咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1151-1160 订阅
排序:
An Optimized Chinese Filtering Model Using Value Scale Extended Text Vector
收藏 引用
computer Systems Science & engineering 2023年 第11期47卷 1881-1899页
作者: Siyu Lu Ligao Cai Zhixin Liu Shan Liu Bo Yang Lirong Yin Mingzhe Liu Wenfeng Zheng School of Automation University of Electronic Science and Technology of ChinaChengdu610054China School of Life Science Shaoxing UniversityShaoxing312000China Department of Geography and Anthropology Louisiana State UniversityBaton RougeLA70803USA College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu610059China
With the development of Internet technology,the explosive growth of Internet information presentation has led to difficulty in filtering effective *** a model with high accuracy for text classification has become a cr... 详细信息
来源: 评论
A Domain-Adversarial Neural Network for Transferable Lithium-Ion Battery State-of-Health Estimation
收藏 引用
IEEE Transactions on Transportation Electrification 2025年 第3期11卷 7732-7742页
作者: Meng, Jinhao Hu, Dingcai Lin, Mingqiang Peng, Jichang Wu, Ji Stroe, Daniel-Ioan Xi’an Jiaotong University School of Electrical Engineering Shaanxi Xi’an710049 China Quanzhou Institute of Equipment Manufacturing Fujian Institute of Research on the Structure of Matter Chinese Academy of Sciences Jinjiang362200 China Fujian Normal University Fuzhou350007 China University of Chinese Academy of Sciences College of Computer and Cyber Security Fujian College Fuzhou350002 China Smart Grid Research Institute Nanjing Institute of Technology Nanjing211167 China Hefei University of Technology School of Automotive and Transportation Engineering Anhui Hefei230009 China Aalborg University AAU Energy Aalborg9220 Denmark
As a key indicator of the lithium-ion (Li-ion) battery performance, state-of-health (SOH) estimation still faces challenges in model generalization between datasets. Electrochemical impedance spectroscopy (EIS) provid... 详细信息
来源: 评论
Image analysis and fine-tuned ResNet50 model for effective malware detection
收藏 引用
Procedia computer Science 2025年 260卷 1098-1106页
作者: Sanjeev Kumar Yudhishthira Sapru Jitendra Kumar Sugandha Sapru Cyber Security Technology Division Centre for Development of Advanced Computing Mohali India Indian Computer Emergency Response Team CERT-In Delhi India Department of Mathematics Bioinformatics and Computer Applications MANIT Bhopal India Department of Mathematics PGGC Panjab University Chandigarh India
With the rapid growth of connected assets to the Internet, malware attacks have increased exponentially, often causing substantial damage to these connected assets. Early detection of evolving malware attacks can avoi... 详细信息
来源: 评论
Slotted Aloha for Optical Wireless Communications in Internet of Underwater Things  32
Slotted Aloha for Optical Wireless Communications in Interne...
收藏 引用
32nd Wireless and Optical Communications Conference, WOCC 2023
作者: Petkovic, Milica Tegos, Sotiris A. Diamantoulakis, Panagiotis D. Vukobratovic, Dejan Panayirci, Erdal Stefanovic, Cedomir Karagiannidis, George K. Faculty of Technical Sciences Novi Sad Serbia Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Greece Kadir Has University Istanbul Turkey Aalborg University Aalborg Denmark Cyber Security Systems and Applied Ai Research Center Lebanon
In this work, we design and analyse a Slotted ALOHA (SA) solution for Optical Wireless Communication (OWC)-based Internet of Underwater Things (IoUT). In the proposed system, user devices exchange data with an access ... 详细信息
来源: 评论
Leveraging Machine Learning to Detect and Predict Diabetes in Polycystic Ovary Syndrome Patients: A Review
Leveraging Machine Learning to Detect and Predict Diabetes i...
收藏 引用
International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD)
作者: Julia Ndjene Attlee M. Gamundani Maria N. Kanyama Department of Informatics Namibia University of Science and Technology Windhoek Namibia Department of Cyber Security Namibia University of Science and Technology Windhoek Namibia Department of Computer Science Namibia University of Science and Technology Windhoek Namibia
Polycystic ovary syndrome (PCOS) is a prevailing hormonal disorder affecting women in their childbearing years, often associated with hormonal imbalances and metabolic disturbances. PCOS is closely linked to various h... 详细信息
来源: 评论
Mapping Quantum Circuits to 2-Dimensional Quantum Architectures
Mapping Quantum Circuits to 2-Dimensional Quantum Architectu...
