咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1231-1240 订阅
排序:
Artificial Vision – Yolov8 Algorithm for Objects and Impediments Detection
Artificial Vision – Yolov8 Algorithm for Objects and Impedi...
收藏 引用
Emerging Research in Computational Science (ICERCS), International Conference on
作者: S. Jothi Lakshmi S.P. Sasirekha N. Mekala R. Reshma V. Indu Nair S.G. Bhagya Department of Information Technology Nehru Institute of Technology Coimbatore India Department of Computer Science and Engineering Karpagam Academy of Higher Education Coimbatore India Department of Computer Science and Engineering(Cyber Security) Dhanalakshmi Srinivasan College of Engineering Coimbatore India Department of Artificial Intelligence and Data Science SNS College of Engineering Coimbatore India Department of Artificial Intelligence and Data Science Bapuji Institute of Engineering and Technology Davangere
This paper presents an object detection method using YOLO technique (You Only Look Once) based deep learning algorithm to help visually impaired people in their daily life. A Cobotic Spectacle is a cutting-edge produc... 详细信息
来源: 评论
Large System Analysis on Uplink Transmission of Backhaul-Aware UAV-Assisted Network  12th
Large System Analysis on Uplink Transmission of Backhaul-Awa...
收藏 引用
12th International Conference on computer engineering and Networks, CENet 2022
作者: Xue, Yishi Wu, Pingchuan Lan, Haoliang Hong, Lei Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing210031 China
With the development of wireless communication networks and basic technologies of unmanned aerial vehicles (UAVs), UAVs have gradually become a major research hotspot in the field of wireless communications. UAVs can ... 详细信息
来源: 评论
Enhancing Anomaly Detection in Smart Water Metering Networks with LSTM-Autoencoder and Data Augmentation Techniques
Enhancing Anomaly Detection in Smart Water Metering Networks...
收藏 引用
International Multidisciplinary Information technology and engineering Conference (IMITEC)
作者: Maria Nelago Kanyama Fungai Bhunu Shava Attlee M Gamundani Andreas Hartmann Department of Computer Science Namibia University of Science and Technology Windhoek Namibia Department of Cyber Security Namibia University of Science and Technology Windhoek Namibia Hydrology Institute of Groundwater Management Dresden Germany
Machine Learning (ML) based anomaly detection in Smart Water Metering Networks (SWMNs) and traditional water metering networks faces significant challenges, including small dataset sizes, unlabeled data, and class imb... 详细信息
来源: 评论
SecSCS: A User-Centric Secure Smart Camera System Based on Blockchain
SecSCS: A User-Centric Secure Smart Camera System Based on B...
收藏 引用
International Conference on Distributed Computing Systems
作者: Xinyuan Qian Hongwei Li Haoyong Wang Guowen Xu Shengmin Xu Ju Ren School of Computer Science and Engineering University of Electronic Science and Technology of China Chongqing Key Laboratory of Automated Reasoning and Cognition Department of Computer Science City University of Hong Kong College of Computer and Cyber Security Fujian Normal University Department of Computer Science and Techology Tsinghua University
Smart cameras have gained immense popularity in commercial markets for their safety and security capabilities. Yet, the prevalent design of these intelligent camera systems often compels users to cede control of their... 详细信息
来源: 评论
Enhancing Arabic Speaker Identification through Lip Movement Analysis and Deep Representation Learning  24
Enhancing Arabic Speaker Identification through Lip Movement...
