咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1261-1270 订阅
排序:
Mapping Quantum Circuits to 2-Dimensional Quantum Architectures
Mapping Quantum Circuits to 2-Dimensional Quantum Architectu...
收藏 引用
2022 Informatik in den Naturwissenschaften, INFORMATIK 2022 - 2022 computer Science in the Natural Sciences, INFORMATIK 2022
作者: Datta, Kamalika Kole, Abhoy Sengupta, Indranil Drechsler, Rolf Cyber Physical System Bremen Germany JIS University Department of Computer Science and Engineering Kolkata India Indian Institute of Technology Kharagpur Department of Computer Science and Engineering India University of Bremen Group of Computer Architecture Bremen Germany
We have been witnessing a rapid growth in quantum computing research over the years, with the emergence of demonstrable quantum computers of moderate size. The major issues that are faced to run a quantum algorithm re... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
A Novel Human Face Expression Recognition Based on Image Processing Assisted Convoluted Deep Learning Methodology
A Novel Human Face Expression Recognition Based on Image Pro...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Tamilselvi, M. Venkata Siva Prasad, Ch. Kumari, M. Varuna Lavanya, R. Sai Nandurkar, Y. Al-Mousa, Mohammad Rasmi Dept of Ece Chennai India Jeppiaar Engineering College Department of Ece Rajiv Gandhi salai Chennai119 India Qis College of Engineering and Technology Department of S&h Pondur Road Vengamukkapalem Ongole Prakasam Andhra Pradesh Prakasam District523272 India Qis College of Engineering and Technology Department of Mca Pondur Road Vengamukkapalem Ongole Prakasam Andhra Pradesh Prakasam District523272 India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India College of Information Technology Zarqa University Department of Cyber Security zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Facial expression recognition has become a critical component in applications involving human-computer interaction, security systems, and behavioral analysis. This paper presents a novel approach to human face express... 详细信息
来源: 评论
A Novel Design of Image Based Object Recognition Model Using Enhanced Neural Classification Logic
A Novel Design of Image Based Object Recognition Model Using...
收藏 引用
Frontier Technologies and Solutions (ICFTS), International Conference on
作者: Anvar Shathik J B Ravi Chandra M D Nandeesh T.C. Maniunath Swathi Pothala Nageswara Rao Lavuri Department of Computer Science & Engineering Anjuman Institute of Technology and Management Bhatkal Karnataka India Department of Electronics and Communication Engineering G.Pullaiah College of Engineering and Technology Kurnool Department of Electronics and Instrumentation Engineering Ramaiah Institute of Technology Bangalore Department of Computer Science Engg. IoT Cyber Security & Block Chain Technology Dean Research (R & D) Rajarajeswari College of Engineering Bangalore Karnataka India Department of Computer Science S V University Tirupati Department of Electronics and Communication Engineering CVR College of Engineering Telangana India
The field of computer vision is a hard-hitting domain to detect and recognition objects. There are many strategies and algorithms to help in item detection in natural environments. The surveillance system and the imag... 详细信息
来源: 评论
Proposed Privacy Preservation Technique for Color Medical Images
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 719-732页
作者: Walid El-Shafai Hayam A.Abd El-Hameed Noha A.El-Hag Ashraf A.M.Khalaf Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie Department of Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Electrical Communications Engineering Department Faculty of EngineeringMinia UniversityMinia61111Egypt Higher Institute of Commercial Science Management Information SystemsEl-Mahala El-KobraEgypt Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Nowadays,the security of images or information is very *** paper introduces a proposed hybrid watermarking and encryption technique for increasing medical image ***,the secret medical image is encrypted using Advanced... 详细信息
来源: 评论
Next Generation Image Watermarking via Combined DWT-SVD Technique  2
Next Generation Image Watermarking via Combined DWT-SVD Tech...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Al-Na'amneh, Qais Almomani, Ammar Nasayreh, Ahmad Nahar, Khalid M.O. Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Alauthman, Mohammad Applied Science Private University Department Of Cyber Security Amman Jordan School Of Computing Skyline University College P.O. Box 1797 Sharjah United Arab Emirates AlHuson University College AlBalqa Applied University I. T. Department Irbid Jordan Yarmouk University Department Of Computer Sciences Irbid211633 Jordan Yarmouk University Faculty Of Information Technology Computer Sciences Irbid211633 Jordan Trine University Dep. Of Business Administration IN United States University Of Zawia Dep.of Mechanical And Industrial Engineering Tripoli Libya University Of Petra Faculty Of Information Technology Department Of Information Security Amman Jordan
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Zainab Mohammed Hussein Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Science Information System University of Technology Imam AIKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
Reliability of Multipath Networks with Optimization of the Location of Inter-Path Communication Nodes
Reliability of Multipath Networks with Optimization of the L...
收藏 引用
2023 International Russian Smart Industry Conference, SmartIndustryCon 2023
作者: Bogatyrev, Vladimir A. Tu Le, Anh Abramova, Evgenia A. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia University ITMO Faculty of Software Engineering and Computer Technology Saint Peterburg Russia
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p... 详细信息
来源: 评论
KA$^{2}$2SE: Key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor Networks
收藏 引用
IEEE Transactions on Services Computing 2024年 第1期18卷 226-238页
作者: Haijiang Wang Jianting Ning Wei Wu Chao Lin Kai Zhang School of Information and Electronic Engineering Zhejiang University of Science and Technology Zhejiang China School of Cyber Science and Engineering Wuhan University Wuhan China Faculty of Data Science City University of Macau Macau China College of Education Sciences Hong Kong University of Science and Technology Guangzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China Guangdong Key Laboratory of Blockchain Security Guangzhou University Guangzhou China College of Computer Science and Technology Shanghai University of Electric Power Shanghai China
As a promising technology, key-aggregation searchable encryption with constant computation overhead is especially suitable for sensor nodes with limited computation resources in wireless sensor networks. However, in m... 详细信息
来源: 评论