收藏 引用
2022 Informatik in den Naturwissenschaften, INFORMATIK 2022 - 2022 computer Science in the Natural Sciences, INFORMATIK 2022
作者: Datta, Kamalika Kole, Abhoy Sengupta, Indranil Drechsler, Rolf Cyber Physical System Bremen Germany JIS University Department of Computer Science and Engineering Kolkata India Indian Institute of Technology Kharagpur Department of Computer Science and Engineering India University of Bremen Group of Computer Architecture Bremen Germany
We have been witnessing a rapid growth in quantum computing research over the years, with the emergence of demonstrable quantum computers of moderate size. The major issues that are faced to run a quantum algorithm re... 详细信息
来源: 评论
A Novel Human Face Expression Recognition Based on Image Processing Assisted Convoluted Deep Learning Methodology
A Novel Human Face Expression Recognition Based on Image Pro...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Tamilselvi, M. Venkata Siva Prasad, Ch. Kumari, M. Varuna Lavanya, R. Sai Nandurkar, Y. Al-Mousa, Mohammad Rasmi Dept of Ece Chennai India Jeppiaar Engineering College Department of Ece Rajiv Gandhi salai Chennai119 India Qis College of Engineering and Technology Department of S&h Pondur Road Vengamukkapalem Ongole Prakasam Andhra Pradesh Prakasam District523272 India Qis College of Engineering and Technology Department of Mca Pondur Road Vengamukkapalem Ongole Prakasam Andhra Pradesh Prakasam District523272 India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India College of Information Technology Zarqa University Department of Cyber Security zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Facial expression recognition has become a critical component in applications involving human-computer interaction, security systems, and behavioral analysis. This paper presents a novel approach to human face express... 详细信息
来源: 评论
Electrical Transmission Lines Robot Inspector: Design Challenges
Electrical Transmission Lines Robot Inspector: Design Challe...
收藏 引用
2022 International Conference on Industrial engineering, Applications and Manufacturing, ICIEAM 2022
作者: Boufares, Fatma Doudech, Imen Bahrami, Mohammad Reza High Institute of Applied Sciences and Technology of Sousse Department of Mechanical Engineering Sousse Tunisia Institute of Information Security and Cyber-Physical Systems Innopolis University Innopolis Russia
High voltage electrical transmission lines (ETL) require maintenance and examination which are both time-consuming and dangerous, as it has been carried out by workers using traditional means. That is why the inventio... 详细信息
来源: 评论
A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems
A Secure RPL Rank Computation and Distribution Mechanism for...
收藏 引用
2023 IEEE INFOCOM Conference on computer Communications Workshops, INFOCOM WKSHPS 2023
作者: Mishra, Alekha Kumar Puthal, Deepak Tripathy, Asis Kumar National Institute of Technology Dept. of Computer Science and Engineering Jamshedpur India Khalifa University Center for Cyber-Physical Systems and Department of EECS Abu Dhabi United Arab Emirates School of IT and Engineering VIT Vellore India
The sinkhole attack detection mechanisms that have been reported till date are distributed in nature. Defending a sinkhole attack requires protecting the act of forging the rank computation task. This paper propose a ... 详细信息
来源: 评论
A Deep CNN-GRU Framework for Personalized News Recommendation
A Deep CNN-GRU Framework for Personalized News Recommendatio...
收藏 引用
Data Science and Business Systems (ICDSBS), International Conference on
作者: C.R. Dhivyaa K. Nithya A. Devipriya A. Sivaranjani Department of Database Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Computer Science and Engineering SRM Institute of Science and Technology Tiruchirappalli Department of Information Security School of Computer Science and Engineering Vellore Institute of Technology Vellore Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Vellore
News Recommendation Systems designed significantly for readers interest and there are number social networking sites like Twitter, Facebook, LinkedIn are popular nowadays. Users of these sites look popular news update... 详细信息
来源: 评论