咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1061-1070 订阅
排序:
A Facial Emotion Detection and Classification System using Convoluted Neural Networks  22
A Facial Emotion Detection and Classification System using C...
收藏 引用
Proceedings of the 2022 European Symposium on Software engineering
作者: Oluyinka Iyabo Omotosho Johnson Oyeleke Department of Cyber Security Science Ladoke Akintola University of Technology Nigeria Department of Computer Science Ladoke Akintola University of Technology Nigeria
The ability to understand facial expressions is an important part of nonverbal communication. The value in understanding facial expressions is to gather information about how the other person is feeling and guide our ... 详细信息
来源: 评论
Towards an Automated Dissemination Process of cyber Threat Intelligence Data using STIX  6
Towards an Automated Dissemination Process of Cyber Threat I...
收藏 引用
6th International Workshop on Big Data and Information security, IWBIS 2021
作者: Briliyant, Obrina Candra Tirsa, Nusranto Pratama Hasditama, Maulana Andika Politeknik Siber Dan Sandi Negara Cyber Security Engineering Program Department of Cyber Security Bogor Indonesia National Cyber and Crypto Agency Depok Indonesia Faculty of Electrical Engineering and Informatics Budapest Computer Engineering Budapest Hungary
cyber Threat Intelligence (CTI) is an actionable, evidence-based knowledge management system of cyber threats data. CTI consists of 3 (three) major parts, namely information gathering, analysis, and dissemination. To ... 详细信息
来源: 评论
PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Man Su, Shuao Wang, Qian Li, Qi Zhou, Yuting Ma, Xiaojing Li, Zhengxiong School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Engineering University of Colorado Denver United States Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China
Fingerprint authentication has been extensively employed in contemporary identity verification systems owing to its rapidity and cost-effectiveness. Due to its widespread use, fingerprint leakage may cause sensitive i... 详细信息
来源: 评论
A Cloud Computing User Experience Focused Load Balancing Method Based on Modified CMA-ES Algorithm  18th
A Cloud Computing User Experience Focused Load Balancing Met...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Luo, Jihai Dong, Chen Chen, Zhenyi Xu, Li Chen, Tianci College of Computer and Data Science - Fuzhou University Xueyuan Road Fujian Fuzhou360108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
The development of the software and hardware has brought about the abundance and overflow of computing resources. Many Internet companies can lease idle computing resources based on the peak and valley cycles of usage... 详细信息
来源: 评论
Diabetic Condition Classification using Supervised and Unsupervised Machine Learning Techniques: A Use Case for HealthTech Industry  4
Diabetic Condition Classification using Supervised and Unsup...
收藏 引用
4th IEEE International Conference on Smart Technologies in Computing, Electrical and Electronics, ICSTCEE 2023
作者: Bongale, Anupkumar M. Biradar, Santoshkumar Pise, Priya Suke, Amita Priyadarshan Uke, Nilesh Dharrao, Deepak S. Symbiosis Institute Of Technology Department Of Aiml Pune Campus Pune India G H Raisoni College Of Engineering And Management Department Of Cyber Security And Data Science Pune Wagholi India Indira College Of Engineering And Management Department Of Ai And Ds Pune India Trinity Academy Of Engineering Pune India Symbiosis Institute Of Technology Department Of Cse Pune Campus Pune India
Diabetes is a very underestimated and, in many cases, an ignored disease. People do not understand the seriousness of diabetes. Many people think diabetes is just something because of which one cannot consume sweets. ... 详细信息
来源: 评论
Securing Edge Computing Environments with a Novel Chaos Theory-Based Lightweight Encryption Algorithm for Real-Time Data Protection
Securing Edge Computing Environments with a Novel Chaos Theo...
收藏 引用
Integrated Intelligence and Communication Systems (ICIICS), International Conference on
作者: V. Vanitha G. Saritha K. Hemalatha P. Sathish P. Gayathri Devi Department of of Computer Science and Engineering Kumaraguru College of Technology Coimbatore India Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Information Technology Sona College of Technology Salem India Department of Computer Science and Science (Cyber Security) Nandha Engineering College Erode India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India
In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor... 详细信息
来源: 评论
New Secure Sparse Inner Product with Applications to Machine Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Xu, Guowen Xu, Shengmin Ning, Jianting Huang, Xinyi Li, Hongwei Lu, Rongxing The school of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Guangzhou511458 China The College of Computer and Cyber Security Fujian Normal University Fuzhou China The school of Computer Science University of New Brunswick Canada
Sparse inner product (SIP) has the attractive property of overhead being dominated by the intersection of inputs between parties, independent of the actual input size. It has intriguing prospects, especially for boost... 详细信息
来源: 评论
An Untraceable Monitoring for Patients Using Wireless Medical Sensor Networks  4
An Untraceable Monitoring for Patients Using Wireless Medica...
收藏 引用
4th International Conference on Communication Technologies, ComTech 2023
作者: Khan, Muhammad Sibtain Ahmed Chaudhry, Shehzad Ashraf NUST Military College of Signals Department of Information Security Rawalpindi Pakistan Abu Dhabi University College of Engineering Department of Computer Science and Information Technology Abu Dhabi United Arab Emirates
Medical sensor network consists of an architecture in which medical sensor devices are implanted in human body to collect different types of sensitive data and share it on a network. These networks are connected with ... 详细信息
来源: 评论
Integration of Hybrid Energy Storage System and Photovoltaic with Improving Microgrid Performance using Supervised Attention Multi-Scale Temporal Convolutional Network  3
Integration of Hybrid Energy Storage System and Photovoltaic...
收藏 引用
3rd International Conference on Automation, Computing and Renewable Systems, ICACRS 2024
作者: Ramkumar, M. Siva Gopan, Gokul Arun, M. Giri, Jayant Al-Qawasmi, Khaled Dept of ECE SNS College of Technology India Saveetha University Chennai602105 India Department of Mechanical Engineering Yeshwantrao Chavan College of Engineering Nagpur India Division of Research and Development Lovely Professional University Phagwara India Saveetha University TN Chennai602105 India Department of Cyber Security Faculty of Information Technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Integrating Battery Energy Storage Systems (BESSs), Supercapacitor (SCs) and Photovoltaic (PV) panels into Microgrid (MGs) increases reliability through energy regulation and stabilization. However, the acquisition co... 详细信息
来源: 评论
cyberbullying Detection in Hinglish Language
Cyberbullying Detection in Hinglish Language
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Rajiv Kumar Vipin Rai Shivani Joshi Daksh Raj Amrita Amrita Department of Computer Science & Engineering Galgotias University Greater Noida U.P. India Department of Computer Science and Engineering Galgotias College of Engineering and Technology Greater Noida U.P. India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Greater Noida India
cyberbullying represents one of the most recent challenges stemming from the widespread adoption of social media platforms. With the surge in social media usage, the right to express oneself is being misused. Statisti... 详细信息
来源: 评论