咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1251-1260 订阅
排序:
Classification and Labeling Techniques of Educational Resources Based on BERT-CNN model
Classification and Labeling Techniques of Educational Resour...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Viswanathan.M.P Noor Kaylan Hamid V Rajyalakshmi Neelam Sharma Sharmeen Izzat Hassan S Muthuperumal Hindusthan College of Engineering and Technology Coimbatore India Department of Computer Education Al Kitab University Kirkuk Iraq Department of CSE (Cyber Security) Vignana Bharathi Institute of Technology India School of Physical Education Lovely Professional University Punjab India Department of Computer Engineering College of Engineering Knowledge University Erbil Iraq Department of Mathematics K.Ramakrishnan College of Engineering Trichy India
The key factor in promoting accessibility and improving the educational experience is accurate classification and labelling of educational materials. Research paper presents a novel approach to educational material cl... 详细信息
来源: 评论
Price Prediction of Digital Currencies using Machine Learning  10
Price Prediction of Digital Currencies using Machine Learnin...
收藏 引用
10th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2023
作者: Dwivedi, Ashutosh Dhar Dutta, Subhayu Adhikary, Subhrangshu Pedersen, Jens Myrup Aalborg University Cyber Security Group Department of Electronic Systems Copenhagen Denmark Dr. B.C. Roy Engineering College Department of Computer Science & Engineering West Bengal Durgapur713206 India Spiraldevs Automation Industries Pvt. Ltd. Department of Research & Development West Bengal Raiganj733123 India
Cryptocurrencies have gained immense significance and popularity in recent times. With thousands of digital currencies available, selecting the right one can be challenging for users. In the financial sector, accurate... 详细信息
来源: 评论
Joint Automatic Speech Recognition And Structure Learning For Better Speech Understanding
Joint Automatic Speech Recognition And Structure Learning Fo...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hu, Jiliang Li, Zuchao Shen, Mengjia Ai, Haojun Li, Sheng Zhang, Jun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China Wuhan Second Ship Design and Research Institute Wuhan China National Institute of Information and Communications Technology Japan
Spoken language understanding (SLU) is a structure prediction task in the field of speech. Recently, many works on SLU that treat it as a sequence-to-sequence task have achieved great success. However, This method is ... 详细信息
来源: 评论
Research on Distributed Sensor Network Faulty Recovery Method based on Attention Mechanism  3
Research on Distributed Sensor Network Faulty Recovery Metho...
收藏 引用
3rd International Conference on Artificial Intelligence and computer engineering, ICAICE 2022
作者: Xing, Zheng Liu, Boya Guan, Haochen Zhang, Yiran Zhang, Ying Chengdu University of Technology The College of Nuclear Technology and Automation Engineering Sichuan Chengdu China Chengdu University of Technology College of Environment and Civil Engineering Sichuan Chengdu China Zhengzhou University of Light Industry International Education College Henan Zhengzhou China Hebei University School of Cyber Security and Computer Hebei Baoding China Northeast Petroleum University School of Electrical & Information Engineering Heilongjiang Daqing China
Faulty recognition and recovery is extremely essential component for existing sensor networks. However, current investigations concentrates on the recognition process and develop abundant advanced identification metho... 详细信息
来源: 评论
A Position-Aware Transformer for Image Captioning
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 2065-2081页
作者: Zelin Deng Bo Zhou Pei He Jianfeng Huang Osama Alfarraj Amr Tolba School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China Advanced Forming Research Centre University of StrathclydeRenfrewshirePA49LJGlasgowUnited Kingdom Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Mathematics and Computer Science Faculty of ScienceMenoufia UniversityEgypt
Image captioning aims to generate a corresponding description of an *** recent years,neural encoder-decodermodels have been the dominant approaches,in which the Convolutional Neural Network(CNN)and Long Short TermMemo... 详细信息
来源: 评论
cybersecurity Challenges In Grid-Tied Power Converters
Cybersecurity Challenges In Grid-Tied Power Converters
收藏 引用
International Conference on Power Energy, Environment and Intelligent Control (PEEIC)
作者: Vineet Kumar Adlin Jebakumari S Mansingh Meena Department of Computer Science and Engineering (Cyber Security) Noida Institute of Engineering & Technology Greater Noida Uttar Pradesh India Computer Science Engineering Department Jain (Deemed to be University) Bangalore India Department of Electrical Engineering Vivekananda Global University Jaipur India
The integration of power electronic converters into electrical grids is essential for the interconnection of microgrids, electric cars, energy storage systems, renewable energy sources, and high-voltage DC cables for ...
来源: 评论
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaoyang Xu Mengda Yang Wenzhe Yi Ziang Li Juan Wang Hongxin Hu Yong Zhuang Yaxin Liu Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Department of Computer Science and Engineering University at Buffalo SUNY
Split Learning (SL) is a distributed learning framework renowned for its privacy-preserving features and minimal computational requirements. Previous research consistently highlights the potential privacy breaches in ... 详细信息
来源: 评论
Distributed Secure Storage Scheme Based on Sharding Blockchain
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4485-4502页
作者: Jin Wang Chenchen Han Xiaofeng Yu Yongjun Ren R.Simon Sherratt School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Business Nanjing UniversityNanjing210093China School of Computer School of SoftwareSchool of Cyberspace SecurityEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science&TechnologyNanjing210044China Department of Biomedical Engineering University of ReadingRG66AYUK
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as in... 详细信息
来源: 评论
An Enhanced Authentication Protocol for IoT-AmI Environment
An Enhanced Authentication Protocol for IoT-AmI Environment
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Shree Chand Khichar Awaneesh Kumar Yadav Manoj Misra Brij B. Gupta Dept. of Computer Science and Engineering Indian Institute of Technology Roorkee Uttarakhand India International Center for AI and Cyber Security Research and Innovations Asia University Taichung
The rapid proliferation of the Internet of Things (IoT) in recent years has fostered the swift development of various applications, enabling seamless connections between consumers and everyday utilities. One sector th... 详细信息
来源: 评论
Evaluating The Mixing Performance in A Planar Passive Micromixer With T-shape and SAR Mixing Chambers: Comparative Study  2
Evaluating The Mixing Performance in A Planar Passive Microm...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Ababneh, Jafar Deif, Mohanad A. Solyman, Ahmad Zekry, Rahma S. Hafez, Mohamed Sharfo, Samer M. Cyber Security Zarqa University The Faculty of Information Technology Zarqa Jordan College of Engineering University of Business and Technology Jeddah Saudi Arabia Department of Artificial Intelligence 12566 Egypt School of Computing Engineering and Built Environment Glasgow Caledonian University Glasgow United Kingdom University Department of Bioelectronics Cairo Egypt INTI-IU-University Faculty of Engineering Feqs Nilai Malaysia
In Microfluidic devices have gained significant interest in various fields, including biomedical diagnostics, environmental preservation, animal epidemic avoidance, and food safety regulation. Micromixing phenomena ar... 详细信息
来源: 评论