咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1021-1030 订阅
排序:
Classification of Brain Tumor Images using Transfer Learning
Classification of Brain Tumor Images using Transfer Learning
收藏 引用
Automation, Computing and Renewable Systems (ICACRS), International Conference on
作者: Loga Prakash. T Tharun Kumar. S Harshith. E Elangovan. T Dept of AI & DS Karpagam Academy of Higher Education Department of Computer Science and Engineering(Cyber Security) Karpagam Academy of Higher Education
Brain tumors provide a substantial risk to human well-being because of their complex nature and the challenges linked to identifying and treating them at an early stage. Precise diagnosis is crucial for efficient inte... 详细信息
来源: 评论
Invulnerability Optimization of Communication Network Based on Analog Attack Strategy  11th
Invulnerability Optimization of Communication Network Based ...
收藏 引用
11th International Conference on computer engineering and Networks, CENet2021
作者: Xia, Lingling Ni, Xueli Jing, Zhengjun Liu, Jiayin Zhang, Yan Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China College of Computer Engineering Jiangsu University of Technology Changzhou213001 China Jiangsu Province Electronic Data Forensics and Analysis Engineering Research Center Nanjing210031 China Key Laboratory of Digital Forensics of Jiangsu Provincial Public Security Department Nanjing210031 China
Invulnerability of communication networks directly related to security and reliability of networks has received increasing attention in recent years. In order to enhance the destruction resisting capacity of communica... 详细信息
来源: 评论
Development of a prototype of an intelligent system for predicting the quality of dairy manufacture  11
Development of a prototype of an intelligent system for pred...
收藏 引用
11th IEEE International Conference on Intelligent Systems, IS 2022
作者: Smitiukh, Yaroslav Samoilenko, Yuliia Kostiuk, Yuliia Kryvoruchko, Olena Stepashkina, Kateryna National University of Food Technologies Department of Automation and Computer Technologies of Control Systems Kyiv Ukraine State University of Trade and Economics Department of Software Engineering and Cyber Security Kyiv Ukraine
The technological process of the churning process in continuous butter manufacture were considered. The qualitative indicator of the water content of butter was modeled on the basis of a set of industrial data using a... 详细信息
来源: 评论
New health-state assessment model based on belief rule base with interpretability
收藏 引用
Science China(Information Sciences) 2021年 第7期64卷 209-223页
作者: Zhijie ZHOU You CAO Guanyu HU Youmin ZHANG Shuaiwen TANG Yuan CHEN High-Tech Institute of Xi'an Department of Information and Control Engineering Xi'an University of Technology School of Computer Science and Information Security Guilin University of Electronic Technology Department of Mechanical Industrial and Aerospace Engineering Concordia University
Health-state assessment is the foundation of optimal-maintenance decision-making for complex systems to maintain reliability and safety. Generating the assessment results in a convincing and interpretable way to avoid... 详细信息
来源: 评论
Comparative Assessment of Brain Tumor Detection Techniques: A Comparative Study
Comparative Assessment of Brain Tumor Detection Techniques: ...
收藏 引用
Advanced Computing & Communication Technologies (ICACCTech), International Conference on
作者: Pooja Dahiya Anshu Sharma Manisha Sharma Vijay Bharti Department of Computer Science and Engineering(Cyber Security) Panipat Institute of Engineering and Technology Samalkha Affiliated by Kurukshetra University Panipat India Department of Computer Science and Engineering Panipat Institute of Engineering and Technology Samalkha Affiliated by Kurukshetra University Panipat India Department of Computer Application Panipat Institute of Engineering and Technology Samalkha Affiliated by Kurukshetra University Panipat India Department of Computer Science and Engineering Apiit SD India Panipat Panipat India
Medical picture segmentation refers to the process of categorizing the different parts of an image into anatomical components or defining the changes in structure and intensity in relation to the underlying functional... 详细信息
来源: 评论
Detection and Recovery of RFID Harmonic Signal for Wi-Fi Interference
收藏 引用
Journal of Communications and Information Networks 2025年 第4期9卷 1-10页
作者: Chao Gong Ping Li Panlong Yang Zhao Lv School of Computer Science and Technology Anhui University Hefei 230000 China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Ma'anshan 243032 China School of Computer science School of Cyber Science and Engineering Nanjing University of Information Science and Technology Nanjing 210000 China
In the realm of the Internet of things (IoT), radio frequency identification (RFID) technology is essential for linking physical objects to digital data. The introduction of harmonic technology has expanded RFID's... 详细信息
来源: 评论
An Automated Memory Image Forensic Scheme for Linux Systems Based on Containerization technology
An Automated Memory Image Forensic Scheme for Linux Systems ...
收藏 引用
cyber Science and technology Congress (cyberSciTech), IEEE
作者: Ruihao Chen Hui Lin Qingxin Lin Hui Ju College of Computer and Cyber Security Fujian Normal University Fuzhou Fujian China Department of Computer Engineering Fuzhou University Zhicheng College Fuzhou Fujian China
With the advancement of anti-forensic techniques and network attack technologies aided by fileless methods, traditional forensics techniques based on non-volatile storage devices are increasingly encountering obstacle... 详细信息
来源: 评论
Design of Provably Secure Authentication Protocol for Edge-Centric Maritime Transportation System
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2023年 第12期24卷 14536-14545页
作者: Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Ghaffar, Zahid Khan, Muhammad Khurram Das, Ashok Kumar National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan King Saud University Center of Excellence in Information Assurance Riyadh11653 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The epidemic growth of the Internet of Things (IoT) objects have revolutionized Maritime Transportation Systems (MTS). Though, it becomes challenging for the centralized cloud-centric framework to fulfil the applicati... 详细信息
来源: 评论
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 929-955页
作者: Lamiaa A.Abou Elazm Walid El-Shafai Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie Department of Microelectronics Electronics Research InstituteAlnozhaEgypt Department of Electronics and Electrical Communications Engineering Ain Shams UniversityCairoEgypt Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh 11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh 11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric *** of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of... 详细信息
来源: 评论
Hyperspectral Images-Based Crop Classification Scheme for Agricultural Remote Sensing
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 303-319页
作者: Imran Ali Zohaib Mushtaq Saad Arif Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Department of Mechanical Engineering National Taiwan University of Science and TechnologyTaipei City106335TaiwanChina Department of Electrical Engineering Riphah International UniversityIslamabad44000Pakistan Department of Mechanical Engineering HITEC University TaxilaTaxila Cantt.47080Pakistan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia
Hyperspectral imaging is gaining a significant role in agricultural remote sensing *** data unit is the hyperspectral cube which holds spatial information in two dimensions while spectral band information of each pixe... 详细信息
来源: 评论