咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1221-1230 订阅
排序:
Speech-to-text Emotion Detection System using SVM, CNN, and BERT
Speech-to-text Emotion Detection System using SVM, CNN, and ...
收藏 引用
Smart Power Control and Renewable Energy (ICSPCRE), IEEE International Conference on
作者: Uma Yadav Shweta Bondre Bhakti Thakre Kiran Likhar Computer Science & Engineering (Data Science) Shri Ramdeobaba College of Engineering and Management Nagpur India Information Technology Department Shri Ramdeobaba College of Engineering and Management Nagpur India Cyber Security Department St. Vincent Pallotti College of Engineering and Technology Nagpur India Computer Science & Engineering G H Raisoni Institute of Engineering and Technology Nagpur India
Emotions have a tremendous impact on human experiences and decision-making processes. People are frequently motivated to repeat happy behaviors while avoiding depressing ones. Emotions may spread like wildfire in the ... 详细信息
来源: 评论
Not All Pairs are Equal: Hierarchical Learning for Average-Precision-Oriented Video Retrieval  24
Not All Pairs are Equal: Hierarchical Learning for Average-P...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Yang Xu, Qianqian Wen, Peisong Dai, Siran Huang, Qingming School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Computing Technology Chinese Academy of Sciences BDKM University of Chinese Academy of Sciences Beijing China
The rapid growth of online video resources has significantly promoted the development of video retrieval methods. As a standard evaluation metric for video retrieval, Average Precision (AP) assesses the overall rankin... 详细信息
来源: 评论
Fingerprint Authentication Method using Two Steps Verification Algorithm  25
Fingerprint Authentication Method using Two Steps Verificati...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Bahy, Ramy M. Ababneh, Jafar Attar, Hani Al-Hihi, Mohammad Hafez, Mohamed Solyman, Ahmed Technical Research Center Cairo Egypt Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Zarqa University Faculty of Engineering Zarqa Jordan Erlangen Germany INTI-IU-University Faculty of Engineering Feqs Nilai Malaysia Glasgow Caledonian University School of Computing Engineering and Built Environment Glasgow United Kingdom
This paper presents a new Fingerprint Authentication method based on a steps verification algorithm. The first verification step depends on feature extraction of contours, edges, and lines in both the source fingerpri... 详细信息
来源: 评论
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
收藏 引用
Frontiers of computer Science 2024年 第2期18卷 251-253页
作者: Yongxin ZHANG Hong LEI Bin WANG Qinghao WANG Ning LU Wenbo SHI Bangdao CHEN Qiuling YUE R&D Department SSC Holding CompanyLtd.Chengmai 571924China School of Cyberspace Security(School of Cryptography) Hainan UniversityHaikou 570228China College of Computer Science and Engineering Northeastern UniversityShenyang 110819China School of Computer Science and Technology Xidian UniversityXi'an 710071China Blockchain Research Group Oxford-Hainan Blockchain Research InstituteChengmai 571924China
1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their d... 详细信息
来源: 评论
Dual Branch PnP Based Network for Monocular 6D Pose Estimation
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3243-3256页
作者: Jia-Yu Liang Hong-Bo Zhang Qing Lei Ji-Xiang Du Tian-Liang Lin Department of Computer Science and Technology Huaqiao UniversityXiamen361000China Xiamen Key Laboratory of Computer Vision and Pattern Recognition Huaqiao UniversityXiamen361000China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao UniversityXiamen361000China College of Mechanical Engineering and Automation Xiamen361000China
Monocular 6D pose estimation is a functional task in the field of com-puter vision and *** recent years,2D-3D correspondence-based methods have achieved improved performance in multiview and depth data-based ***,for m... 详细信息
来源: 评论
Personalized Educational Video Evaluation Combining Student's Cognitive and Teaching Style
Personalized Educational Video Evaluation Combining Student'...
收藏 引用
IEEE International Conference on Systems, Man and cybernetics
作者: Jinta Weng Haoyu Dong Yifan Deng Yue Hu Hao Wu Heyan Huang School of Cyber Security University of Chinese Academy of Sciences China School of Computer Science and Cyber Engineering Guangzhou University China School of Computer Science and Technology Southeast Academy of Information Technology Beijing Institute of Technology China
AI-powered technologies, like ChatGPT and learning analytic technologies, have encouraged the sharing of online teaching resources and the transformation of teaching methods and learning pathways. However, the mixed r...
