咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是1011-1020 订阅
排序:
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2023年 第12期24卷 14536-14545页
作者: Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Ghaffar, Zahid Khan, Muhammad Khurram Das, Ashok Kumar National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan King Saud University Center of Excellence in Information Assurance Riyadh11653 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud-centric framework to fulfil the applicati... 详细信息
来源: 评论
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 929-955页
作者: Lamiaa A.Abou Elazm Walid El-Shafai Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie Department of Microelectronics Electronics Research InstituteAlnozhaEgypt Department of Electronics and Electrical Communications Engineering Ain Shams UniversityCairoEgypt Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh 11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh 11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric *** of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of... 详细信息
来源: 评论
Secure and Efficient Blockchain-Based Access Control Scheme with Attribute Update
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zuo, Yuting Xu, Li Li, Jiguo Li, Jie Wang, Xiaoding Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Lab Shanghai200240 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
Secure data access control is widely concerned in cyber Physical Systems (CPSs) to protect consumer rights. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an ideal solution that supports fine-grained access ... 详细信息
来源: 评论
Interference Mitigation in D2D Communication Underlying Cellular Networks:Towards Green Energy
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 45-58页
作者: Rana Zeeshan Ahamad Abdul Rehman Javed Shakir Mehmood Mohammad Zubair Khan Abdulfattah Noorwali Muhammad Rizwan Department of Computer Science Xian Jiaotong UniversityXi’anChina Department of Cyber Security Air UniversityIslamabadPakistan Department of Information and Technology Northwest UniversityXianChina Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinahSaudi Arabia Department of Electrical Engineering Umm Al-Qura UniversityMakkahSaudi Arabia Department of Computer Science Kinnaird College for WomenLahore54000Pakistan
Device to Device(D2D)communication is emerging as a new participant promising technology in 5G cellular networks to promote green energy networks.D2D communication can improve communication delays,spectral efficiency,... 详细信息
来源: 评论
Enhanced Word Embedding with CNN using Word Order Information for Sentiment Analysis  20
Enhanced Word Embedding with CNN using Word Order Informatio...
收藏 引用
20th International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2023
作者: Atandoh, Peter Fengli, Zhang Hakeem, Paul Atandoh Acheampong, Edward Mensah Addo, Daniel Appiah-Twum, Michael Adu-Gyamfi, Daniel Blankson, Richard Safo Giza Wi, Tohye Tewodros School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Mercer University Department of Mathematics MaconGA31207 United States School of Resources and Environment University of Electronic Science and Technology of China Chengdu China C. K. Tedam University of Technology and Applied Sciences Department of Cyber Security and Computer Engineering Technology Navrongo UE/R Ghana Summit Economics LLC Colorado United States
On several e-commerce platforms, internet users share opinions. Understanding people's sentiments and opinions is necessary. GloVe, which uses word contexts and matrix vectorization, is an effective word vector le... 详细信息
来源: 评论
Power amplifier circuit defect detection based on improved Patch SVDD
Power amplifier circuit defect detection based on improved P...
收藏 引用
作者: Xie, Zhonghui Kong, Wa Zhou, Xinyu Zhang, Wence Zhong, Yujie Xia, Jing School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China Department of Electronic Information Engineering Hong Kong Polytechnic University Hong Kong
In the manufacturing process of power amplifier (PA), various defects on the circuit surface will seriously affect the circuit performance and its operation. To solve the above problems, this article proposes a circui... 详细信息
来源: 评论
Diffusion-based dynamic super-dense candidate boxes with random center points for 3D object detection
收藏 引用
Applied Soft Computing 2025年 178卷
作者: He, Si-Heng Wang, Zi-Jia Wang, Yuan-Gen Zhou, Yicong Kwong, Sam Computer Science and Cyber Engineering Guangzhou University Guangzhou China Department of Computer and Information Science Faculty of Science and Technology University of Macau China Department of Computer Science Lingnan University Hong Kong
Diffusion models have achieved promising results in image generation, but their applications in 3D object detection still need further exploration. In this paper, we design a novel model DiffCandiDet based on dense he... 详细信息
来源: 评论
Diagnosis of Plant Leaf Disease using Vision Transformer
Diagnosis of Plant Leaf Disease using Vision Transformer
收藏 引用
International Conference on Communications and Signal Processing
作者: Ashik Sundaraj Deva Priya Isravel Julia Punitha Malar Dhas Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India
In precision agriculture, it is crucial to have a reliable system for identifying diseases and suggesting measures to maintain crop health and enhance yield performance. Addressing the persistent challenge of accurate... 详细信息
来源: 评论
Diabetic Condition Classification using Supervised and Unsupervised Machine Learning Techniques: A Use Case for HealthTech Industry  4
Diabetic Condition Classification using Supervised and Unsup...
收藏 引用
4th IEEE International Conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2023
作者: Bongale, Anupkumar M. Biradar, Santoshkumar Pise, Priya Suke, Amita Priyadarshan Uke, Nilesh Dharrao, Deepak S. Symbiosis Institute Of Technology Department Of Aiml Pune Campus Pune India G H Raisoni College Of Engineering And Management Department Of Cyber Security And Data Science Pune Wagholi India Indira College Of Engineering And Management Department Of Ai And Ds Pune India Trinity Academy Of Engineering Pune India Symbiosis Institute Of Technology Department Of Cse Pune Campus Pune India
Diabetes is a very underestimated and, in many cases, an ignored disease. People do not understand the seriousness of diabetes. Many people think diabetes is just something because of which one cannot consume sweets. ... 详细信息
来源: 评论
A Deepfake Image Classifier System for real and Doctored Image Differentiation
A Deepfake Image Classifier System for real and Doctored Ima...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: Juanith Mathew Thomas V. Ebenezer Rohan Paul Richard Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The sudden proliferation of deepfake technology has raised concerns about the authenticity and integrity of digital media. In response to these concerns, this paper presents a Deepfake image classifier system designed... 详细信息
来源: 评论