咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是1001-1010 订阅
排序:
An Automated Memory Image Forensic Scheme for Linux Systems Based on Containerization technology
An Automated Memory Image Forensic Scheme for Linux Systems ...
收藏 引用
cyber Science and technology Congress (cyberSciTech), IEEE
作者: Ruihao Chen Hui Lin Qingxin Lin Hui Ju College of Computer and Cyber Security Fujian Normal University Fuzhou Fujian China Department of Computer Engineering Fuzhou University Zhicheng College Fuzhou Fujian China
With the advancement of anti-forensic techniques and network attack technologies aided by fileless methods, traditional forensics techniques based on non-volatile storage devices are increasingly encountering obstacle... 详细信息
来源: 评论
Combating Terrorism: Detecting and Analyzing Extremist Content on X (Formerly Twitter)
Combating Terrorism: Detecting and Analyzing Extremist Conte...
收藏 引用
Delhi Section Conference (DELCON), IEEE
作者: Gideon Mwendwa Lokesh Chouhan Felix Etyang Ngaira Mandela Uwineza Gift School of Cyber Security and Digital Forensics National Forensic Sciences University Goa India School of Engineering Department of Computer Science Cochin University of Science and Technology Cochin India School of Cyber Security and Digital Forensics National Forensic Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensic Sciences University Jinja Uganda
This study investigates the efficacy of machine learning algorithms in detecting and evaluating extremist content on social media platforms, and we employ X, formerly known as Twitter. We therefore utilize Kaggle'... 详细信息
来源: 评论
GLLaMoR: Graph-based Logic Locking by Large Language Models for Enhanced Robustness
GLLaMoR: Graph-based Logic Locking by Large Language Models ...
收藏 引用
VLSI Test Symposium
作者: Akashdeep Saha Prithwish Basu Roy Johann Knechtel Ramesh Karri Ozgur Sinanoglu Lilas Alrahis Center for Cyber Security New York University Abu Dhabi UAE Department of Electrical and Computer Engineering New York University Tandon School of Engineering Department of Computer and Information Engineering Khalifa University Abu Dhabi UAE
Logic locking protects integrated circuits (ICs) from design piracy. The idea is to insert key-controlled components, a.k.a. key-gates, to lock the IC’s functionality, where the correct key is the designer’s secret.... 详细信息
来源: 评论
IoT-based Posture Pro: Safeguarding the Human Spine from the Onset of Hunchback in the Initial Stages  8
IoT-based Posture Pro: Safeguarding the Human Spine from the...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace technology, ICECA 2024
作者: Kumar, D Sathish Ramya, G. Ravi, S. Giri, Jayant Odeh, Mahmoud Karpagam Academy of Higher Education Coimbatore Department of Electrical and Electronics Engineering Tamil Nadu Coimbatore India Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur Chennai India Saveetha University Saveetha School of Engineering Department of Vlsi Microelectronics Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
The Posture Pro, a smart body posture improver, is a specialized device aiding people in maintaining good posture while sitting or standing. It distinguishes itself from standard correctors by its ability to attach to... 详细信息
来源: 评论
Comparative Assessment of Brain Tumor Detection Techniques: A Comparative Study
Comparative Assessment of Brain Tumor Detection Techniques: ...
收藏 引用
Advanced Computing & Communication Technologies (ICACCTech), International Conference on
作者: Pooja Dahiya Anshu Sharma Manisha Sharma Vijay Bharti Department of Computer Science and Engineering(Cyber Security) Panipat Institute of Engineering and Technology Samalkha Affiliated by Kurukshetra University Panipat India Department of Computer Science and Engineering Panipat Institute of Engineering and Technology Samalkha Affiliated by Kurukshetra University Panipat India Department of Computer Application Panipat Institute of Engineering and Technology Samalkha Affiliated by Kurukshetra University Panipat India Department of Computer Science and Engineering Apiit SD India Panipat Panipat India
Medical picture segmentation refers to the process of categorizing the different parts of an image into anatomical components or defining the changes in structure and intensity in relation to the underlying functional... 详细信息
来源: 评论
Advancing Alzheimer's Diagnosis Through Transfer Learning with Deep MRI Analysis
Advancing Alzheimer's Diagnosis Through Transfer Learning wi...
