咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1141-1150 订阅
排序:
An Android Malware Detection Approach Based on Static Feature Analysis Using Machine Learning Algorithms
An Android Malware Detection Approach Based on Static Featur...
收藏 引用
13th International Conference on Ambient Systems, Networks and Technologies, ANT 2022 / 5th International Conference on Emerging Data and Industry 4.0, EDI40 2022
作者: Shatnawi, Ahmed S. Yassen, Qussai Yateem, Abdulrahman Department of Computer Information Systems Jordan University of since and Technology Irbid Jordan Department of Network and Security Engineering Jordan University of since and Technology Irbid Jordan
In the past decade, mobile devices became necessary for modern civilization and contributed directly to its development stages in defining mobile information access. Nonetheless, along with these rapid developments in... 详细信息
来源: 评论
Prognostic Kalman Filter Based Bayesian Learning Model for Data Accuracy Prediction
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 243-259页
作者: S.Karthik Robin Singh Bhadoria Jeong Gon Lee Arun Kumar Sivaraman Sovan Samanta A.Balasundaram Brijesh Kumar Chaurasia S.Ashokkumar Department of ECE College of Engineering and TechnologySRM Institute of Science and TechnologyVadapalaniChennai600026India Department of CSE Birla Institute of Applied Sciences(BIAS)BhimtalUttarakhand263136India Division of Applied Mathematics Wonkwang University460Iksan-DaeroIksan-SiJeonbuk54538Korea School of Computer Science and Engineering Vellore Institute of Technology(VIT)Chennai600127India Department of Mathematics Tamralipta MahavidyalayaWest Bengal721636India School of Computer Science and Engineering Center for Cyber Physical SystemsVellore Institute of Technology(VIT)Chennai600127India Indian Institute of Information Technology(IIIT) LucknowUttar Pradesh226002India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai602105India
Data is always a crucial issue of concern especially during its prediction and computation in digital *** paper exactly helps in providing efficient learning mechanism for accurate predictability and reducing redundan... 详细信息
来源: 评论
Robust ANN Searching for Dynamic Vector Streams without Rebuilding Index
Robust ANN Searching for Dynamic Vector Streams without Rebu...
收藏 引用
computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: Haowen Bian Lingwei Chao Jingxuan Su Wenhong Tian Ruini Xue School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Graph-based approximate nearest neighbour (ANN) algorithms have dominated vector indexing recently. However, some of them do not support incremental vector addition, while most of them do not support in-place deletion... 详细信息
来源: 评论
UZNER: A Benchmark for Named Entity Recognition in Uzbek  12th
UZNER: A Benchmark for Named Entity Recognition in Uzbek
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Yusufu, Aizihaierjiang Jiang, Liu Ainiwaer, Abidan Teng, Chong Yusufu, Aizierguli Li, Fei Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China School of Computer Science and Technology Xinjiang Normal University Urumqi China
Named entity recognition (NER) is a key task in natural language processing, and entity recognition can provide necessary semantic information for many downstream tasks. However, the performance of NER is often limite... 详细信息
来源: 评论
An Intranet Defense Capability Assessment Method for Network security Solutions Based on ATT&CK Framework  2nd
An Intranet Defense Capability Assessment Method for Network...
收藏 引用
2nd International Conference on Network Simulation and Evaluation, NSE 2023
作者: An, Qi Zhu, Zifeng Li, Shudong Han, Weihong Wu, Xiaobo Li, Shumei Cyberspace Institute of Advanced Technology GuangzhouUniversity Guangzhou510006 China Department of New Networks Peng Cheng Laboratory Shenzhen518000 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China Computer College Jilin Normal University Siping136000 China
Faced with the growing threat of intranet attacks and numerous network security solutions, the defensive capabilities of network security solutions need to be evaluated in order to reasonably select a network security... 详细信息
来源: 评论
Defensive Auto-Updatable and Adaptable Bot Recommender System (DAABRS): A New Architecture Approach in Cloud Computing Systems  6
Defensive Auto-Updatable and Adaptable Bot Recommender Syste...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Khwaldeh, Sufian Mohit, Y. Khushwant, S. Department of Network and Information Security College of lnformation Technology University of Fujairah 1207 United Arab Emirates Department of Information Technology Faculty of Information Technology and Systems The University of Jordan Aqaba77110 Jordan Department of Mathematics University Institute of Sciences Chandigarh University Punjab Mohali140413 India Department of Computer Science & Engineering University Institute of Engineering and Technology M. D. University Rohtak124001 India
Cloud server data security makes extensive use of data centers and instantly accessible edge systems for possible transactions involving sizable and confidential data. These Edge Systems are chosen for rental based on... 详细信息
来源: 评论
Enhancing Efficiency and Empowering Institutions: Leveraging Wireless Sensor Devices, IoT Edge Computing, and Fog Computing in Educational Systems  7
Enhancing Efficiency and Empowering Institutions: Leveraging...
