咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是1041-1050 订阅
排序:
A Facial Emotion Detection and Classification System using Convoluted Neural Networks  22
A Facial Emotion Detection and Classification System using C...
收藏 引用
Proceedings of the 2022 European Symposium on Software engineering
作者: Oluyinka Iyabo Omotosho Johnson Oyeleke Department of Cyber Security Science Ladoke Akintola University of Technology Nigeria Department of Computer Science Ladoke Akintola University of Technology Nigeria
The ability to understand facial expressions is an important part of nonverbal communication. The value in understanding facial expressions is to gather information about how the other person is feeling and guide our ... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
cyberbullying Detection in Hinglish Language
Cyberbullying Detection in Hinglish Language
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Rajiv Kumar Vipin Rai Shivani Joshi Daksh Raj Amrita Amrita Department of Computer Science & Engineering Galgotias University Greater Noida U.P. India Department of Computer Science and Engineering Galgotias College of Engineering and Technology Greater Noida U.P. India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Greater Noida India
cyberbullying represents one of the most recent challenges stemming from the widespread adoption of social media platforms. With the surge in social media usage, the right to express oneself is being misused. Statisti... 详细信息
来源: 评论
Integration of Hybrid Energy Storage System and Photovoltaic with Improving Microgrid Performance using Supervised Attention Multi-Scale Temporal Convolutional Network  3
Integration of Hybrid Energy Storage System and Photovoltaic...
收藏 引用
3rd International Conference on Automation, Computing and Renewable Systems, ICACRS 2024
作者: Ramkumar, M. Siva Gopan, Gokul Arun, M. Giri, Jayant Al-Qawasmi, Khaled Dept of ECE SNS College of Technology India Saveetha University Chennai602105 India Department of Mechanical Engineering Yeshwantrao Chavan College of Engineering Nagpur India Division of Research and Development Lovely Professional University Phagwara India Saveetha University TN Chennai602105 India Department of Cyber Security Faculty of Information Technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Integrating Battery Energy Storage Systems (BESSs), Supercapacitor (SCs) and Photovoltaic (PV) panels into Microgrid (MGs) increases reliability through energy regulation and stabilization. However, the acquisition co... 详细信息
来源: 评论
New Secure Sparse Inner Product with Applications to Machine Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Xu, Guowen Xu, Shengmin Ning, Jianting Huang, Xinyi Li, Hongwei Lu, Rongxing The school of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Guangzhou511458 China The College of Computer and Cyber Security Fujian Normal University Fuzhou China The school of Computer Science University of New Brunswick Canada
Sparse inner product (SIP) has the attractive property of overhead being dominated by the intersection of inputs between parties, independent of the actual input size. It has intriguing prospects, especially for boost... 详细信息
来源: 评论
Securing Edge Computing Environments with a Novel Chaos Theory-Based Lightweight Encryption Algorithm for Real-Time Data Protection
Securing Edge Computing Environments with a Novel Chaos Theo...
收藏 引用
Integrated Intelligence and Communication Systems (ICIICS), International Conference on
作者: V. Vanitha G. Saritha K. Hemalatha P. Sathish P. Gayathri Devi Department of of Computer Science and Engineering Kumaraguru College of Technology Coimbatore India Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Information Technology Sona College of Technology Salem India Department of Computer Science and Science (Cyber Security) Nandha Engineering College Erode India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India
In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor... 详细信息
来源: 评论
Artificial Neural Network-Based Investigation of Zirconium Diboride Nanoparticles Reinforced in an Aluminium Alloy Matrix
Artificial Neural Network-Based Investigation of Zirconium D...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Raj, P. Marshal Vennila, C. Anush Kannan, N.K. Sasikala, R. Anandaram, Harishchander Alagarsamy, Manjunathan Jai Shriram Engineering College Avinashipalayam Department of Mechanical Engineering Tamil Nadu Tiruppur638660 India Alagappa Chettiar Government College of Engineering and Technology Department of Electrical and Electronics Engineering Tamilnadu Karaikudi630003 India Kathir College of Engineering Department of Ece Tamilnadu Coimbatore641062 India Karpagam College of Engineering Department of Cyber Security Tamilnadu Coimbatore641032 India Amrita School of Artificial Intelligence Amrita Vishwa Vidyapeetham Coimbatore India K.Ramakrishnan College of Technology Department of Electronics and Communication Engineering Tamilnadu Trichy621112 India
This study supports advanced materials by examining the properties of Al 7175 alloy reinforced with zirconium diboride (ZrB2) nanoparticles. Understanding and improving the wear resistance of composites is an importan... 详细信息
来源: 评论
Towards an Automated Dissemination Process of cyber Threat Intelligence Data using STIX  6
Towards an Automated Dissemination Process of Cyber Threat I...
收藏 引用
6th International Workshop on Big Data and Information security, IWBIS 2021
作者: Briliyant, Obrina Candra Tirsa, Nusranto Pratama Hasditama, Maulana Andika Politeknik Siber Dan Sandi Negara Cyber Security Engineering Program Department of Cyber Security Bogor Indonesia National Cyber and Crypto Agency Depok Indonesia Faculty of Electrical Engineering and Informatics Budapest Computer Engineering Budapest Hungary
cyber Threat Intelligence (CTI) is an actionable, evidence-based knowledge management system of cyber threats data. CTI consists of 3 (three) major parts, namely information gathering, analysis, and dissemination. To ... 详细信息
来源: 评论
Higher Residuosity Attacks on Small RSA Subgroup Decision Problems  28th
Higher Residuosity Attacks on Small RSA Subgroup Decision Pr...
收藏 引用
28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025
作者: Zhao, Xiaopeng Cao, Zhenfu Dong, Xiaolei Liu, Zhusen School of Computer Science and Technology Donghua University Shanghai201620 China Department of Cryptography and Cyber Security East China Normal University Shanghai200062 China Hangzhou Innovation Institute of Beihang University Zhejiang Hangzhou311121 China
Secure two-party comparison, known as Yao’s millionaires’ problem, has been a fundamental challenge in privacy-preserving compu-tation. It enables two parties to compare their inputs without revealing the exact valu... 详细信息
来源: 评论
An Untraceable Monitoring for Patients Using Wireless Medical Sensor Networks  4
An Untraceable Monitoring for Patients Using Wireless Medica...
收藏 引用
4th International Conference on Communication Technologies, ComTech 2023
作者: Khan, Muhammad Sibtain Ahmed Chaudhry, Shehzad Ashraf NUST Military College of Signals Department of Information Security Rawalpindi Pakistan Abu Dhabi University College of Engineering Department of Computer Science and Information Technology Abu Dhabi United Arab Emirates
Medical sensor network consists of an architecture in which medical sensor devices are implanted in human body to collect different types of sensitive data and share it on a network. These networks are connected with ... 详细信息
来源: 评论