar, Birendra Sakhare, Apeksha Moriwal, Rahul Pawar, Raju Amity university Gwalior Department of Computer Science and Engineering Gwalior India G H Raisoni college of engineering Department of Data Science Internet of Things and Cyber Security Nagpur India G H Raisoni college of engineering Department of Computer Science and Engineering Nagpur India
Human motion recognition (HMR) is a fundamental task in computer vision with applications in healthcare, surveillance, human-computer interaction, and intelligent environments. This paper proposes a better-performing ... 详细信息
来源: 评论
A Literature Review on Predictive Classification of Major Depressive Disorder Using Advanced Data Analytics Techniques  5th
A Literature Review on Predictive Classification of Major De...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Mahender, Udutala Arivalagan, S. Sathiyasuntharam, V. Sudhakar, P. Annamalai University Tamilnadu Chidambaram India Department of Computer Science and Technology Annamalai University Tamilnadu Chidambaram India Department of Cyber Security CMR Engineering College Hyderabad India Department of Computer Science and Engineering Annamalai University Tamilnadu Chidambaram India
Major Depressive Disorder (MDD) is a significant global mental health concern predicted to become the leading mental health condition by 2030. It is characterised by persistent sadness, hopelessness, and a lack of int... 详细信息
来源: 评论
Streamlining Kubernetes Deployments through GitOps Methodologies
Streamlining Kubernetes Deployments through GitOps Methodolo...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Kurrewar, Samiksha Dhomane, Sejal Dahake, Aditya Yadav, Ram Kumar Wyawahare, Nikhil Morris, Nekita Chavhan Ghrce IoT and Cyber Security Department of Data Science Nagpur India Manipal University Department of Data Science and Engineering Jaipur India
A clear process for automating the deployment of apps on Kubernetes using GitOps concepts is shown, with an emphasis on tools like Helm and Argo CD. The method demonstrates how to improve the effectiveness and reliabi... 详细信息
来源: 评论
Deployment of Co-operative Farming Ecosystems Using Blockchain  22nd
Deployment of Co-operative Farming Ecosystems Using Blockcha...
收藏 引用
22nd International Conference on Hybrid Intelligent Systems, HIS 2022 and the 18th International Conference on Information Assurance and security, IAS 2022
作者: Mahapatra, Aishwarya Gupta, Pranav Swarnkar, Latika Gupta, Deeya Kar, Jayaprakash Centre for Cryptography Cyber Security and Digital Forensics Department of Computer Science & Engineering Department of Communication & Computer Engineering The LNM Institute of Information Technology Jaipur India
Blockchain has helped us in designing and developing decentralised distributed systems. This, in turn, has proved to be quite beneficial for various industries grappling with problems regarding a centralised system. S... 详细信息
来源: 评论
Deformable Dual Graph Aggregation Transformer Convolutional Networks with Spider Wasp Optimizer for Ovarian Tumor Classification Using Magnetic Resonance Imaging
收藏 引用
Biomedical Materials and Devices 2025年 1-19页
作者: Shanmugaveni, V. Jotheeswari, M. Abarnaswara, R. VijayaKumar, M. Manojanani, A. Department of Computer Science and Engineering (Cyber Security) Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering PSNA College of Engineering and Technology Tamil Nadu Dindigul India Department of Artificial Intelligence & Data Science Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering RVS Technical Campus Tamil Nadu Coimbatore India
The diagnosis of Ovarian Tumor (OT) remains a significant challenge as there is presently no practical non-invasive technique to determine true benign or malignant lesions before treatment. This study proposes a uniqu... 详细信息
来源: 评论
Panoptic Region Slicing Segmentation and Optimized Alexnet-Based CNN for Early Melanoma Diagnosis
收藏 引用
SN computer science 2024年 第6期5卷 756页
作者: Ganesh, V.N. Gulappagol, Laxmi Pushparani, M.K. Ganesh, K. Department of Electronics and Communication Engineering Alvas Institute of Engineering and Technology Department of Internet of Things and Cyber Security including Block chain Technology A J Institute of Engineering and Technology Department of Computer Science & amp Design Alvas Institute of Engineering and Technology
Early and accurate diagnosis of melanoma, a potentially life-threatening skin cancer, is crucial for improving patient outcomes. In this study, we propose a novel approach for melanoma detection, termed Panoptic Regio... 详细信息
来源: 评论
Fake News Detection on Social Media Using a Stacking Model  5th
Fake News Detection on Social Media Using a Stacking Model
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Ramesh, G.S. Supriya, K.H.S. Akash, P. Rukmananda Reddy, A. Tejaswini, V. Dharmireddi, Srinivasarao Department of Computer Science and Engineering VNR VJIET Telangana Hyderabad India Department of Cyber Security MasterCard St. LouisMO63304 United States
Fake news has existed since long before the Internet was invented. It can be defined as "fictitious articles deliberately fabricated to deceive readers". While some news may have a grain of truth, it frequen... 详细信息
来源: 评论
Vision-based UAV Detection in Complex Backgrounds and Rainy Conditions  2
Vision-based UAV Detection in Complex Backgrounds and Rainy ...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Singh, Pranita Gupta, Keshav Jain, Amit Kumar Vishakha Jain, Abhishek Jain, Arpit Roorkee Institute of Technology Department of Computer Science and Engineering Roorkee India Grd Institute of Management and Technology Department of Computer Science and Engineering Dehradun India Coer University Department of Cyber Security Roorkee India Uttaranchal University Department of Computer Science and Engineering Dehradun India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Vaddeswaram India
Studies aimed at detecting UAVs in real time using processer vision and deep learning are in their infancy. Although there are many possible advantages to using unmanned aerial vehicles (UAVs), some people are concern... 详细信息
来源: 评论