咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1071-1080 订阅
排序:
Analyzing darknet traffic through machine learning and neucube spiking neural networks
收藏 引用
Intelligent and Converged Networks 2024年 第4期5卷 265-283页
作者: Iman Akour Mohammad Alauthman Khalid M.O.Nahar Ammar Almomani Brij B.Gupta Information Systems Department College of Computing&InformaticsUniversity of SharjahSharjahUnited Arab Emirates Department of Information Security Faculty of Information TechnologyUniversity of PetraAmman 11196Jordan the Faculty of Computer Studies Arab Open UniversityRiyadh 11681Saudi Arabia Department of Information Technology Al-Huson University CollegeAl-Balqa Applied UniversityIrbid 19117Jordan the Department of Computer Information Science Higher Colleges of TechnologySharjahUnited Arab Emirates the Department of Computer Science and Information Engineering Asia UniversityTaichung 413ChinaSymbiosis Centre for Information TechnologySymbiosis International(Deemed University)Pune 412115India Centre of Inter-disciplinary Research&Innovation University of Petroleum and Energy StudiesDehradun 248007India
The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication *** detection of clandestine darknet traffic is therefore critical yet immensely *** research demonstrat... 详细信息
来源: 评论
Jupiter: a modern federated learning platform for regional medical care
收藏 引用
Science China(Information Sciences) 2021年 第10期64卷 152-165页
作者: Ju XING Jiadong TIAN Zexun JIANG Jiali CHENG Hao YIN Department of Automation Tsinghua University School of Cyberspace Security Beijing University of Posts and Telecommunications Department of Computer Science and Technology Tsinghua University College of Engineering Northeastern University
With the emergence of AI technologies, intrinsic value of data is released and takes tremendous effects on numerous industries. In the context of regional medical care, data sharing and cooperating is in high demand, ... 详细信息
来源: 评论
Outlier-aware Cross-Market Product Recommendation
Outlier-aware Cross-Market Product Recommendation
收藏 引用
International Conference on Big Data and Smart Computing (BIGCOMP)
作者: HyeoungGuk Kang Donghoon Lee Hyunsouk Cho Department of Cyber Security Ajou University Department of Software and Computer Engineering Ajou University Department of Artificial Intelligence Ajou University
Cross Market Recommendation (CMR) is a method of recommending in a resource-scarce market by using modelagnostic meta-learning. Generally, more interactions give more clues to identify the user preferences, so CF perf... 详细信息
来源: 评论
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment  21
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Jin, Zhenkun Huang, Shuai Nie, Xin Zhou, Xinlei Yi, Yuanyuan Zhou, Gefei Wuhan Business UIniversity Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on BigData Security Wuhan China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China
In this research, we tackled the complex task of aligning audio and lyrics content automatically. This task entails the precise matching of lyrics with the corresponding audio segments in songs, necessitating the coor... 详细信息
来源: 评论
Efficient Neuroimaging Data security and Encryption Using Pixel-Based Homomorphic Residue Number System
收藏 引用
SN computer Science 2023年 第6期4卷 1-10页
作者: Usman, Lateef Opeyemi Muniyandi, Ravie Chandren Usman, Morufat Adebola Research Centre for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Selangor UKM Bangi 43600 Malaysia Department of Computer Science Tai Solarin University of Education P.M.B. 2118 Ogun State Ijagun Ijebu-Ode Nigeria
In recent times, there has been an increasing attention in designing a homomorphic privacy-preserving classification method for neuro-images based on the residue number system (RNS) and deep CNN models. This article p... 详细信息
来源: 评论
Utilizing Machine Learning Techniques for Enhanced Predictive Maintenance in the Manufacturing Sector
Utilizing Machine Learning Techniques for Enhanced Predictiv...
收藏 引用
International Conference on Networking, Embedded and Wireless Systems (ICNEWS)
作者: Rashmi N. Wadibhasme Mallireddy Naresh G.Vikram Arun Sankar V V Suresh P F.Jermina Department of Information Technology YCCE Nagpur Maharashtra India Department of Computer Science Engineering Aditya College of Engineering and Technology Karunya School of Management Karunya Institute of Technology and Sciences Coimbatore Department of Mechanical Engineering Karpagam College of Engineering Coimbatore Mechanical Engineering Muthayammal Engineering College Department of Cyber Security Karpagam College of Engineering Coimbatore
The contributions of machine learning algorithms to predictive maintenance systems, such as classification, regression, and anomaly detection, are investigated to clarify their functions in forecasting equipment malfu... 详细信息
来源: 评论
AI-Driven Solutions for Cloud security Implementing Intelligent Threat Detection and Mitigation Strategies
AI-Driven Solutions for Cloud Security Implementing Intellig...