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Ashour, Mohammed Imad Abbas, Abbas Saadi Ahmed, Saadaldeen Rashid Haydar, Noor Ghaffoori, Ali Jassim Hussain, Abadal-Salam T. Kurdi, Neesrin Ali Al-Sarem, Mohammed Tawfeq, Jamal Fadhil Department of Petroleum Engineering College of Engineering University of Baghdad Iraq Computer Science Department Bayan University Erbil Kurdistan Iraq Artificial Intelligence Engineering Department College of Engineering Al-Ayen University Thi-Qar Iraq Department of Cyber security Techniques Al Hikma University College Baghdad Iraq Electrical Power Techniques Al-Ma'moon University College Al-Washash Baghdad Iraq Department of Medical Instrumentation Techniques Engineering Technical Engineering College Al-Kitab University Altun Kupri Kirkuk Iraq College Of Computer Science and Engineering Taibah University Medina Saudi Arabia Department of Medical Instrumentation Technical Engineering Medical Technical College Al-Farahidi University Baghdad Iraq
Speaker identification plays a vital role in various real-life applications, including personal safety systems and human-computer interaction. This study presents a novel approach to Arabic speaker identification by i... 详细信息
来源: 评论
Moye: A Wallbreaker for Monolithic Firmware
Moye: A Wallbreaker for Monolithic Firmware
收藏 引用
International Conference on Software engineering (ICSE)
作者: Jintao Huang Kai Yang Gaosheng Wang Zhiqiang Shi Zhiwen Pan Shichao Lv Limin Sun Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Electronics and Information Guangxi University Nanning China
As embedded devices become increasingly popular, monolithic firmware, known for its execution efficiency and simplicity, is widely used in resource-constrained devices. Different from ordinary firmware, the monolithic... 详细信息
来源: 评论
TMAS:A transaction misbehavior analysis scheme for blockchain
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 42-52页
作者: Shiyong Huang Xiaohan Hao Yani Sun Chenhuang Wu Huimin Li Wei Ren Kim-Kwang Raymond Choo School of Computer Science China University of GeosciencesWuhan430074China Artificial Intelligence Thrust Information HubHong Kong University of Science and TechnologyGuangzhou511400China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Institute of Beihang UniversityKunming650233China Fujian Key Laboratory of Financial Information Processing Putian UniversityPutian351100China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
Blockchain-based cryptocurrencies,such as Bitcoins,are increasingly ***,the decentralized and anonymous nature of these currencies can also be(ab)used for nefarious activities such as money laundering,thus reinforcing... 详细信息
来源: 评论
An Efficient and Explainable Machine Learning Framework for Alzheimer's Disease Detection
An Efficient and Explainable Machine Learning Framework for ...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Emad Arafah Rejwan Bin Sulaiman Mohammad Ahmad Md. Simul Hasan Talukder Department of Computer Science University of Petra Amman Jordan Lecturer of AI and Cyber Security Northumbria University Newcastle upon Tyne UK Lecturer of Computer Science University of Bedfordshire Luton UK Electrical and Electronic Engineering Dhaka University of Engineering & Technology Gazipur Bangladesh
Alzheimer's disease detection is of paramount importance as it is a global health problem in terms of early detection, interventions, and management. The study applies prominent machine learning classification to ... 详细信息
来源: 评论
Secure Cloud Computing: Mitigating Network Vulnerabilities
Secure Cloud Computing: Mitigating Network Vulnerabilities
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Santhosh Kumar Gopal Abdul Sajid Mohammed Madhusudhan Dasari Sreeramulu Dhamodharan Srinivasan Technology Lead Charlotte NC USA Dept of School of Computer and Information Sciences University of the Cumberlands Kentucky USA Dept of Cyber Security American Express Department of Computer and Communication Engineering Sri Eshwar College of Engineering Coimbatore Tamil Nadu India
As businesses increasingly depend on these cloud-based services, secure cloud computing is vital. There is no free way with the cloud network, and our information is susceptible to vulnerability. Mitigation strategies... 详细信息
来源: 评论
An Efficient Post-quantum Identity-Based Signature
收藏 引用
Chinese Journal of Electronics 2021年 第2期30卷 238-248页
作者: YANG Zhichao DUNG H.Duong WILLY Susilo YANG Guomin LI Chao CHEN Rongmao College of Liberal Arts and Sciences National University of Defence Technology Department of Information Security Naval University of Engineering School of Computing and Information Technology University of Wollongong College of Computer National University of Defence Technology
Digital signature is one of the most important cryptography primitives. Recently, more and more works have been done to construct signatures over lattice problems to keep them secure in the quantum age. Among them, a ... 详细信息
来源: 评论