咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是111-120 订阅
排序:
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION  15
A MULTIMODAL FRAMEWORK FOR SATIRE VS. SARCASM DETECTION
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Goyal, Devansh Mishra, Santosh Kumar Rai, Vikash Kumar Department of Computer Science and Engineering RGIPT Jais Amethi India School of Cyber Security and Digital Forensics NFSU Goa Goa India
Sarcasm and satire are common ways to communicate complicated ideas with humor and irony, both expressing criticism or mockery. Detecting sarcasm vs. satire in real life can foster better communication by understandin... 详细信息
来源: 评论
Advancing Alzheimer's Diagnosis Through Transfer Learning with Deep MRI Analysis
Advancing Alzheimer's Diagnosis Through Transfer Learning wi...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering Science, AMATHE 2024
作者: Adityasai, B. Babu, Nirmal Varghese Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India
Alzheimer's disease (AD) poses a significant health-care challenge, necessitating early and accurate diagnosis for effective management. This study presents a novel approach aimed at enhancing AD diagnosis through... 详细信息
来源: 评论
Investigation of Handwritten Image-To-Speech Using Deep Learning
Investigation of Handwritten Image-To-Speech Using Deep Lear...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering Science, AMATHE 2024
作者: Manju, S. Anitha, J. Sujitha Juliet, D. Karunya Institute Of Technology And Sciences Division Of Computer Science And Engineering Coimbatore India Karunya Institute Of Technology And Sciences Division Of Data Science And Cyber Security Coimbatore India
In the realm of accessibility technology, this paper introduces a pioneering method for converting handwritten images to speech. The work primarily focuses on recognizing handwritten text and subsequently converting i... 详细信息
来源: 评论
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms and Datasets for Detecting cyberbullying on Social Media Platforms
Comparative Analysis of Machine Learning Algorithms and Data...
收藏 引用
2024 International Conference on Computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Palagati, Anusha Balan, Santhosh Kumar Arun Joe Babulo, S. Raja, Laxmi Natarajan, K.K. Kalimuthu, Rajkumar Dept. of Computer Science and Engineering Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Department of Computer Applications K.S.R College of Arts and Science for Women Tamilnadu Tiruchengode India Department of Cyber Security Karpagam Academy of Higher Education Tamilnadu Coimbatore India College of Engineering and Technology University of Technology and Applied Sciences Al Mussanah Oman Department of Cyber Security Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India
cyberbullying is defined as sharing of undesirable material in the cyberspace, primarily- the use of the social sites that instigate hostility and create feelings of hatred among the individuals. Another increasing th... 详细信息
来源: 评论
An intelligent hybrid MAC protocol for a sensor-based personalized healthcare system
收藏 引用
Digital Communications and Networks 2022年 第2期8卷 174-185页
作者: Linbo Deng Jinsong Gui Tian Wang Jiawei Tan Xiong Li School of Computer Science and Engineering Central South UniversityChangSha410083China College of Computer Science and Technology Huaqiao UniversityXiamen361021China Institute for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengdu611731China
Sensors based on personalized healthcare systems have been widely used in the medical ***,energy limitations have greatly hindered the further development of medical *** the traditional Medium Access Control(MAC)proto... 详细信息
来源: 评论
A Deepfake Image Classifier System for real and Doctored Image Differentiation  7
A Deepfake Image Classifier System for real and Doctored Ima...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Thomas, Juanith Mathew Ebenezer, V. Richard, Rohan Paul Karunya Institute of Technology And Sciences Division of Computer Science And Engineering Coimbatore India Karunya Institute of Technology And Sciences Division of Data Science And Cyber Security Coimbatore India
The sudden proliferation of deepfake technology has raised concerns about the authenticity and integrity of digital media. In response to these concerns, this paper presents a Deepfake image classifier system designed... 详细信息
来源: 评论
Machine Learning for Detecting Subtle Signs of EyeDisease  4
Machine Learning for Detecting Subtle Signs of EyeDisease
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Dafny Neola, J. Ebenezer, V. Edwin, E.Bijolin Kirubakaran, S.Stewart Thanka, M.Roshni Yona Davincy, R. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security Coimbatore India
Eye disorders can have serious repercussions, such as blindness or visual impairment, if they are not identified or addressed, Treatment that works and preventing permanent harm depend on early diagnosis and predictio... 详细信息
来源: 评论
cyberbullying Detection in Hinglish Language
Cyberbullying Detection in Hinglish Language
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Kumar, Rajiv Rai, Vipin Joshi, Shivani Raj, Daksh Amrita Galgotias University Department of Computer Science & Engineering U.P. Greater Noida India Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India Sharda University Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Greater Noida India
cyberbullying represents one of the most recent challenges stemming from the widespread adoption of social media platforms. With the surge in social media usage, the right to express oneself is being misused. Statisti... 详细信息
来源: 评论
Blockchain-Based Cognitive Computing Model for Data security on a Cloud Platform
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3305-3323页
作者: Xiangmin Guo Guangjun Liang Jiayin Liu Xianyi Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InstituteNanjing210031China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and ***,information shoplifting poses significant threats,potentially leading to poor perf... 详细信息
来源: 评论