咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1031-1040 订阅
排序:
Interference Mitigation in D2D Communication Underlying Cellular Networks:Towards Green Energy
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 45-58页
作者: Rana Zeeshan Ahamad Abdul Rehman Javed Shakir Mehmood Mohammad Zubair Khan Abdulfattah Noorwali Muhammad Rizwan Department of Computer Science Xian Jiaotong UniversityXi’anChina Department of Cyber Security Air UniversityIslamabadPakistan Department of Information and Technology Northwest UniversityXianChina Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinahSaudi Arabia Department of Electrical Engineering Umm Al-Qura UniversityMakkahSaudi Arabia Department of Computer Science Kinnaird College for WomenLahore54000Pakistan
Device to Device(D2D)communication is emerging as a new participant promising technology in 5G cellular networks to promote green energy networks.D2D communication can improve communication delays,spectral efficiency,... 详细信息
来源: 评论
An Improved Clone Node Detection System Based on Enhanced Neural Optimization Strategy Over Wireless Sensor Network Environment
An Improved Clone Node Detection System Based on Enhanced Ne...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Sheela, D. Sagar, M. Vidya Rao, S Kondala Ranjith, S. Shahare, D.Y. Al Sherideh, A. Dept of Ece Chennai India Qis College of Engineering and Technology Department of Mba Pondur Road Vengamukkapalem Ongole Prakasam AndhraPradesh PrakasamDistrict523272 India Qis College of Engineering and Technology Department of S&h Pondur Road Vengamukkapalem Ongole Prakasam AndhraPradesh PrakasamDistrict523272 India Jeppiaar Engineering College Department of Ece Rajiv Gandhi salai Chennai119 India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Wireless Sensor Networks (WSNs) are widely used in diverse applications, including environmental monitoring and military surveillance. However, their open and distributed nature makes them vulnerable to clone node att... 详细信息
来源: 评论
A Deepfake Image Classifier System for real and Doctored Image Differentiation
A Deepfake Image Classifier System for real and Doctored Ima...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: Juanith Mathew Thomas V. Ebenezer Rohan Paul Richard Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The sudden proliferation of deepfake technology has raised concerns about the authenticity and integrity of digital media. In response to these concerns, this paper presents a Deepfake image classifier system designed... 详细信息
来源: 评论
Comparative analysis of different scene for face mask detection based on YOLOv4  3
Comparative analysis of different scene for face mask detect...
收藏 引用
3rd International Conference on Intelligent Computing and Human-computer Interaction, ICHCI 2022
作者: Cheng, Zuozheng Zhang, Chaoran Zhu, Yudong Department of Computer Science and Technology Zhengzhou University Zhengzhou450001 China Department of Information Security China University of Mining and Technology Xuzhou221116 China Department of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China
The 2019-nCoV can be transmitted through respiratory droplets and other methods, which greatly endangers public health security. Wearing masks correctly has been proven to be one of the effective means to prevent viru... 详细信息
来源: 评论
Diagnosis of Plant Leaf Disease using Vision Transformer
Diagnosis of Plant Leaf Disease using Vision Transformer
收藏 引用
International Conference on Communications and Signal Processing
作者: Ashik Sundaraj Deva Priya Isravel Julia Punitha Malar Dhas Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India
In precision agriculture, it is crucial to have a reliable system for identifying diseases and suggesting measures to maintain crop health and enhance yield performance. Addressing the persistent challenge of accurate... 详细信息
来源: 评论
Evolutionary Algorithms for Deep Learning in Secure Network Environments
Evolutionary Algorithms for Deep Learning in Secure Network ...
收藏 引用
2024 IEEE International Conference on Intelligent Systems and Advanced Applications, ICISAA 2024
作者: Seva, Banothu Jain, Ratnesh Khare, Neha Choudhury, Hussain Ahmed Chakravarthi, M Ayyappa Tomer, Nitin MLR Institute of Technology Dept. of CSE Telangana Hyderabad India GGITS Dept of Computer Science & Design M.P Jabalpur India IES Institute of Technology and Management IES University Department of Computer Science & Engineering M.P Bhopal462044 India Barak Valley Engineering College Department of CSE Assam Karimganj India KKR & KSR Institute of Technology and Sciences Dept. of CSE - Data Science AP Guntur India GGITS Cyber Security & Blockchain Dept of IOT M.P. Jabalpur India
Hackers are getting better at breaking into protected networks, making network security an arms race. Today, combining EAs with DL to combat these risks is cuttingedge. This research illustrates how EAs and DL may enh... 详细信息
来源: 评论
Using Cycling 3D Chaotic Map and DNA Sequences for Introducing a Novel Algorithm for Color Image Encryption *
Using Cycling 3D Chaotic Map and DNA Sequences for Introduci...
收藏 引用
2022 International Conference on cyber Resilience, ICCR 2022
作者: Sahlabadi, Mahdi Saberikamarposhti, Morteza Muniyandi, Ravie Chandren Shukur, Zarina University Kebangsaan Malaysia Research Centre for Cyber Security Faculty of Information Science and Technology Selangor Malaysia Islamic Azad University South Tehran Branch Department of Computer Engineering Tehran Iran Faculty of Information Science and Technology Selangor Malaysia
Today, social communication through the Internet has become more popular and has become a crucial part of our daily life. Naturally, sending and receiving various data through the Internet has also grown a lot. Keepin... 详细信息
来源: 评论
Power amplifier circuit defect detection based on improved Patch SVDD
Power amplifier circuit defect detection based on improved P...
收藏 引用
作者: Xie, Zhonghui Kong, Wa Zhou, Xinyu Zhang, Wence Zhong, Yujie Xia, Jing School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China Department of Electronic Information Engineering Hong Kong Polytechnic University Hong Kong
In the manufacturing process of power amplifier (PA), various defects on the circuit surface will seriously affect the circuit performance and its operation. To solve the above problems, this article proposes a circui... 详细信息
来源: 评论
Look One and More: Distilling Hybrid Order Relational Knowledge for Cross-Resolution Image Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Ge, Shiming Zhang, Kangkai Liu, Haolin Hua, Yingying Zhao, Shengwei Jin, Xin Wen, Hao Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Department of Cyber Security Beijing Electronic Science and Technology Institute China CloudWalk Technology Co. Ltd China
In spite of great success in many image recognition tasks achieved by recent deep models, directly applying them to recognize low-resolution images may suffer from low accuracy due to the missing of informative detail... 详细信息
来源: 评论
A Symmetric TDMA Mechanism to Optimize the Performance of the Body Sensor Network for Sports Application  5
A Symmetric TDMA Mechanism to Optimize the Performance of th...
收藏 引用
5th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2023
作者: Mustafa, Mohammed M. Khalifa, Ahmed A. Cengiz, Korhan Sri Krishna College of Engineering & Technology Department of Information Technology Coimbatore India College of Information Technology University of Fujairah Department of Networking and Security Fujairah United Arab Emirates National Telecommunication Institute Switching and Traffic Department Cairo Egypt Istinye University Department of Computer Engineering Zeytinburnu Istanbul Turkey
The body sensor network plays a vital role in the analysis of the gait analysis of human, sensing the various events happening in the human body. The communication that takes place between the sensed device and the pr... 详细信息
来源: 评论