咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1351-1360 订阅
排序:
Code-Switched Urdu ASR for Noisy Telephonic Environment using Data Centric Approach with Hybrid HMM and CNN-TDNN
arXiv
收藏 引用
arXiv 2023年
作者: Khan, Muhammad Danyal Ali, Raheem Aziz, Arshad Department of Cyber Security Pakistan Navy Engineering College National University of Science and Technology Karachi Pakistan Department of Computer Science Bahria University Karachi Campus Karachi Pakistan
Call Centers are an effective medium for businesses, organizations and even government institutions to interact with their clients despite availability of mobile apps and websites. These centers have huge amount of au... 详细信息
来源: 评论
Neuromorphic-Driven Agentic AI for Autonomous Decision-Making Systems
Neuromorphic-Driven Agentic AI for Autonomous Decision-Makin...
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE International Conference on
作者: Manjunath Kamath K Samata Mehta.S Akshaya H. L Shilpashree N Girish Jadhav Abhijit Mitra Department of Cyber Security NMAM Institute of Technology NITTE (Deemed to be University) Karkala India Department Of CSE (IOT & Cyber Security including Block Chain Technology) Brindavan College of Engineering Bengaluru India Department of Computer Science Sarada Vilas College Mysuru India Department Of Electrical Engineering Faculty of Engineering and Technology Parul institute of Engineering and Technology Parul University Post Limda India Symbiosis Centre for Advanced Legal Studies and Research (SCALSAR) Symbiosis Law School Symbiosis International (Deemed University) Pune India
Agentic AI represents a paradigm shift in the development of intelligent systems capable of adaptive and proactive interactions in dynamic and complex environments. By integrating reinforcement learning (RL) with cogn... 详细信息
来源: 评论
Non-Linearly Weighted Pheromone Updating for Ant Colony Optimization
Non-Linearly Weighted Pheromone Updating for Ant Colony Opti...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Qiu, Ying-Han Yang, Qiang Li, Jian-Yu Jia, Ya-Hui Wang, Zi-Jia Gao, Xu-Dong Lu, Zhen-Yu Zhang, Jun College of Artificial Intelligence Nankai University Tianjin China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing China School of Future Technology South China University of Technology Guangzhou China Hanyang University Department of Electrical and Electronic Engineering Ansan Korea Republic of
Ant Colony Optimization (ACO) has witnessed great success in tackling the Traveling Salesman Problem (TSP). In ACO, ants involved in the pheromone update play pivotal roles in its optimization effectiveness. Along thi... 详细信息
来源: 评论
Compressing Time Series Towards Lightweight Integrity Commitments  8
Compressing Time Series Towards Lightweight Integrity Commit...
收藏 引用
8th South-East Europe Design Automation, computer engineering, computer Networks and Social Media Conference, SEEDA-CECNSM 2023
作者: Katsika, Angeliki Papageorgiou, Konstantinos Fakis, Alexandros Kakarountas, Athanasios Andritsopoulos, Fotis Plagianakos, Vassilis Spathoulas, Georgios University of the Aegean Department of Information and Communication Systems Engineering Samos Greece ITrack Athens Greece University of Thessaly Department of Computer Science and Biomedical Informatics Lamia Greece Department of Information Security and Communication Technology Gjovik Norway
In the current era of big data, the generation and preservation of time series data has seen widespread adoption in various sectors such as trade, healthcare, and industry. At the same time, data have become a prized ... 详细信息
来源: 评论
RVAFM: Re-parameterizing Vertical Attention Fusion Module for Handwritten Paragraph Text Recognition
arXiv
收藏 引用
arXiv 2025年
作者: Zheng, Jinhui Liu, Zhiquan Si, Yain-Whar Li, Jianqing Zhang, Xinyuan Li, Xiaofan Huang, Haozhi Gong, Xueyuan School of Intelligent Systems Science and Engineering Jinan University Guangdong Province China College of Cyber Security Jinan University Guangdong Province China Department of Computer and Information Science Faculty of Science and Technology University of Macau China School of Computer Science and Engineering Macau University of Science and Technology China
Handwritten Paragraph Text Recognition (HPTR) is a challenging task in computer Vision, requiring the transformation of a paragraph text image, rich in handwritten text, into text encoding sequences. One of the most a... 详细信息
来源: 评论
Optimizing Phishing URL Detection: A Comparative Analysis of Feature Counts and Training Times  5
Optimizing Phishing URL Detection: A Comparative Analysis of...
