咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1131-1140 订阅
排序:
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
收藏 引用
Frontiers of computer Science 2024年 第2期18卷 251-253页
作者: Yongxin ZHANG Hong LEI Bin WANG Qinghao WANG Ning LU Wenbo SHI Bangdao CHEN Qiuling YUE R&D Department SSC Holding CompanyLtd.Chengmai 571924China School of Cyberspace Security(School of Cryptography) Hainan UniversityHaikou 570228China College of Computer Science and Engineering Northeastern UniversityShenyang 110819China School of Computer Science and Technology Xidian UniversityXi'an 710071China Blockchain Research Group Oxford-Hainan Blockchain Research InstituteChengmai 571924China
1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their d... 详细信息
来源: 评论
An Intranet Defense Capability Assessment Method for Network security Solutions Based on ATT&CK Framework  2nd
An Intranet Defense Capability Assessment Method for Network...
收藏 引用
2nd International Conference on Network Simulation and Evaluation, NSE 2023
作者: An, Qi Zhu, Zifeng Li, Shudong Han, Weihong Wu, Xiaobo Li, Shumei Cyberspace Institute of Advanced Technology GuangzhouUniversity Guangzhou510006 China Department of New Networks Peng Cheng Laboratory Shenzhen518000 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China Computer College Jilin Normal University Siping136000 China
Faced with the growing threat of intranet attacks and numerous network security solutions, the defensive capabilities of network security solutions need to be evaluated in order to reasonably select a network security... 详细信息
来源: 评论
Dual Branch PnP Based Network for Monocular 6D Pose Estimation
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3243-3256页
作者: Jia-Yu Liang Hong-Bo Zhang Qing Lei Ji-Xiang Du Tian-Liang Lin Department of Computer Science and Technology Huaqiao UniversityXiamen361000China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao UniversityXiamen361000China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao UniversityXiamen361000China College of Mechanical Engineering and Automation Xiamen361000China
Monocular 6D pose estimation is a functional task in the field of com-puter vision and *** recent years,2D-3D correspondence-based methods have achieved improved performance in multiview and depth data-based ***,for m... 详细信息
来源: 评论
Personalized Educational Video Evaluation Combining Student's Cognitive and Teaching Style
Personalized Educational Video Evaluation Combining Student'...
收藏 引用
IEEE International Conference on Systems, Man and cybernetics
作者: Jinta Weng Haoyu Dong Yifan Deng Yue Hu Hao Wu Heyan Huang School of Cyber Security University of Chinese Academy of Sciences China School of Computer Science and Cyber Engineering Guangzhou University China School of Computer Science and Technology Southeast Academy of Information Technology Beijing Institute of Technology China
AI-powered technologies, like ChatGPT and learning analytic technologies, have encouraged the sharing of online teaching resources and the transformation of teaching methods and learning pathways. However, the mixed r...
来源: 评论
Mutual information oriented deep skill chaining for multi‐agent reinforcement learning
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 1014-1030页
作者: Zaipeng Xie Cheng Ji Chentai Qiao WenZhan Song Zewen Li Yufeng Zhang Yujing Zhang Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai UniversityNanjingChina College of Computer and Information Hohai UniversityNanjingChina Center for Cyber‐Physical Systems University of GeorgiaAthensGeorgiaUSA Information Networking Institute Carnegie Mellon UniversityPittsburghPennsylvaniaUSA Department of Electrical and Systems Engineering University of PennsylvaniaPhiladelphiaPennsylvaniaUSA
Multi‐agent reinforcement learning relies on reward signals to guide the policy networks of individual ***,in high‐dimensional continuous spaces,the non‐stationary environment can provide outdated experiences that ... 详细信息
来源: 评论
A Bibliometric and Social Media Analysis of the Nexus Between Blockchain technology and Finance  2nd
A Bibliometric and Social Media Analysis of the Nexus Betwee...
