咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是1091-1100 订阅
排序:
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
收藏 引用
computer Systems Science & engineering 2023年 第11期47卷 2361-2380页
作者: Musheer Ahmad Reem Ibrahim Alkanhel Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many *** modern-day applications,patient data usually holds clinical imagery,records,and other medical ***,the Internet of Medi... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms and Datasets for Detecting cyberbullying on Social Media Platforms
Comparative Analysis of Machine Learning Algorithms and Data...
收藏 引用
Computing and Intelligent Reality Technologies (ICCIRT), International Conference on
作者: Anusha Palagati Santhosh Kumar Balan S Arun Joe Babulo Laxmi Raja K.K. Natarajan Rajkumar Kalimuthu Dept. of Computer Science and Engineering Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Dept. of Computer Science and Engineering SMIEEE Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Department of Computer Applications K.S.R College of Arts and Science for Women Tiruchengode Tamilnadu India Department of Cyber Security Karpagam Academy of Higher Education Coimbatore Tamilnadu India College of Engineering and Technology University of Technology and Applied Sciences Al Mussanah Sultanate of Oman Department of Cyber Security Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India
cyberbullying is defined as sharing of undesirable material in the cyberspace, primarily- the use of the social sites that instigate hostility and create feelings of hatred among the individuals. Another increasing th... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Ali Hamza Najim Ali Jafer Mahdi Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AIKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Department of Scientific Affairs AI-Zahraa University for Women Bangi Malaysia Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Innovative grid technology leverages Information and Communication technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a “novel three-tier hierarchical framework for smart homes w... 详细信息
来源: 评论
Using AI and Natural Language Processing to Enhance Consumer Banking Decision-Making
Using AI and Natural Language Processing to Enhance Consumer...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart Systems, ICEMPS 2024
作者: Temara, Sheetal Samanthapudi, Sagar Varma Rohella, Piyush Gupta, Ketan Ashokkumar, S.R. University of The Cumberlands Dept of Computer & Information Sciences WilliamsburgKY United States The Polis Center Indiana University Purdue University Indianapolis Applied Data Science IndianapolisIN United States Payments & Commerce GoDaddy EdmondsWA United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Centre For Blockchain and Cyber Security Department of Computer and Communication Engineering Tamil Nadu Coimbatore India
This technical summary outlines the use of Artificial Intelligence (AI) and Natural Language Processing (NLP) to beautify patron banking decision-making. AI-based banking systems can autonomously identify patterns in ... 详细信息
来源: 评论
New Coefficient Grouping for Complex Affine Layers
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 520-532页
作者: Qiao Wenxiao Sun Siwei Chen Ying Hu Lei Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing 100085 China School of Cyber Security University of Chinese Academy of Sciences Beijing 100049 China School of Cryptology University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Cryptology Beijing 100878 China Department of Cryptology Science & Technology Beijing Electronic Science & Technology Institute Beijing 100070 China
Recently, designing symmetric primitives for applications in cryptographic protocols including multi-party computation, fully homomorphic encryption, and zero-knowledge proofs has become an important research topic. A... 详细信息
来源: 评论
An Adaptive User Service Deployment Strategy for Mobile Edge Computing
收藏 引用
China Communications 2022年 第10期19卷 238-249页
作者: Gang Li Jingbo Miao Zihou Wang Yanni Han Hongyan Tan Yanwei Liu Kun Zhai Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 101408China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029China Sunwise Intelligent Technology Company Beijing 100190China
Mobile edge computing(MEC) is a cloud server running at the edge of a mobile network, which can effectively reduce network communication delay. However, due to the numerous edge servers and devices in the MEC, there m... 详细信息
来源: 评论
AntiMal: an Approach of Malware Detection Employing Swin Transformer  23
AntiMal: an Approach of Malware Detection Employing Swin Tra...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network security
作者: Chenxi Lyu Yinan Yao Xiaodong Guo Zihong Huang Chen Dong Yuanyuan Zhang Zhenyi Chen College of Computer and Data Science Fuzhou University China College of Computer and Cyber Security Fujian Normal University China Department of Computer Science and Engineering University of South Florida USA
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t... 详细信息
来源: 评论
A review of DNA cryptograhic approaches  2
A review of DNA cryptograhic approaches
收藏 引用
2nd IEEE International Conference on cyberspace, cyber NIGERIA 2020
作者: Iliyasu, Mohammed Awwal Abisoye, Opeyemi Aderiike Bashir, Sulaimon Adebayo Ojeniyi, Joseph Adebayo Department of Computer Science Federal University of Technology Minna Nigeria Department of Cyber Security Federal University of Technology Minna Nigeria
Cryptography is described as the encryption analysis of data or secret data writing using logical and mathematical data protection principles. It is an information technology for banking, medical systems, transportati... 详细信息
来源: 评论
An overview Scientific Cloud computing Web-based cloud services issues and challenges  23
An overview Scientific Cloud computing Web-based cloud servi...
收藏 引用
Proceedings of the 5th International Conference on Information Management & Machine Intelligence
作者: Sayan Majumder Kommisetti Murthy Raju Nancy Arya Nazeer Shaik Sanjay Tiwari Akanksha Singh Department of cyber security The Heritage Academy India Department of Electronics and Communication Engineering Shri Vishnu Engineering College For Women India Department of Computer Science and Engineering Shree Guru Gobind Singh Tricentenary University India Department Of Computer Science and Engineering Srinivasa Ramanujan Institute Of Technology-- Autonomous- India Department of Computer Science and Engineering ARYA Institute of Engineering Technology and Management India Computer Science and Engineering Babu Banarasi Das University India
This research investigates the crucial role of cloud computing services in web development for creating scalable applications. Our study explores the benefits, challenges, and best practices associated with leveraging...
来源: 评论
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCNN Model and GWO Algorithm for Social Media Sentiment Analysis
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCN...
收藏 引用
International conference of Electronics, Communication and Aerospace technology (ICECA)
作者: V. S. Raj Kumar T. Kumaresan P. Rajesh Kanna S. Jagadeesan P. Showmiya P. Nithin Department of Artificial Intelligence and Data Science Bannari Amman Institute of Technology Erode India Department of Computer Science and Engineering Bannari Amman Institute of Technology Erode India Department of Computer Science and Engineering Nandha Engineering College Erode India Department of Computer Science – Cyber Security Nehru Institute of Technology Coimbatore India Department of Artificial Intelligence and Machine Learning Bannari Amman Institute of Technology Erode India
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio... 详细信息
来源: 评论