收藏 引用
Advances in Modern Age Technologies for Health and engineering Science (AMATHE), International Conference on
作者: Adityasai B Nirmal Varghese Babu Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
Alzheimer's disease (AD) poses a significant health-care challenge, necessitating early and accurate diagnosis for effective management. This study presents a novel approach aimed at enhancing AD diagnosis through... 详细信息
来源: 评论
Invulnerability Optimization of Communication Network Based on Analog Attack Strategy  11th
Invulnerability Optimization of Communication Network Based ...
收藏 引用
11th International Conference on computer engineering and Networks, CENet2021
作者: Xia, Lingling Ni, Xueli Jing, Zhengjun Liu, Jiayin Zhang, Yan Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China College of Computer Engineering Jiangsu University of Technology Changzhou213001 China Jiangsu Province Electronic Data Forensics and Analysis Engineering Research Center Nanjing210031 China Key Laboratory of Digital Forensics of Jiangsu Provincial Public Security Department Nanjing210031 China
Invulnerability of communication networks directly related to security and reliability of networks has received increasing attention in recent years. In order to enhance the destruction resisting capacity of communica... 详细信息
来源: 评论
Evolutionary Algorithms for Deep Learning in Secure Network Environments
Evolutionary Algorithms for Deep Learning in Secure Network ...
收藏 引用
2024 IEEE International Conference on Intelligent Systems and Advanced Applications, ICISAA 2024
作者: Seva, Banothu Jain, Ratnesh Khare, Neha Choudhury, Hussain Ahmed Chakravarthi, M Ayyappa Tomer, Nitin MLR Institute of Technology Dept. of CSE Telangana Hyderabad India GGITS Dept of Computer Science & Design M.P Jabalpur India IES Institute of Technology and Management IES University Department of Computer Science & Engineering M.P Bhopal462044 India Barak Valley Engineering College Department of CSE Assam Karimganj India KKR & KSR Institute of Technology and Sciences Dept. of CSE - Data Science AP Guntur India GGITS Cyber Security & Blockchain Dept of IOT M.P. Jabalpur India
Hackers are getting better at breaking into protected networks, making network security an arms race. Today, combining EAs with DL to combat these risks is cuttingedge. This research illustrates how EAs and DL may enh... 详细信息
来源: 评论
Comparative analysis of different scene for face mask detection based on YOLOv4  3
Comparative analysis of different scene for face mask detect...
收藏 引用
3rd International Conference on Intelligent Computing and Human-computer Interaction, ICHCI 2022
作者: Cheng, Zuozheng Zhang, Chaoran Zhu, Yudong Department of Computer Science and Technology Zhengzhou University Zhengzhou450001 China Department of Information Security China University of Mining and Technology Xuzhou221116 China Department of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China
The 2019-nCoV can be transmitted through respiratory droplets and other methods, which greatly endangers public health security. Wearing masks correctly has been proven to be one of the effective means to prevent viru... 详细信息
来源: 评论
Hyperspectral Images-Based Crop Classification Scheme for Agricultural Remote Sensing
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 303-319页
作者: Imran Ali Zohaib Mushtaq Saad Arif Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Department of Mechanical Engineering National Taiwan University of Science and TechnologyTaipei City106335TaiwanChina Department of Electrical Engineering Riphah International UniversityIslamabad44000Pakistan Department of Mechanical Engineering HITEC University TaxilaTaxila Cantt.47080Pakistan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia
Hyperspectral imaging is gaining a significant role in agricultural remote sensing *** data unit is the hyperspectral cube which holds spatial information in two dimensions while spectral band information of each pixe... 详细信息
来源: 评论