收藏 引用
5th International Conference on Intelligent Computing, Communication, Networking and Services, ICCNS 2024
作者: Alajlouni, Moayyad Tashtoush, Yahya Dossari, Saud Alhajaj Al. Darwish, Omar Jordan University of Science and Technology Department of Computer Science Irbid Jordan Prince Sattam bin Abdulaziz University Department of Electrical Engineering Wadi Addwasir Saudi Arabia Eastern Michigan University Information Security and Applied Computing Department YpsilantiMI48197 United States
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic web sites to obtain sensitive information such as passwords and bank statements. On... 详细信息
来源: 评论
Price Prediction of Digital Currencies using Machine Learning  10
Price Prediction of Digital Currencies using Machine Learnin...
收藏 引用
10th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2023
作者: Dwivedi, Ashutosh Dhar Dutta, Subhayu Adhikary, Subhrangshu Pedersen, Jens Myrup Aalborg University Cyber Security Group Department of Electronic Systems Copenhagen Denmark Dr. B.C. Roy Engineering College Department of Computer Science & Engineering West Bengal Durgapur713206 India Spiraldevs Automation Industries Pvt. Ltd. Department of Research & Development West Bengal Raiganj733123 India
Cryptocurrencies have gained immense significance and popularity in recent times. With thousands of digital currencies available, selecting the right one can be challenging for users. In the financial sector, accurate... 详细信息
来源: 评论
Classification and Labeling Techniques of Educational Resources Based on BERT-CNN model
Classification and Labeling Techniques of Educational Resour...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Viswanathan.M.P Noor Kaylan Hamid V Rajyalakshmi Neelam Sharma Sharmeen Izzat Hassan S Muthuperumal Hindusthan College of Engineering and Technology Coimbatore India Department of Computer Education Al Kitab University Kirkuk Iraq Department of CSE (Cyber Security) Vignana Bharathi Institute of Technology India School of Physical Education Lovely Professional University Punjab India Department of Computer Engineering College of Engineering Knowledge University Erbil Iraq Department of Mathematics K.Ramakrishnan College of Engineering Trichy India
The key factor in promoting accessibility and improving the educational experience is accurate classification and labelling of educational materials. Research paper presents a novel approach to educational material cl... 详细信息
来源: 评论
Data Analytics for Identifying and Reducing Hospital Readmissions  3
Data Analytics for Identifying and Reducing Hospital Readmis...
收藏 引用
3rd International Conference on Advancement in Computation and computer Technologies, InCACCT 2025
作者: Vidhya, K. Srinu, N. Ashok, D. Rajasekaran, Arun Sekar Kumar, Ashok S. Rajasekaran, U. Division of Data Science and Cyber Security School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore India Department of Computer Science Engineering QIS College of Engineering and Technology Ongole India Department of AIMLDS QIS College of Engineering and Technology Ongole India Department of Electronics and Communication Engineering SR University Telangana Warangal India Department of Electronics and Communication Engineering Karpagam Academy of Higher Education Coimbatore India Department of Electronics and Communication Engineering Builders Engineering College Nathakadaiyur India
Data analytics examines healthcare data to identify patterns and personalize care plans ultimately by reducing hospital readmissions. Readmissions after discharge increase healthcare costs, lower quality, and dissatis... 详细信息
来源: 评论
Research on Distributed Sensor Network Faulty Recovery Method based on Attention Mechanism  3
Research on Distributed Sensor Network Faulty Recovery Metho...
收藏 引用
3rd International Conference on Artificial Intelligence and computer engineering, ICAICE 2022
作者: Xing, Zheng Liu, Boya Guan, Haochen Zhang, Yiran Zhang, Ying Chengdu University of Technology The College of Nuclear Technology and Automation Engineering Sichuan Chengdu China Chengdu University of Technology College of Environment and Civil Engineering Sichuan Chengdu China Zhengzhou University of Light Industry International Education College Henan Zhengzhou China Hebei University School of Cyber Security and Computer Hebei Baoding China Northeast Petroleum University School of Electrical & Information Engineering Heilongjiang Daqing China
Faulty recognition and recovery is extremely essential component for existing sensor networks. However, current investigations concentrates on the recognition process and develop abundant advanced identification metho... 详细信息
来源: 评论