咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1051-1060 订阅
排序:
Automated AI System for Online Phishing Detection and Mitigation
Automated AI System for Online Phishing Detection and Mitiga...
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Daksh Raj Rajiv Kumar Shivani Joshi Amrita Department of Computer Science and Engineering Galgotias College of Engineering and Technology Greater Noida U.P. India Department of Computer Science & Engineering Galgotias University Greater Noida U.P. India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Greater Noida India
This paper presents the critical challenge of phishing attacks by using advanced machine learning (ML) approaches to efficiently identify and mitigate malicious websites. Phishing websites betray users by impersonatin... 详细信息
来源: 评论
PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET
收藏 引用
IEEE Transactions on Vehicular technology 2024年 第5期73卷 6727-6739页
作者: Awais, Syed Muhammad Yucheng, Wu Mahmood, Khalid Akram, Muhammad Wahid Hussain, Shafiq Das, Ashok Kumar Park, Youngho Chongqing University School of Microelectronics and Communication Engineering Chongqing400044 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin64002 Taiwan University of Lahore Department of Software Engineering Punjab Lahore54590 Pakistan University of Sahiwal Department of Computer Science Punjab Sahiwal57000 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Telangana Hyderabad500032 India Kyungpook National University School of Electronics Engineering Daegu41566 Korea Republic of
The intellectual and immense attainment of a smart city and auto-mobile vehicles are gradually growing. This growth drives Vehicular Ad-Hoc Network (VANET), a broadly operated complex network for inter-vehicular trans... 详细信息
来源: 评论
Improving Reactive Power Management and Voltage Profiles in Hybrid Renewable Energy Grids using Heterogeneous Context-Aware Graph Convolutional Network  3
Improving Reactive Power Management and Voltage Profiles in ...
收藏 引用
3rd International Conference on Automation, Computing and Renewable Systems, ICACRS 2024
作者: Ramkumar, M. Siva Gopan, Gokul Arun, M. Giri, Jayant Al-Qawasmi, Khaled Dept of ECE SNS College of Technology India Saveetha University Chennai602105 India Department of Mechanical Engineering Yeshwantrao Chavan College of Engineering Nagpur India Division of Research and Development Lovely Professional University Phagwara India Saveetha University TN Chennai602105 India Department of Cyber Security Faculty of Information Technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
With the growing integration of renewable energy sources (RES) into power grids (PG), managing reactive power and maintaining voltage stability have become critical challenges. This paper proposes a novel approach usi... 详细信息
来源: 评论
Bcdnet: Balanced Coupling and Decoupling Network for Person Search
SSRN
收藏 引用
SSRN 2024年
作者: Lu, Zhengjie Peng, Jinjia Wang, Huibing Fu, Xianping School of Cyber Security and Computer Hebei University China Hebei Machine Vision Engineering Research Center China School of Computer Science and Technology Dalian Maritime University China
Person search aims to locate and identify individuals in unaltered scene images simultaneously. This task presents challenges in achieving collaborative optimization due to the intricate interplay between person detec... 详细信息
来源: 评论
CNN Based Model for Underwater Image Classification and Enhancement
CNN Based Model for Underwater Image Classification and Enha...
收藏 引用
Advances in Modern Age Technologies for Health and engineering Science (AMATHE), International Conference on
作者: Sahit Jamandlamudi Deva Priya Isravel Julia Punitha Malar Dhas Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India
The challenge of enhancing underwater images is difficult because of several issues, including color distortion, inadequate illumination, and dispersion from suspended particles in the water. Conventional picture enha... 详细信息
来源: 评论
Local Fault Diagnosis Analysis Based on Block Pattern of Regular Diagnosable Networks
收藏 引用
IEEE/ACM Transactions on Networking 2024年
作者: Lin, Limei Guan, Kaineng Huang, Yanze Hsieh, Sun-Yuan Chen, Gaolin Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Fault diagnosability can reflect the actual self diagnosing capability of a multiprocessor system better. However, people usually focus on the overall information and neglect the important local information. In order ... 详细信息
来源: 评论
Artificial Neural Network-Based Investigation of Zirconium Diboride Nanoparticles Reinforced in an Aluminium Alloy Matrix
Artificial Neural Network-Based Investigation of Zirconium D...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Raj, P. Marshal Vennila, C. Anush Kannan, N.K. Sasikala, R. Anandaram, Harishchander Alagarsamy, Manjunathan Jai Shriram Engineering College Avinashipalayam Department of Mechanical Engineering Tamil Nadu Tiruppur638660 India Alagappa Chettiar Government College of Engineering and Technology Department of Electrical and Electronics Engineering Tamilnadu Karaikudi630003 India Kathir College of Engineering Department of Ece Tamilnadu Coimbatore641062 India Karpagam College of Engineering Department of Cyber Security Tamilnadu Coimbatore641032 India Amrita School of Artificial Intelligence Amrita Vishwa Vidyapeetham Coimbatore India K.Ramakrishnan College of Technology Department of Electronics and Communication Engineering Tamilnadu Trichy621112 India
This study supports advanced materials by examining the properties of Al 7175 alloy reinforced with zirconium diboride (ZrB2) nanoparticles. Understanding and improving the wear resistance of composites is an importan... 详细信息
来源: 评论
EffNet-CNN:A Semantic Model for Image Mining&Content-Based Image Retrieval
收藏 引用
computer Modeling in engineering & Sciences 2025年 第5期143卷 1971-2000页
作者: Rajendran Thanikachalam Anandhavalli Muniasamy Ashwag Alasmari Rajendran Thavasimuthu Department of Computer Science and Engineering(Cyber Security) Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and TechnologyChennai600062India Department of Informatics and Computer Systems College of Computer ScienceKing Khalid University Abha61421Saudi Arabia Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia Department of Sustainable Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical Sciences Chennai602105India
Content-Based Image Retrieval(CBIR)and image mining are becoming more important study fields in computer vision due to their wide range of applications in healthcare,security,and various *** image retrieval system mai... 详细信息
来源: 评论
Higher Residuosity Attacks on Small RSA Subgroup Decision Problems  28th
Higher Residuosity Attacks on Small RSA Subgroup Decision Pr...
收藏 引用
28th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2025
作者: Zhao, Xiaopeng Cao, Zhenfu Dong, Xiaolei Liu, Zhusen School of Computer Science and Technology Donghua University Shanghai201620 China Department of Cryptography and Cyber Security East China Normal University Shanghai200062 China Hangzhou Innovation Institute of Beihang University Zhejiang Hangzhou311121 China
Secure two-party comparison, known as Yao’s millionaires’ problem, has been a fundamental challenge in privacy-preserving compu-tation. It enables two parties to compare their inputs without revealing the exact valu... 详细信息
来源: 评论
Revolutionizing Human Assessment: AI-Driven Analysis of SQ, EQ, and IQ
Revolutionizing Human Assessment: AI-Driven Analysis of SQ, ...
收藏 引用
cyber Resilience (ICCR), International Conference on
作者: Amer Ibrahim Wael Ali Nidal A. Al-Dmour Taher M. Ghazal American University in the Emirates Dubai United Arab Emirates Department of Computer Engineering College of Engineering Mutah University Jordan Computer Science Department Centre for Cyber Physical Systems Faculty of Information Science and Technology Khalifa University Center for Cyber Security Universiti Kebangsaan Malaysia (UKM) Bangi Selangor Malaysia
This study focuses on the estimate and analysis of social quotient (SQ), emotional quotient (EQ), and intellectual quotient (IQ) to investigate the synergy between artificial intelligence (AI) and human competence eva... 详细信息
来源: 评论