咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是1081-1090 订阅
排序:
Genetic-based Framework for Joint Latency and Cost Reduction in Edge-Fog Environments
Genetic-based Framework for Joint Latency and Cost Reduction...
收藏 引用
CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST)
作者: Sadra Galavani Soheil Mahdizadeh Mohammad Pourashory Amir Mahdi Rasouli Mohsen Ansari Department of Computer Engineering Cyber-Physical Systems Laboratory (CPSLab) Sharif University of Technology Tehran Iran
Reducing latency in the Internet of Things (IoT) remains a critical concern. While cloud computing facilitates communication, it falls short of meeting real-time requirements reliably. Edge and fog computing have emer... 详细信息
来源: 评论
Efficient Segmentation Approach for Different Medical Image Modalities
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3119-3135页
作者: Walid El-Shafai Amira A.Mahmoud El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie Department Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
This paper presents a study of the segmentation of medical *** paper provides a solid introduction to image enhancement along with image segmentation *** the first step,the morphological operations are employed to ens... 详细信息
来源: 评论
Cryptocurrency-Enabled Energy Trading in Micro-Grid Using Blockchain technology
Cryptocurrency-Enabled Energy Trading in Micro-Grid Using Bl...
收藏 引用
cyber Resilience (ICCR), International Conference on
作者: Ahsan Waseem Mohd Bilal Abhishek Bhardwaj M Saad Bin Arif Taher M. Ghazal Department of Electrical Engineering Aligarh Muslim University Aligarh India Computer Science Department Faculty of Information Science and Technology Centre for Cyber Physical Systems Khalifa University Center for Cyber Security Universiti Kebangsaan Malaysia (UKM) Bangi Selangor Malaysia
This article explores energy trading in grid-connected microgrids powered by renewable sources, utilizing cryptocurrency and blockchain technology. Through net metering, it emphasizes the proactive roles of prosumers ... 详细信息
来源: 评论
Rapid Autonomy Transfer in Reinforcement Learning with a Single Pre- Trained Critic  36
Rapid Autonomy Transfer in Reinforcement Learning with a Sin...
收藏 引用
36th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2024
作者: Karim, Muhammad Faraz Deng, Yunjie Niu, Luyao Ramasubramanian, Bhaskar Alexiou, Michail Sahabandu, Dinuka Poovendran, Radha Mertoguno, Sukarno Georgia Institute of Technology AtlantaGA United States University of Washington Network Security Lab Department of Electrical and Computer Engineering SeattleWA United States Western Washington University Electrical and Computer Engineering BellinghamWA United States Kennesaw State University MariettaGA United States
Reinforcement learning (RL) is a well-studied framework to solve complex decision-making problems in unknown environments. The actor-critic model in RL facilitates autonomy transfer by allowing agents to iteratively u... 详细信息
来源: 评论
An Improved Neural Classification Logic to Predict Kidney Disease Identification Using Medical Image Processing Principles
An Improved Neural Classification Logic to Predict Kidney Di...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Balaji, C.G. Balachandran, G. Imran, Md. Ujwala, S.Vamsi Edlabadkar, Ajinkya P. Fawareh, Hamed Department of Digital and Telecom Management Lavale Maharashtra Pune412115 India Jeppiaar Engineering College Department of Ece Rajiv Gandhi salai Chennai119 India Qis College of Engineering and Technology Department of S&h Pondur Road Vengamukkapalem Ongole Prakasam AndhraPradesh PrakasamDistrict523272 India Qis College of Engineering and Technology Department of Mba Pondur Road Vengamukkapalem Ongole Prakasam Andhra Pradesh PrakasamDistrict523272 India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India College of Information Technology Zarqa University Department of Cyber Security zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Kidney disease is a significant global health concern, requiring accurate and early diagnosis to prevent progression and ensure timely treatment. This study proposes an improved neural classification logic combining a... 详细信息
来源: 评论
Hybrid Segmentation Approach for Different Medical Image Modalities
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3454-3471页
作者: Walid El-Shafai Amira A.Mahmoud El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi E.Abd El-Samie Department Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
The segmentation process requires separating the image region into sub-regions of similar *** sub-region has a group of pixels having the same characteristics,such as texture or *** paper suggests an efficient hybrid ... 详细信息
来源: 评论
A Hybird Alignment Loss for Temporal Moment Localization with Natural Language
A Hybird Alignment Loss for Temporal Moment Localization wit...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Guo, Chao Liu, Daizong Zhou, Pan The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Electronic Information and Communication Huazhong University of Science and Technology China Wangxuan Institute of Computer Technology Peking University China
This paper addresses the problem of temporal moment localization with natural language, which aims to localize a target video moment according to a language description. A key challenge in this task is how to learn ef... 详细信息
来源: 评论
Image-Based Malware Classification: A Systematic Literature Review
Image-Based Malware Classification: A Systematic Literature ...
收藏 引用
Cryptography, Informatics, and cybersecurity (ICoCICs), IEEE International Conference on
作者: Yudhistira Dimas Wahyu Utomo Charles Lim Cyber Security Engineering Cyber and Crypto Polytechnic Bogor Indonesia Information Technology Department Swiss German University Tangerang Banten Indonesia
Malware, a shortened term for malicious software, refers to software or code designed to harm targets using malicious activities. Effective classification of malware is essential for developing robust detection and pr...
来源: 评论
Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication  23
Actuation Sequence Tampering Attack Detection on Field-Level...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network security
作者: Xiaodong Guo Chenxi Lyu Zhenyi Chen Xiaoding Wang Ruishen Bao Chen Dong College of Computer and Big Data Fuzhou University China Department of Computer Science and Engineering University of South Florida USA College of Computer and Cyber Security Fujian Normal University China
As a next-generation digital microfluidic biochip (DMFB) platform, micro-electrode-dot -array (MEDA) play an important role in the biochemical industry with more advanced fluidic manipulation and higher reliability. A... 详细信息
来源: 评论
Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks
Enhancing Side-Channel Attacks Prediction using Convolutiona...
收藏 引用
International Conference on Advanced computer Information Technologies (ACIT)
作者: Khalid Alemerien Sadeq Al-Suhemat Fadi Alsuhimat Enshirah Altarawneh Information Technology Department Tafila Technical University Tafila Jordan Faculty of Information Technology Isra University Amman Jordan Cyber Security Department Philadelphia University Amman Jordan Computer Engineering Department Hashemite University Zarqa Jordan
A common type of cyberattack is the side channel attack (SCA), which affects many devices and equipment connected to a network. These attacks have different types, like power attacks such as DPA, electromagnetic attac... 详细信息
来源: 评论