咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1211-1220 订阅
排序:
Using AI and Natural Language Processing to Enhance Consumer Banking Decision-Making
Using AI and Natural Language Processing to Enhance Consumer...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart Systems, ICEMPS 2024
作者: Temara, Sheetal Samanthapudi, Sagar Varma Rohella, Piyush Gupta, Ketan Ashokkumar, S.R. University of The Cumberlands Dept of Computer & Information Sciences WilliamsburgKY United States The Polis Center Indiana University Purdue University Indianapolis Applied Data Science IndianapolisIN United States Payments & Commerce GoDaddy EdmondsWA United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Centre For Blockchain and Cyber Security Department of Computer and Communication Engineering Tamil Nadu Coimbatore India
This technical summary outlines the use of Artificial Intelligence (AI) and Natural Language Processing (NLP) to beautify patron banking decision-making. AI-based banking systems can autonomously identify patterns in ... 详细信息
来源: 评论
Explainable Artificial Intelligence in Malignant Lymphoma Classification: Optimized DenseNet121 Deep Learning Approach with Particle Swarm Optimization and Genetic Algorithm.
收藏 引用
IEEE Access 2025年 13卷 98639-98655页
作者: Elwahsh, Haitham Bakhiet, Ali Alirr, Omar Ibrahim Khalifa, Tarek Alsabaan, Maazen Ibrahem, Mohamed I. El-Shafeiy, Engy Applied Science Private University Faculty of Information Technology Amman 11931 Jordan Kafrelsheikh University Faculty of Computers and Information Department of Computer Science Kafrelsheikh 33516 Egypt Badya University Faculty of Computing and Data Science Egypt American University of the Middle East College of Engineering and Technology Egaila 54200 Kuwait King Saud University College of Computer and Information Sciences Department of Computer Engineering P.O.Box 51178 Riyadh 11543 Saudi Arabia Augusta University School of Computer and Cyber Sciences Augusta 30912 GA United States University of Sadat City Faculty of Computers and Artificial Intelligence Department of Computer Science Sadat City 32897 Egypt
One of the forms of cancerous tumors that can be fatal is malignant lymphoma. Histopathological examination of lymphoma tissue images is a diagnostic technique for detecting malignant lymphomas. Differentiating lympho... 详细信息
来源: 评论
A review of DNA cryptograhic approaches  2
A review of DNA cryptograhic approaches
收藏 引用
2nd IEEE International Conference on cyberspace, cyber NIGERIA 2020
作者: Iliyasu, Mohammed Awwal Abisoye, Opeyemi Aderiike Bashir, Sulaimon Adebayo Ojeniyi, Joseph Adebayo Department of Computer Science Federal University of Technology Minna Nigeria Department of Cyber Security Federal University of Technology Minna Nigeria
Cryptography is described as the encryption analysis of data or secret data writing using logical and mathematical data protection principles. It is an information technology for banking, medical systems, transportati... 详细信息
来源: 评论
An Adaptive User Service Deployment Strategy for Mobile Edge Computing
收藏 引用
China Communications 2022年 第10期19卷 238-249页
作者: Gang Li Jingbo Miao Zihou Wang Yanni Han Hongyan Tan Yanwei Liu Kun Zhai Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 101408China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029China Sunwise Intelligent Technology Company Beijing 100190China
Mobile edge computing(MEC) is a cloud server running at the edge of a mobile network, which can effectively reduce network communication delay. However, due to the numerous edge servers and devices in the MEC, there m... 详细信息
来源: 评论
Secure Deduplication and Cloud Storage Auditing with Efficient Dynamic Ownership Management and Data Dynamics
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Peng, Xueqi Shen, Wenting Yang, Yang Zhang, Xi Qingdao University College of Computer Science and Technology Qingdao266071 China Zhongnan University of Economics and Law School of Information Engineering Wuhan430073 China Hebei Normal University College of Computer and Cyber Security Shijiazhuang050024 China
To verify the integrity of data stored in the cloud and improve storage efficiency, numerous cloud storage auditing schemes with deduplication have been proposed. In cloud storage, when users perform data dynamic oper... 详细信息
来源: 评论
An overview Scientific Cloud computing Web-based cloud services issues and challenges  23
An overview Scientific Cloud computing Web-based cloud servi...
