咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1301-1310 订阅
排序:
Explore the Impact of Quantum Computing to Enhance Cryptographic Protocols and Network security Measures
Explore the Impact of Quantum Computing to Enhance Cryptogra...
收藏 引用
Computing, Power and Communication Technologies (IC2PCT), IEEE International Conference on
作者: S. Ambika V. Balaji R.Thalapathi Rajasekaran P.N. Periyasamy N. Kamal Department of Information Technology E. G. S. Pillay Engineering College Nagapattinam Tamil Nadu India Department of CSE (Cyber Security) Easwari Engineering College Chennai India Dept. of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Hindusthan Institute of Technology India Dept. of Computer Science and Engineering GRT Institute of Engineering and Technology Tiruttani Tamil Nadu India
The revolutionary effects of quantum computing on security procedures for networks and cryptographic protocols are the focus of this study. Our research shows that conventional cryptographic algorithms are susceptible...
来源: 评论
Research on the Characteristics and security Risks of the Internet of Vehicles Data  7
Research on the Characteristics and Security Risks of the In...
收藏 引用
7th IEEE International Conference on Data Science in cyberspace, DSC 2022
作者: Sun, Jun Liu, Dong Liu, Yang Li, Chuang Ma, Yumeng Institute of Network Security Inspection and Evaluation China Industrial Control System Cyber Emergency Response Team Beijing China University of Electronic Science and Technology of China School of Computer Science and Engineering Szechwan China
As a new industry integrated by computing, communication, networking, electronics, and automation technology, the Internet of Vehicles (IoV) has been widely concerned and highly valued at home and abroad. With the rap... 详细信息
来源: 评论
Unveiling Deception: Different Strategies for Combatting Arabic Fake News  25
Unveiling Deception: Different Strategies for Combatting Ara...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Khattab, Nada Al-Qerem, Ahmad Nashwan, Shadi Jebreen, Issam Rajab, Mohammed Alauthman, Mohammad Jeadi, Mohammad Elrashidi, Ali Zarqa University Faculty of Information Technology Computer Science Department Zarqa13110 Jordan Middle East University Faculty of Information Technology Cybersecurity Department Amman11831 Jordan University Headquarter University of Anbar Ramadi Iraq University of Petra Department of Information Security Amman11196 Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
the proliferation of fake news has become a widespread problem in the contemporary era of information, posing possible harm to public discussions, political stability, and community confidence. To tackle this difficul... 详细信息
来源: 评论
CDE-Learning: Camera Deviation Elimination Learning for Unsupervised Person Re-identification  39
CDE-Learning: Camera Deviation Elimination Learning for Unsu...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Peng, Jinjia Zhang, Songyu Wang, Huibing School of Cyber Security and Computer Hebei University Hebei China Hebei Machine Vision Engineering Research Center China College of Information Science and Technology Dalian Maritime University China
Unsupervised Person Re-identification (Re-ID) aims to identify the same person shot from non-overlapping cameras without any annotated data. In this task, attributes such as contrast, saturation, and resolution of the... 详细信息
来源: 评论
CAViaR Secretary Bird Optimization Algorithm Enabled Transfer Learning for Melanoma Classification
CAViaR Secretary Bird Optimization Algorithm Enabled Transfe...
收藏 引用
IEEE EMBS Conference on Biomedical engineering and Sciences (IECBES)
作者: P. Vijaya Basant Kumar Joseph Mani Satish Chander Roshan Fernandes Hothefa Jassim Dilip Kumar Singvi Department of Mathematics and Computer Science Modern College of Business and Science Bowshar Sultanate of Oman Department of Computer Science and Engineering Birla Institute of Technology Mesra Ranchi India Department of Cyber Security NMAMIT Karkala Karnataka India Department of Internal medicine Burjeel Hospital Oman
Melanoma is one amongst aggressive diseases with some ordinary treatment choices. The fatality rates and their occurrence vary expansively around the world relying upon access to earlier identification and basic medic... 详细信息
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Yajun Li, Ru Li, Aimin Fei, Rong Guo, Xie Wu, Fang-Xiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ... 详细信息
来源: 评论
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts
Backdoor-Resistant Public Data Integrity Verification Scheme...
收藏 引用
作者: Li, Shanshan Xu, Chunxiang Zhang, Yuan Du, Yicong Yang, Anjia Wen, Xinsheng Chen, Kefei Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China University of Electronic Science and Technology of China Yangtze Delta Region Institute Huzhou313001 China Jinan University College of Cyber Security Guangzhou510632 China Hangzhou Normal University Department of Mathematics Hangzhou310030 China
This article analyzes existing smart contract-based public data integrity verification schemes and identifies certain weaknesses. First, the fair arbitration mechanism deployed in these schemes fails to meet the users... 详细信息
来源: 评论
Enumeration and Post-Enumeration Attack on Active Directory and Their Detection Using log Correlation Method
Enumeration and Post-Enumeration Attack on Active Directory ...
收藏 引用
International Conference on Computation System and Information technology for Sustainable Solutions (CSITSS)
作者: K Meghana Shankaramma M.N. Thippeswamy A M Anu M Chaithra N Nagamani Computer Science and Engineering (Cyber Security) M S Ramaiah Institute of Technology (Affiliated to VTU) Bangalore India Dr. Ambedkar Institute of Technology (Dr. AIT) Bangalore India
Microsoft Active Directory Domain Services (AD DS) is a cornerstone of IT infrastructure in many organizations due to its widespread use and comprehensive feature set. AD DS centralizes network management, streamlines... 详细信息
来源: 评论
cyberbullying Detection and Recognition with Type Determination Based on Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5307-5319页
作者: Khalid M.O.Nahar Mohammad Alauthman Saud Yonbawi Ammar Almomani Computer Science Department Yarmouk UniversityIrbidJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Software Engineering Department University of JeddahJeddahKSA Research and Innovation Department Skyline University CollegeP.O.Box 1797SharjahUAE IT Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan
Social media networks are becoming essential to our daily activities,and many issues are due to this great involvement in our *** is a social media network issue,a global crisis affecting the victims and society as a ... 详细信息
来源: 评论
Quantum Remote State Preparation Based on Quantum Network Coding
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 119-132页
作者: Zhen-Zhen Li Zi-Chen Li Yi-Ru Sun Haseeb Ahmad Gang Xu Xiu-Bo Chen School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Information Security Center State key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network *** this paper,a quantum remote state preparation scheme based on quantum network coding is *** with the... 详细信息
来源: 评论