收藏 引用
7th IEEE International Conference on Computational Systems and Information technology for Sustainable Solutions, CSITSS 2023
作者: Siddiqui, Shams Tabrez Ali Sohail, Md Mohammed Aftab, Aasif Sarfaraz, Mohd Alam, Mohammad Imran Salim, Abu College of Cs It Jazan University Department of Computer Science Jazan Saudi Arabia College of Cs It Jazan University Department of Computer & Network Engineering Jazan Saudi Arabia College of Cs It Jazan University Department of Information Technology and Security Jazan Saudi Arabia
Wireless sensor devices, edge computing, and fog computing can transform education by improving efficiency and empowering institutions. This research paper explores the application of these technologies in educational... 详细信息
来源: 评论
Advancing Patient Care for Autonomous Saline Level Alert System with Cloud-Based Isolation Forest Algorithm  5
Advancing Patient Care for Autonomous Saline Level Alert Sys...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Nandhini, R. Sumathi, G. Ramya, S. Thulasi, Saravanan Ishwarya, M.V. Murugan, S. Rajalakshmi Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Department of Information Technology Tamil Nadu Trichy India Paavai Engineering College Department of Cyber Security Tamil Nadu Namakkal India John Deere India Pvt Ltd Customer and Product Support Services Maharashtra Pune India Agni College of Technology Artificial Intelligence and Data Science Department Tamil Nadu Chennai India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Biomedical Engineering Tamil Nadu Chennai India
This work presents a novel method for improving patient care by creating a self-sufficient system to detect saline levels using an Isolation Forest Algorithm (IFA) hosted on the cloud. Standard practices for checking ... 详细信息
来源: 评论
AQROM:A quality of service aware routing optimization mechanism based on asynchronous advantage actor-critic in software-defined networks
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1405-1414页
作者: Wei Zhou Xing Jiang Qingsong Luo Bingli Guo Xiang Sun Fengyuan Sun Lingyu Meng School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China The 34th Research Institute of China Electronics Technology Group Corporation Guilin541004China Guangxi Key Laboratory of Optical Network and Optical Information Security Guilin541004China State Key Laboratory of Information Photonics and Optical Communications BeijingUniversity of Posts and TelecommunicationsBeijing100876China Department of Electrical and Computer Engineering University of New MexicoAlbuquerqueNM87131USA
In Software-Defined Networks(SDNs),determining how to efficiently achieve Quality of Service(QoS)-aware routing is challenging but critical for significantly improving the performance of a network,where the metrics of... 详细信息
来源: 评论
Image Classification Using Optimized Convolution Neural Network
Image Classification Using Optimized Convolution Neural Netw...
收藏 引用
engineering and technology (PICET), Parul International Conference on
作者: Ramesh Chegoni V. SriLakshmi R. Sai Venkata Ramana Veeramreddy Rajasekhar Ravindra Changala Venkata Nagaraju Thatha Department of Information Technology CMR Technical Campus Hyderabad India Department of CSE(AI & ML) B V Raju Institute of Technology Narsapur India Computer Science & Engineering( Cyber Security) Department Madanapalle Institute of Technology & Science Department of Computer Science and Engineering Malla Reddy Engineering College (Autonomous) Hyderabad India Department of Computer Science and Engineering Guru Nanak Institutions Technical Campus Hyderabad India Department of Information Technology MLR Institute of Technology Hyderabad India
Conventional artificial neural networks and machine learning algorithms encountered difficulties in fulfilling the processing needs for extracting features from large-scale images and training models. Furthermore, the... 详细信息
来源: 评论