咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1291-1300 订阅
排序:
Tracking Objects and Activities with Attention for Temporal Sentence Grounding
Tracking Objects and Activities with Attention for Temporal ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zeyu Xiong Daizong Liu Pan Zhou Jiahao Zhu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wangxuan Institute of Computer Technology Peking University
Temporal sentence grounding (TSG) aims to localize the temporal segment which is semantically aligned with a natural language query in an untrimmed video. Most existing methods extract frame-grained features or object... 详细信息
来源: 评论
Anomaly Detection in Social Networks using Improved Local Outlier Factor
Anomaly Detection in Social Networks using Improved Local Ou...
收藏 引用
Intelligent Systems and Computational Networks (ICISCN), International Conference on
作者: Rana Veer Samara Sihman Bharattej R Muntader Mhsnhasan Sowmya M Prabhakaran M V K. Ghamya Department of Computer Science Saint Leo University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University of Al Diwaniyah Al Diwaniyah Iraq Department of Artificial Intelligence and Data Science Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering (Cyber Security) Dhanalakshmi Srinivasan College of Engineering and Technology Mamallapuram India Department of Computer Science and Engineering (AI&ML) Mohan Babu University Tirupati India
In the present era, Anomaly Detection (AD) aims to identify malicious activities in social networks. Even though previous researchers suggest effective methods for AD still there are limitations such as a lack of labe... 详细信息
来源: 评论
Empirical Evaluation of Real-Time Diabetic Retinopathy Disease Detection using IoT Enabled Medical Imaging Processing Strategy
Empirical Evaluation of Real-Time Diabetic Retinopathy Disea...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: S. Agnes Shifani N. Saraswathy Margaret Clemencia. A G.B. Santhi Jayant Giri Mohammad Rasmi Al-Mousa Department of ECE Saveetha School of Engineering Saveetha Institute of Science and Technology (SIMATS) Saveetha University Chennai Department of Chemistry Parisutham Institute of Technology and Science(Autonomous) Thanjavur Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Chennai Department of Mechanical Engineering Yeshwantrao Chavan College of Engineering Nagpur India Department of Cyber Security College of Information Technology Zarqa University Zarqa Jordan
Diabetic Retinopathy (DR) poses a significant risk to vision among diabetic patients, necessitating early and accurate detection for effective intervention. This research introduced a novel methodology to detect the d... 详细信息
来源: 评论
Track the Answer: Extending TextVQA from Image to Video with Spatio-Temporal Clues  39
Track the Answer: Extending TextVQA from Image to Video with...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Yan Zeng, Gangyan Shen, Huawen Wu, Daiqing Zhou, Yu Ma, Can Institute of Information Engineering Chinese Academy of Sciences China VCIP & TMCC & DISSec College of Computer Science Nankai University China School of Cyber Security University of Chinese Academy of Sciences China School of Cyber Science and Engineering Nanjing University of Science and Technology China
Video text-based visual question answering (Video TextVQA) is a practical task that aims to answer questions by jointly reasoning textual and visual information in a given video. Inspired by the development of TextVQA...
来源: 评论
Detection of Thyroid Disease Through Machine Learning Technique  25
Detection of Thyroid Disease Through Machine Learning Techni...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Almomani, Mutaz Al-Qerem, Ahmad Nashwan, Shadi Jebreen, Issam Rajab, Mohammed Alauthman, Mohammad Jeadi, Mohammad Elrashidi, Ali Zarqa University Faculty of Information Technology Computer Science Department Zarqa13110 Jordan Middle East University Faculty of Information Technology Cybersecurity Department Amman11831 Jordan University Headquarter University of Anbar Ramadi Iraq University of Petra Department of Information Security Amman11196 Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Thyroid disease, one of the most common endocrine disorders, requires prompt diagnosis to effectively treat it. To improve diagnostic precision and expedite medical procedures, this paper explores the use of Machine L... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Enhancing Image security Using Novel Scrambling and Chaotic Techniques with ChaCha20 Algorithm
Enhancing Image Security Using Novel Scrambling and Chaotic ...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Datta Sai Manikanta Narayana Karun Kumar Enaganti P Mathivanan Department of Computer Science and Engineering(Cyber Security) Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai India
The importance of protecting the privacy and security of shared data has increased along with the popularity of image-sharing services. In this paper, we propose a method to improve image transmission security through... 详细信息
来源: 评论
A Survey on Semantic Communication Networks: Architecture, security, and Privacy
收藏 引用
IEEE Communications Surveys and Tutorials 2024年
作者: Guo, Shaolong Wang, Yuntao Zhang, Ning Su, Zhou Luan, Tom H. Tian, Zhiyi Shen, Xuemin Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an China University of Windsor Department of Electrical and Computer Engineering Windsor Canada University of Technology Sydney School of Computer Science Sydney Australia University of Waterloo Department of Electrical and Computer Engineering Waterloo Canada
With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditio... 详细信息
来源: 评论
Successive Interference Cancellation Approach to Estimated Outage and Coverage Probability for UDN B5G Network
Successive Interference Cancellation Approach to Estimated O...
收藏 引用
IEEE International Conference on Artificial Intelligence in engineering and technology (IICAIET)
作者: Faizan Qamar Anand Gachhadar Syed Hussain Ali Kazmi Rosilah Hassan Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia (UKM) Selangor Malaysia Department of Electronics and Computer Engineering Institute of Engineering Tribhuvan University Kathmandu Nepal
The rapid evolution of wireless communication technologies has led to the emergence of Ultra-Dense Networks (UDNs) in Beyond 5G (B5G) systems, providing unprecedented connectivity and capacity. However, the dense depl...
来源: 评论
Empowering Small and Medium Enterprises with Data Analytics for Enhanced Competitiveness  13
Empowering Small and Medium Enterprises with Data Analytics ...
收藏 引用
13th IEEE International Conference on Control System, Computing and engineering, ICCSCE 2023
作者: Mosbah, Aissa Ali, Musab A. M. Tahir, Nooritawati Md Dhofar University College of Commerce and Business Administration Salalah Oman University of Technology and Applied Sciences Ibri Oman International Information Technology University Department of Computer Engineering and Information Security Almaty Kazakhstan Universiti Teknologi Mara School of Electrical Engineering College of Engineering Malaysia Malaysia
In today's competitive landscape, Small and Medium-sized Enterprises (SMEs) are increasingly embracing business data analytics to gain valuable insights and make informed decisions. However, the true essence of bi... 详细信息
来源: 评论