来源: 评论
Mutual information oriented deep skill chaining for multi‐agent reinforcement learning
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 1014-1030页
作者: Zaipeng Xie Cheng Ji Chentai Qiao WenZhan Song Zewen Li Yufeng Zhang Yujing Zhang Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai UniversityNanjingChina College of Computer and Information Hohai UniversityNanjingChina Center for Cyber‐Physical Systems University of GeorgiaAthensGeorgiaUSA Information Networking Institute Carnegie Mellon UniversityPittsburghPennsylvaniaUSA Department of Electrical and Systems Engineering University of PennsylvaniaPhiladelphiaPennsylvaniaUSA
Multi‐agent reinforcement learning relies on reward signals to guide the policy networks of individual ***,in high‐dimensional continuous spaces,the non‐stationary environment can provide outdated experiences that ... 详细信息
来源: 评论
A Bibliometric and Social Media Analysis of the Nexus Between Blockchain technology and Finance  2nd
A Bibliometric and Social Media Analysis of the Nexus Betwee...
收藏 引用
2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Ayodele, Olamide Emmanuel Ajibade, Temiloluwa Iyanuoluwa Oyebode, Oluwadare Joshua Akintoye, Kayode Akinlekan Ajayi, Babatunde Adedotun Adediran, Anthonia Oluwatosin Ajibade, Samuel-Soma M. Majeed, Anwar P. P. Abdul Luo, Yang Department of Banking and Finance Ekiti State University Ekiti State Ado Ekiti Nigeria Department of Business Management Scholar School System Birmingham United Kingdom Civil and Environmental Engineering Afe Babalola University Ekiti State Ado Ekiti Nigeria Department of Computer Science The Federal Polytechnic Ekiti State Ado Ekiti Nigeria Department of Cyber Security Faculty of Computing and Informatics Ladoke Akintola University of Technology Ogbomoso Nigeria Department of Real Estate Faculty of Built Environment Universiti Malaya KL Kuala Lumpur Malaysia Department of Data Science and Artificial Intelligence Faculty of Engineering and Technology Sunway University Selangor Malaysia Department of Computer Engineering Istanbul Ticaret University Istanbul Turkey Suzhou Taicang215400 China
This study explores Blockchain technology in the global financial industry using trends analysis, bibliometric analysis, and a literature appraisal using Elsevier Scopus data from 2016 to 2023. The Blockchain in Finan... 详细信息
来源: 评论
Turmeric leaf disease detection using optimized deep learning model
Turmeric leaf disease detection using optimized deep learnin...
收藏 引用
2nd International Conference on computer Vision and Internet of Things (ICCVIoT 2024)
作者: R. Selvaraj M. S. Geetha Devasena T. Satheesh K. Karpagavadivu F. Ravindaran Department of Computer Science and Engineering Dr.N.G.P. Institute of Technology Coimbatore India Department of Computer Science and Engineering Sri Ramakrishna Engineering College Coimbatore India Department of Artificial Intelligence and Data Science Dr.N.G.P. Institute of Technology Coimbatore India Computer Science and Engineering (Cyber Security) Karpagam college of Engineering Coimbatore India
Turmeric is popular for its medicinal, culinary, and non-culinary uses. Turmeric cultivation is affected due to disease in their leaves. Farmers conventionally identify the leaf diseases and provide pesticides to avoi...
来源: 评论
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio
Identification and Categorization of Unusual Internet of Veh...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Farkhund Iqbal Ahmad Abbasi Abdul Rehman Javed Gautam Srivastava Zunera Jalil Thippa Reddy Gadekallu Department of Cyber Security Zayed University UAE Department of Cyber Security Air University Islamabad Pakistan Dept. of Math and Computer Science Brandon University Brandon Canada Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
The volume of multimedia data produced by various smart devices has increased dramatically with the advent of new digital technologies, including in the Internet of Vehicles (IoV). It has become more difficult to extr...
来源: 评论