咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1281-1290 订阅
排序:
Detecting Human Eye Blinks through OpenCV
Detecting Human Eye Blinks through OpenCV
收藏 引用
International Conference for Convergence of technology (I2CT)
作者: Kirti Wanjale Araddhana Arvind Deshmukh Jyoti Chetan Vanikar Alpana Prashant Adsul Shailesh P. Bendale Department Of Computer Engineering Vishwakarma Institute of Information Technology Symbiosis Skills and Professional University Pune Pune Maharashtra India Department of Computer Science & Information Technology (Cyber Security) Symbiosis Skill and Professional University Kiwale Pune Department of Computer Engineering Dr. D.Y. Patil College of Engineering and Innovation Affiliated to Savitribai Phule Pune University Department of Computer Engineering NBN Sinhgad School of Engineering Pune
Blink detection, a crucial part of facial movement analysis, is applied in a number of fields, including human-computer interaction, driver monitoring, and healthcare. However, automatic blink recognition presents uni... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management
A Proposed Approach for Risk Planning and Management
收藏 引用
Information technology (ACIT)
作者: Mohammed N. Al Refai Yazan Al-Smadi Adai Al-Momani Zeyad M. Jamhawi Ahmed Ali Otoom Issa Atoum Ahid Yaseen Jafar Ababneh Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Computer Science Applied Science Private University Amman Jordan Department of Cyber Security Applied Science Private University Amman Jordan Software Engineering Department Faculty of Information Technology Philadelphia University Jordan Department of Cyber Security Zarqa University Zarqa Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Automatic Fish Species Identification Using Convolutional Neural Networks (CNN)
Automatic Fish Species Identification Using Convolutional Ne...
收藏 引用
Sustainable Expert Systems (ICSES), International Conference on
作者: I. Mettildha Mary T. Ragunthar M. Priyadharsini H Shyam Krishnaa M K Sujit Department of Computer Science and Engineering(Cyber Security) Dr.N.G.P Institute of Technology Coimbatore Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Chennai Tamil Nadu India Department of Information Security School of Computer Science and Engineering (SCOPE) Vellore Institute Technology Vellore Tamil Nadu India Siemens Healthineers Bangalore Atheniac Bangalore
Accurate identification of fish species is critical for applications in fisheries management., biodiversity monitoring., and conservation efforts. Conventional manual identification techniques take a lot of time and a... 详细信息
来源: 评论
Enhanced Encrypted Traffic Classification Through Packet-Flow Dual Views
Enhanced Encrypted Traffic Classification Through Packet-Flo...
收藏 引用
2025 IEEE Wireless Communications and Networking Conference, WCNC 2025
作者: Feng, Beibei Wang, Qi Yijing, Wang Li, Feifan Xu, Xiaolin Zang, Tianning Ma, Jingrun Coordination Center of China National Computer Network Emergency Response Technical Team Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China China Assets Cybersecurity Technology Co. Ltd. Beijing China Zhongguancun Laboratory Beijing China
In the field of cybersecurity, encrypted traffic classification is of paramount importance, serving as a crucial technology for ensuring data privacy and defending against cyber attacks. Existing ETC (Encrypted Traffi... 详细信息
来源: 评论
Generalized Simultaneous Perturbation-Based Gradient Search With Reduced Estimator Bias
收藏 引用
IEEE Transactions on Automatic Control 2025年 第7期70卷 4687-4702页
作者: Pachalyl, Soumen Bhatnagarz, Shalabh Prashanth, L.A. TCS Research Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India Indian Institute of Science Department of Computer Science and Automation The Robert Bosch Centre for Cyber Physical Systems Bangalore India Indian Institute of Technology Madras Department of Computer Science and Engineering Chennai India
We present a family of generalized simultaneous perturbation-based gradient search (GSPGS) estimators that use noisy function measurements. The number of function measurements required by each estimator is guided by t... 详细信息
来源: 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
Intelligent Poultry Health Management Based on Improved YOLOv8 Algorithm
Intelligent Poultry Health Management Based on Improved YOLO...
收藏 引用
2024 IEEE International Conference on Agrosystem engineering, technology and Applications, AGRETA 2024
作者: Yajie, Liu Md Johar, Md Gapar Hajamydeen, Asif Iqbal Raya, Lilysuriazna School of Graduate Studies Management and Science University Shah Alam Malaysia Software Engineering and Digital Innovation Centre Management and Science University Shah Alam Malaysia Artificial Intelligence and Cyber Security Centre Management and Science University Shah Alam Malaysia Management & Science University Department of Engineering & Technology Shah Alam Malaysia
Poultry production plays a critical role in the development of the global economy. Meanwhile, it also raises food safety concerns for humans. Poultry disease prevention and control are important for farmers to ensure ... 详细信息
来源: 评论
Comparative Evaluation of Deep Learning Models in Alzheimer’s Disease Diagnosis
收藏 引用
Procedia computer Science 2025年 258卷 2352-2361页
作者: Leena Arya Yogesh Kumar Sharma Smitha Nayak Janaki Sivakumar Assistant Professor Computing Department Muscat College Oman Associate Professor Programme leader Computer security and forensics Department of Computer Science and Creative Technologies Global College of Engineering and Technology Muscat Oman
Alzheimer’s Disease (AD) is an ever-evolving neurodegenerative confusion that influences the neurons of the mind in a manner that hinders the patients’ ability to solve problems and remember issues and that requires... 详细信息
来源: 评论
Research on Concurrency Control in Database Systems  12th
Research on Concurrency Control in Database Systems
收藏 引用
12th International Conference on computer engineering and Networks, CENet 2022
作者: Shen, Pengxu Qian, Hanwei Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
In a database system, if the degree of concurrency is high, using a concurrency control algorithm alone will reduce the performance of the system, and the process of selecting a concurrency control algorithm will virt... 详细信息
来源: 评论
security Revisited: Honeytokens meet Google Authenticator  7
Security Revisited: Honeytokens meet Google Authenticator
收藏 引用
7th South-East Europe Design Automation, computer engineering, computer Networks and Social Media Conference, SEEDA-CECNSM 2022
作者: Papaspirou, Vassilis Papathanasaki, Maria Maglaras, Leandros Kantzavelou, Ioanna Douligeris, Christos Ferrag, Mohamed Amine Janicke, Helge University of West Attica Department of Informatics and Computer Engineering Athens Greece University of Thessaly Department of Cs and Telecommunications Lamia Greece Cyber Technology Institute De Montfort University Leicester United Kingdom University of Piraeus Department of Informatics Piraeus Greece Guelma University Department of Computer Science Guelma Algeria Cyber Security CRC Edith Cowan University Perth Perth6027 Australia
In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more fac... 详细信息
来源: 评论