收藏 引用
2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Ayodele, Olamide Emmanuel Ajibade, Temiloluwa Iyanuoluwa Oyebode, Oluwadare Joshua Akintoye, Kayode Akinlekan Ajayi, Babatunde Adedotun Adediran, Anthonia Oluwatosin Ajibade, Samuel-Soma M. Majeed, Anwar P. P. Abdul Luo, Yang Department of Banking and Finance Ekiti State University Ekiti State Ado Ekiti Nigeria Department of Business Management Scholar School System Birmingham United Kingdom Civil and Environmental Engineering Afe Babalola University Ekiti State Ado Ekiti Nigeria Department of Computer Science The Federal Polytechnic Ekiti State Ado Ekiti Nigeria Department of Cyber Security Faculty of Computing and Informatics Ladoke Akintola University of Technology Ogbomoso Nigeria Department of Real Estate Faculty of Built Environment Universiti Malaya KL Kuala Lumpur Malaysia Department of Data Science and Artificial Intelligence Faculty of Engineering and Technology Sunway University Selangor Malaysia Department of Computer Engineering Istanbul Ticaret University Istanbul Turkey Suzhou Taicang215400 China
This study explores Blockchain technology in the global financial industry using trends analysis, bibliometric analysis, and a literature appraisal using Elsevier Scopus data from 2016 to 2023. The Blockchain in Finan... 详细信息
来源: 评论
Logistic Regression for Personalized Hypertension Risk Profiling in Cloud-Integrated Healthcare Systems
Logistic Regression for Personalized Hypertension Risk Profi...
收藏 引用
2024 Asian Conference on Intelligent Technologies, ACOIT 2024
作者: Saravanan, S. Ramya, S. Monikapreethi, S.K. Kavididevi, Venkatesh Kovarasan, Rajesh Kambattan Sujatha, S. Department of Electrical and Electronics Engineering Muthayammal Engineering College Tamil Nadu Namakkal India Department of Cyber Security Paavai Engineering College Tamil Nadu Namakkal India Department of Electronics and Communication Engineering Rajalakshmi Institute of Technology Tamil Nadu Chennai India Department of Information Technology Vardhaman College of Engineering Telangana Hyderabad India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Tamil Nadu Chennai India Department of Biomedical Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu Chennai India
Advanced analytics for personalized chronic disease risk profiles are becoming possible as healthcare systems combine cloud-based technology. This work applies logistic regression (LR) models to cloud-integrated healt... 详细信息
来源: 评论
Turmeric leaf disease detection using optimized deep learning model
Turmeric leaf disease detection using optimized deep learnin...
收藏 引用
2nd International Conference on computer Vision and Internet of Things (ICCVIoT 2024)
作者: R. Selvaraj M. S. Geetha Devasena T. Satheesh K. Karpagavadivu F. Ravindaran Department of Computer Science and Engineering Dr.N.G.P. Institute of Technology Coimbatore India Department of Computer Science and Engineering Sri Ramakrishna Engineering College Coimbatore India Department of Artificial Intelligence and Data Science Dr.N.G.P. Institute of Technology Coimbatore India Computer Science and Engineering (Cyber Security) Karpagam college of Engineering Coimbatore India
Turmeric is popular for its medicinal, culinary, and non-culinary uses. Turmeric cultivation is affected due to disease in their leaves. Farmers conventionally identify the leaf diseases and provide pesticides to avoi...
来源: 评论
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio
Identification and Categorization of Unusual Internet of Veh...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Farkhund Iqbal Ahmad Abbasi Abdul Rehman Javed Gautam Srivastava Zunera Jalil Thippa Reddy Gadekallu Department of Cyber Security Zayed University UAE Department of Cyber Security Air University Islamabad Pakistan Dept. of Math and Computer Science Brandon University Brandon Canada Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
The volume of multimedia data produced by various smart devices has increased dramatically with the advent of new digital technologies, including in the Internet of Vehicles (IoV). It has become more difficult to extr...
来源: 评论
A Comprehensive Survey of Joint Radar-Communication Technologies and their future Applications in Healthcare Sector
收藏 引用
IEEE Access 2024年 1-1页
作者: Al-Salehi, Abdulrahman Sufyan, Mubarak Mohammed Al-Ezzi Malik, Aqdas Naveed Al-Asaly, Mahfoudh Department of Computer Science COMSATS University Islamabad Islamabad Pakistan Department of Networks and cyber security AlJanad University Of Science and Technology Taiz Yemen Department of Electrical Engineering University of Engineering and Technology G.T Road Lahore Pakistan STC’s Artificial Intelligence Chair College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
The integration of joint radar and communication technologies has emerged as a transformative approach with promising applications across various sectors, including healthcare. This paper presents a comprehensive exam... 详细信息
来源: 评论