收藏 引用
Proceedings of the 5th International Conference on Information Management & Machine Intelligence
作者: Sayan Majumder Kommisetti Murthy Raju Nancy Arya Nazeer Shaik Sanjay Tiwari Akanksha Singh Department of cyber security The Heritage Academy India Department of Electronics and Communication Engineering Shri Vishnu Engineering College For Women India Department of Computer Science and Engineering Shree Guru Gobind Singh Tricentenary University India Department Of Computer Science and Engineering Srinivasa Ramanujan Institute Of Technology-- Autonomous- India Department of Computer Science and Engineering ARYA Institute of Engineering Technology and Management India Computer Science and Engineering Babu Banarasi Das University India
This research investigates the crucial role of cloud computing services in web development for creating scalable applications. Our study explores the benefits, challenges, and best practices associated with leveraging...
来源: 评论
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCNN Model and GWO Algorithm for Social Media Sentiment Analysis
An Enhanced Product Quality Evaluation using Hybrid LSTM-FCN...
收藏 引用
International conference of Electronics, Communication and Aerospace technology (ICECA)
作者: V. S. Raj Kumar T. Kumaresan P. Rajesh Kanna S. Jagadeesan P. Showmiya P. Nithin Department of Artificial Intelligence and Data Science Bannari Amman Institute of Technology Erode India Department of Computer Science and Engineering Bannari Amman Institute of Technology Erode India Department of Computer Science and Engineering Nandha Engineering College Erode India Department of Computer Science – Cyber Security Nehru Institute of Technology Coimbatore India Department of Artificial Intelligence and Machine Learning Bannari Amman Institute of Technology Erode India
Sentiment analysis is still in its developing era, and sometimes, struggles are faced in evaluating user sentiment due to the use of traditional models to analyze the relationship structures in social media interactio... 详细信息
来源: 评论
Insect Identification in Pulsed Lidar Images Using Changepoint Detection Algorithms
Insect Identification in Pulsed Lidar Images Using Changepoi...
收藏 引用
2023 Annual Intermountain engineering, technology and Computing, IETC 2023
作者: Sweeney, Nathaniel Xu, Caroline Shaw, Joseph A. Hocking, Toby D. Whitaker, Bradley M. Montana State University Electrical and Computer Engineering Department United States University of Michigan Electrical Engineering and Computer Science Department United States Montana State University Optical Technology Center United States School of Informatics Computing and Cyber Systems Northern Arizona University United States
Noninvasive entomological insect monitoring often utilizes a variety of tools such as LiDAR to gather information without interfering with the insects in their habitat. These collection methods often result in large a... 详细信息
来源: 评论
Building a Large-Scale and Wide-Area Quantum Internet Based on an OSI-Alike Model
收藏 引用
China Communications 2021年 第10期18卷 1-14页
作者: Zhonghui Li Kaiping Xue Jian Li Nenghai Yu Jianqing Liu David S.L.Wei Qibin Sun Jun Lu School of Cyber Security University of Science and Technology of ChinaHefeiAnhui 230027China School of Information Science and Technology University of Science and Technology of ChinaHefeiAnhui 230027China Department of Electrical and Computer Engineering University of Alabama in HuntsvilleHuntsvilleAL 35899USA Department of Computer and Information Science Fordham UniversityBronxNY 10458USA
The theory and experiment of quantum information have been studied extensively in recent years,and the feasibility of quantum communication has been *** the fundamental technology is not yet mature,research on quantum... 详细信息
来源: 评论
An Automated Platform for Gathering and Managing Open-Source cyber Threat Intelligence  2
An Automated Platform for Gathering and Managing Open-Source...
收藏 引用
2nd International Conference on Business Analytics for technology and security, ICBATS 2023
作者: Al-Dmour, Nidal A. Kamrul Hasan, Mohammad Ajmal, Masood Ali, Muhammad Naseer, Iftikhar Ali, Atif Hamadi, Hussam Al Ali, Nasir Mutah University College of Engineering Department of Computer Engineering Jordan Center for Cyber Security Malaysia Riphah International University Islamabad Pakistan University of Central Punjab Pakistan The Superior University Faculty of Computer Science & Information Technology Lahore Pakistan Cyberjaya Malaysia College of Engineering and IT University of Dubai United Arab Emirates School of Computer Science NCBA&E Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
The community has begun paying more attention to source OSCTI cyber Threat Intelligence to stay informed about the rapidly changing cyber threat landscape. Numerous reports from the OSCTI frequently provide Informatio... 详细信息
来源: 评论