咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1111-1120 订阅
排序:
Image-Based Malware Classification: A Systematic Literature Review
Image-Based Malware Classification: A Systematic Literature ...
收藏 引用
Cryptography, Informatics, and cybersecurity (ICoCICs), IEEE International Conference on
作者: Yudhistira Dimas Wahyu Utomo Charles Lim Cyber Security Engineering Cyber and Crypto Polytechnic Bogor Indonesia Information Technology Department Swiss German University Tangerang Banten Indonesia
Malware, a shortened term for malicious software, refers to software or code designed to harm targets using malicious activities. Effective classification of malware is essential for developing robust detection and pr...
来源: 评论
Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication  23
Actuation Sequence Tampering Attack Detection on Field-Level...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network security
作者: Xiaodong Guo Chenxi Lyu Zhenyi Chen Xiaoding Wang Ruishen Bao Chen Dong College of Computer and Big Data Fuzhou University China Department of Computer Science and Engineering University of South Florida USA College of Computer and Cyber Security Fujian Normal University China
As a next-generation digital microfluidic biochip (DMFB) platform, micro-electrode-dot -array (MEDA) play an important role in the biochemical industry with more advanced fluidic manipulation and higher reliability. A... 详细信息
来源: 评论
Enhancing Side-Channel Attacks Prediction using Convolutional Neural Networks
Enhancing Side-Channel Attacks Prediction using Convolutiona...
收藏 引用
International Conference on Advanced computer Information Technologies (ACIT)
作者: Khalid Alemerien Sadeq Al-Suhemat Fadi Alsuhimat Enshirah Altarawneh Information Technology Department Tafila Technical University Tafila Jordan Faculty of Information Technology Isra University Amman Jordan Cyber Security Department Philadelphia University Amman Jordan Computer Engineering Department Hashemite University Zarqa Jordan
A common type of cyberattack is the side channel attack (SCA), which affects many devices and equipment connected to a network. These attacks have different types, like power attacks such as DPA, electromagnetic attac... 详细信息
来源: 评论
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
收藏 引用
computer Systems Science & engineering 2023年 第11期47卷 2361-2380页
作者: Musheer Ahmad Reem Ibrahim Alkanhel Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many *** modern-day applications,patient data usually holds clinical imagery,records,and other medical ***,the Internet of Medi... 详细信息
来源: 评论
A Hybird Alignment Loss for Temporal Moment Localization with Natural Language
A Hybird Alignment Loss for Temporal Moment Localization wit...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Guo, Chao Liu, Daizong Zhou, Pan The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Electronic Information and Communication Huazhong University of Science and Technology China Wangxuan Institute of Computer Technology Peking University China
This paper addresses the problem of temporal moment localization with natural language, which aims to localize a target video moment according to a language description. A key challenge in this task is how to learn ef... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms and Datasets for Detecting cyberbullying on Social Media Platforms
Comparative Analysis of Machine Learning Algorithms and Data...
收藏 引用
Computing and Intelligent Reality Technologies (ICCIRT), International Conference on
作者: Anusha Palagati Santhosh Kumar Balan S Arun Joe Babulo Laxmi Raja K.K. Natarajan Rajkumar Kalimuthu Dept. of Computer Science and Engineering Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Dept. of Computer Science and Engineering SMIEEE Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Department of Computer Applications K.S.R College of Arts and Science for Women Tiruchengode Tamilnadu India Department of Cyber Security Karpagam Academy of Higher Education Coimbatore Tamilnadu India College of Engineering and Technology University of Technology and Applied Sciences Al Mussanah Sultanate of Oman Department of Cyber Security Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India
cyberbullying is defined as sharing of undesirable material in the cyberspace, primarily- the use of the social sites that instigate hostility and create feelings of hatred among the individuals. Another increasing th... 详细信息
来源: 评论
New Coefficient Grouping for Complex Affine Layers
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 520-532页
作者: Qiao Wenxiao Sun Siwei Chen Ying Hu Lei Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing 100085 China School of Cyber Security University of Chinese Academy of Sciences Beijing 100049 China School of Cryptology University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Cryptology Beijing 100878 China Department of Cryptology Science & Technology Beijing Electronic Science & Technology Institute Beijing 100070 China
Recently, designing symmetric primitives for applications in cryptographic protocols including multi-party computation, fully homomorphic encryption, and zero-knowledge proofs has become an important research topic. A... 详细信息
来源: 评论
AntiMal: an Approach of Malware Detection Employing Swin Transformer  23
AntiMal: an Approach of Malware Detection Employing Swin Tra...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network security
作者: Chenxi Lyu Yinan Yao Xiaodong Guo Zihong Huang Chen Dong Yuanyuan Zhang Zhenyi Chen College of Computer and Data Science Fuzhou University China College of Computer and Cyber Security Fujian Normal University China Department of Computer Science and Engineering University of South Florida USA
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t... 详细信息
来源: 评论
Using AI and Natural Language Processing to Enhance Consumer Banking Decision-Making
Using AI and Natural Language Processing to Enhance Consumer...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart Systems, ICEMPS 2024
作者: Temara, Sheetal Samanthapudi, Sagar Varma Rohella, Piyush Gupta, Ketan Ashokkumar, S.R. University of The Cumberlands Dept of Computer & Information Sciences WilliamsburgKY United States The Polis Center Indiana University Purdue University Indianapolis Applied Data Science IndianapolisIN United States Payments & Commerce GoDaddy EdmondsWA United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Centre For Blockchain and Cyber Security Department of Computer and Communication Engineering Tamil Nadu Coimbatore India
This technical summary outlines the use of Artificial Intelligence (AI) and Natural Language Processing (NLP) to beautify patron banking decision-making. AI-based banking systems can autonomously identify patterns in ... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Ali Hamza Najim Ali Jafer Mahdi Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AIKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Department of Scientific Affairs AI-Zahraa University for Women Bangi Malaysia Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Innovative grid technology leverages Information and Communication technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a “novel three-tier hierarchical framework for smart homes w... 详细信息
来源: 评论