收藏 引用
Intelligent Computing and Emerging Communication Technologies (ICEC), International Conference on
作者: Rajashekar Reddy Yasani Putalpattu Muni Prasad Pattlola Srinivas N V Raja Sekhar Reddy Parag Jawarkar Vedaprada Raghunath Cloud Security Cloud Computing Cyber Security Department of Industrial Engineering University of Rome Tor Vergata Department of Computer Science and Engineering Malla Reddy Engineering College(A) Telangana India Department of IT MLR Institute of Technology India Electronics Engineering Shri Ramdeobaba College of Engineering and Management Nagpur Visveswaraya Technological University India
Adapting threat detection and response procedures is essential for businesses to stay ahead of the constantly developing cyberattack landscape. Researching cutting-edge tools like XDR, SIEM, SOAR, and NDR—which shed ... 详细信息
来源: 评论
Tomato Leaf Disease Detection through Machine Learning based Parallel Convolutional Neural Networks  7
Tomato Leaf Disease Detection through Machine Learning based...
收藏 引用
7th International Conference on Intelligent Computing and Control Systems, ICICCS 2023
作者: Shetty, Sahana Selvanayaki, S. Sumathi, T. Nageswari, C.Shobana Nisha Devi, K. Suganyadevi, S. FET-Jain Department of CSE-AIML Cyber Security School of CSE Jayanagar Bangalore India Saveetha Engineering College Department of Artificial Intelligence and Data Science Chennai India Dr.Mahalingam College of Engineering and Technology Department of Information Technology Pollachi India R.M.D. Engineering College Department of ECE Kavaraipettai601206 India Bannari Amman Institute of Technology Department: Artificial Intelligence and Data Science Sathyamangalam India KPR Institute of Engineering and Technology Department of ECE Coimbatore India
Agriculture is the primary economic activity in a significant number of nations. Yet, plant-related illnesses are the most difficult obstacle for farmers to overcome. The leaf is the portion of the plant that is notic... 详细信息
来源: 评论
Personalized Shopping Experiences: Leveraging Big Data Analytics in E-commerce for Enhanced Customer Engagement
Personalized Shopping Experiences: Leveraging Big Data Analy...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Raja, Abdullah Siddique, Fatima Hasan, Muhammad Zulkifl Hussain, Muhammad Zunnurain Altaf, Junaid Kousar, Shagufta University of Central Punjab Faculty of Information Technology and Computer Science Lahore Pakistan University Putra Malaysia Researcher Cyber Security Center Malaysia Bahria University Lahore Campus Department of Computer Science Lahore Pakistan Gulab Devi Educational Complex Lahore Pakistan Applied Science Research Center Applied Science Private University Amman Jordan
E-commerce systems have integrated big data analytics (BDA) as a core element, enabling personalized shopping experiences, crucial for customer loyalty and satisfaction. This research explores how intentional use of d... 详细信息
来源: 评论
Learners’ Privacy-Preserving Scheme for Ranking Data Sensitivity in Mobile Learning System
Learners’ Privacy-Preserving Scheme for Ranking Data Sensit...
收藏 引用
Electrical and computer engineering Researches (ICECER), International Conference on
作者: Muhammad Kudu Muhammad Olayemi Mikail Olaniyi Francis Osang Ishaq Oyebisi Oyefolahan Ojeniyi Joseph Adebayo Idris Mohammed Kolo Department of Computer Science Federal University Technology Minna Nigeria Department of Cyber Security National Open University of Nigeria Abuja Nigeria Department of Computer Science National Open University of Nigeria Abuja Nigeria Africa Centre of Excellence on Technology Enhanced Learning National Open University of Nigeria Abuja Nigeria Department of Cyber Security Federal University Technology Minna Nigeria
Mobile Learning System (MLS) is facing new challenges in terms of privacy, such as data collection, storage, and sharing because of the core infrastructure and network that enables cloud computing services. Most of th... 详细信息
来源: 评论