咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1171-1180 订阅
排序:
Proposed Privacy Preservation Technique for Color Medical Images
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 719-732页
作者: Walid El-Shafai Hayam A.Abd El-Hameed Noha A.El-Hag Ashraf A.M.Khalaf Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Electrical Communications Engineering Department Faculty of EngineeringMinia UniversityMinia61111Egypt Higher Institute of Commercial Science Management Information SystemsEl-Mahala El-KobraEgypt Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Nowadays,the security of images or information is very *** paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image ***,the secret medical image is encrypted using Advanced... 详细信息
来源: 评论
MAD-ANET:Malware Detection Using Attention-Based Deep Neural Networks
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 1009-1027页
作者: Waleed Khalid Al-Ghanem Emad Ul Haq Qazi Tanveer Zia Muhammad Hamza Faheem Muhammad Imran Iftikhar Ahmad Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11362Saudi Arabia Centre of Artificial Intelligence Naif Arab University for Security SciencesRiyadh14812Saudi Arabia School of Arts and Sciences The University of Notre DameSydneyNSW 2007Australia Center for Smart Analytics Institute of InnovationScience and SustainabilityFederation University AustraliaBerwickVIC 3806Australia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
In the current digital era,new technologies are becoming an essential part of our ***,the number ofmalicious software ormalware attacks is rapidly *** is no doubt,themajority ofmalware attacks can be detected by most ... 详细信息
来源: 评论
ESSM: An extractive summarization model with enhanced spatial-temporal information and span mask encoding  5
ESSM: An extractive summarization model with enhanced spatia...
收藏 引用
5th International Conference on computer Information Science and Application technology, CISAT 2022
作者: Li, Ran Zheng, Fengbo Liang, Gongbo Jiang, Lifen Wu, Panpan Chen, Bowei College of Computer and Information Engineering Tianjin Normal University Tianjin China Department of Computing & Cyber Security Texas A&M University-San Antonio TX78224 United States
Extractive reading comprehension is to extract consecutive subsequences from a given article to answer the given question. Previous work often adopted Byte Pair Encoding (BPE) that could cause semantically correlated ... 详细信息
来源: 评论
Next Generation Image Watermarking via Combined DWT-SVD Technique  2
Next Generation Image Watermarking via Combined DWT-SVD Tech...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Al-Na'amneh, Qais Almomani, Ammar Nasayreh, Ahmad Nahar, Khalid M.O. Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Alauthman, Mohammad Applied Science Private University Department Of Cyber Security Amman Jordan School Of Computing Skyline University College P.O. Box 1797 Sharjah United Arab Emirates AlHuson University College AlBalqa Applied University I. T. Department Irbid Jordan Yarmouk University Department Of Computer Sciences Irbid211633 Jordan Yarmouk University Faculty Of Information Technology Computer Sciences Irbid211633 Jordan Trine University Dep. Of Business Administration IN United States University Of Zawia Dep.of Mechanical And Industrial Engineering Tripoli Libya University Of Petra Faculty Of Information Technology Department Of Information Security Amman Jordan
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte... 详细信息
来源: 评论
Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction  23
Membership Inference Attacks via Dynamic Adversarial Perturb...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Ding, Zehua Tian, Youliang Wang, Guorong Xiong, Jinbo Ma, Jianfeng Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China Xidian University School of Cyber Engineering Xian China
Existing membership inference attacks (MIAs) based on adversarial attacks typically introduce excessively large adversarial perturbations to change the model predictions. However, such methods are not only likely to o... 详细信息
来源: 评论
Cluster Availability Model with Information Update Following Node Recovery
Cluster Availability Model with Information Update Following...
收藏 引用
2023 Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2023
作者: Bogatyrev, V.A. Bogatyrev, S.V. Sivov, V.V. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia ITMO University Faculty of Software Engineering and Computer Technology Saint-Petersburg Russia
A model for evaluating the availability of a fault-tolerant cluster with a constraint on the maximum query service time is proposed. Node recovery in the cluster involves replacing the entire computational node with t... 详细信息
来源: 评论
Sector-Independent Integrated System Architecture for Profiling Hazardous Industrial Wastes
Sector-Independent Integrated System Architecture for Profil...
收藏 引用
作者: Nwankwo, Wilson Adetunji, Charles O. Ukhurebor, Kingsley E. David, Acheme I. Makinde, Samuel Nwankwo, Chukwuemeka P. Umezuruike, Chinecherem Department of Cyber Security Delta State University of Science and Technology Ozoro Nigeria Department of Computer Science Edo State University Uzairue Nigeria Department of Microbiology Edo State University Uzairue Nigeria Department of Physics Edo State University Uzairue Nigeria College of Computing Bowen University Iwo Nigeria
The accummulation of waste in urban societies has been christened the "industrialization and urbanization aftermath" in some quarters. In recent times, the climate change phenomenon is attributed to the gene... 详细信息
来源: 评论
A Novel Machine Learning-Based Framework for Predicting Diabetes in Healthcare
A Novel Machine Learning-Based Framework for Predicting Diab...
收藏 引用
Intelligent Control, Computing and Communications (IC3), International Conference on
作者: A. Sheryl Oliver Kimmi Gupta Jagendra Singh Atul Kumar Agnihotri M. Vasavi Gaganjot Kaur Department of Computational Intelligence SRM Institute of Science and Technology Chennai India School of Computer Science Engineering & Technology Bennett University Greater Noida India Electronics and Communication Engineering School of Engineering and Technology Chhatrapati Shahu Ji Maharaj University Kanpur India Department of ET -Cyber Security CVR College of Engineering Hyderabad India Department of Computer Science Raj Kumar Goel Institute of Technology Ghaziabad India
The rise in diabetes is considered the greatest global health issue; thus, the call for early and accurate predictions of the disease is a dire need in the health sector. The detection of the disease in its initial st... 详细信息
来源: 评论
cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
Membership Inference Attacks via Dynamic Adversarial Perturbations Reduction
Membership Inference Attacks via Dynamic Adversarial Perturb...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Zehua Ding Youliang Tian Guorong Wang Jinbo Xiong Jianfeng Ma State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Cyber Engineering Xidian University Xian China
Existing membership inference attacks (MIAs) based on adversarial attacks typically introduce excessively large adversarial perturbations to change the model predictions. However, such methods are not only likely to o... 详细信息
来源: 评论