咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1361-1370 订阅
排序:
cybersecurity Challenges In Grid-Tied Power Converters
Cybersecurity Challenges In Grid-Tied Power Converters
收藏 引用
International Conference on Power Energy, Environment and Intelligent Control (PEEIC)
作者: Vineet Kumar Adlin Jebakumari S Mansingh Meena Department of Computer Science and Engineering (Cyber Security) Noida Institute of Engineering & Technology Greater Noida Uttar Pradesh India Computer Science Engineering Department Jain (Deemed to be University) Bangalore India Department of Electrical Engineering Vivekananda Global University Jaipur India
The integration of power electronic converters into electrical grids is essential for the interconnection of microgrids, electric cars, energy storage systems, renewable energy sources, and high-voltage DC cables for ...
来源: 评论
A Position-Aware Transformer for Image Captioning
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 2065-2081页
作者: Zelin Deng Bo Zhou Pei He Jianfeng Huang Osama Alfarraj Amr Tolba School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China Advanced Forming Research Centre University of StrathclydeRenfrewshirePA49LJGlasgowUnited Kingdom Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Mathematics and Computer Science Faculty of ScienceMenoufia UniversityEgypt
Image captioning aims to generate a corresponding description of an *** recent years,neural encoder-decodermodels have been the dominant approaches,in which the Convolutional Neural Network(CNN)and Long Short TermMemo... 详细信息
来源: 评论
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Xiaoyang Xu Mengda Yang Wenzhe Yi Ziang Li Juan Wang Hongxin Hu Yong Zhuang Yaxin Liu Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Department of Computer Science and Engineering University at Buffalo SUNY
Split Learning (SL) is a distributed learning framework renowned for its privacy-preserving features and minimal computational requirements. Previous research consistently highlights the potential privacy breaches in ... 详细信息
来源: 评论
Distributed Secure Storage Scheme Based on Sharding Blockchain
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4485-4502页
作者: Jin Wang Chenchen Han Xiaofeng Yu Yongjun Ren R.Simon Sherratt School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Business Nanjing UniversityNanjing210093China School of Computer School of SoftwareSchool of Cyberspace SecurityEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science&TechnologyNanjing210044China Department of Biomedical Engineering University of ReadingRG66AYUK
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as in... 详细信息
来源: 评论
An Enhanced Authentication Protocol for IoT-AmI Environment
An Enhanced Authentication Protocol for IoT-AmI Environment
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Shree Chand Khichar Awaneesh Kumar Yadav Manoj Misra Brij B. Gupta Dept. of Computer Science and Engineering Indian Institute of Technology Roorkee Uttarakhand India International Center for AI and Cyber Security Research and Innovations Asia University Taichung
The rapid proliferation of the Internet of Things (IoT) in recent years has fostered the swift development of various applications, enabling seamless connections between consumers and everyday utilities. One sector th... 详细信息
来源: 评论
Evaluating The Mixing Performance in A Planar Passive Micromixer With T-shape and SAR Mixing Chambers: Comparative Study  2
Evaluating The Mixing Performance in A Planar Passive Microm...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Ababneh, Jafar Deif, Mohanad A. Solyman, Ahmad Zekry, Rahma S. Hafez, Mohamed Sharfo, Samer M. Cyber Security Zarqa University The Faculty of Information Technology Zarqa Jordan College of Engineering University of Business and Technology Jeddah Saudi Arabia Department of Artificial Intelligence 12566 Egypt School of Computing Engineering and Built Environment Glasgow Caledonian University Glasgow United Kingdom University Department of Bioelectronics Cairo Egypt INTI-IU-University Faculty of Engineering Feqs Nilai Malaysia
In Microfluidic devices have gained significant interest in various fields, including biomedical diagnostics, environmental preservation, animal epidemic avoidance, and food safety regulation. Micromixing phenomena ar... 详细信息
来源: 评论
Side-Channel-Driven Intrusion Detection System for Mission Critical Unmanned Aerial Vehicles
Side-Channel-Driven Intrusion Detection System for Mission C...
收藏 引用
IEEE International Symposium on Quality Electronic Design
作者: Alejandro Almeida Muneeba Asif Md Tauhidur Rahman Mohammad Ashiqur Rahman Department of Electrical and Computer Engineering Analytics for Cyber Defense (ACyD) Lab Florida International University USA Department of Electrical and Computer Engineering Security Reliability Low-power and Privacy (SeRLoP) Lab Florida International University USA
Hardware Trojans (HTs) are gradually becoming a growing threat in the IoT landscape. This type of attack can result in catastrophic incidents for unmanned aerial vehicles (UAVs). Examples of these incidents could be i... 详细信息
来源: 评论
Design and Implementation of a 5G security Testbed Based on Zero Trust Architecture  15
Design and Implementation of a 5G Security Testbed Based on ...
收藏 引用
15th International Conference on Information and Communication technology Convergence, ICTC 2024
作者: Yoon, Mahnsuk Seo, Jihun Lee, Jonghoon Cho, Keuchul Gumi Korea Republic of Center for Connected & Automated Driving Research Korea Transport Institute Department of The Fourth Industrial Revolution & Transport Sejong Korea Republic of Cyber Security Research Division Daejeon Korea Republic of School of Computer Secience and Engineering Software Education Center Kyungpook National University Daegu Korea Republic of
This paper presents the design and implementation of a 5G security testbed based on Zero Trust Architecture (ZTA). As 5G networks offer ultra-high speeds, low latency, and massive connectivity, ensuring their security... 详细信息
来源: 评论
A Novel Approach for Anomaly Detection using Snort Integrated with Machine Learning
A Novel Approach for Anomaly Detection using Snort Integrate...
收藏 引用
International Conference on Computing for Sustainable Global Development (INDIACom)
作者: T. Preethi Ponnuru Rakshitha Reddy Lekkala Likhitha Pendyala Pavan Kumar Abhinav Kamani Department of CSE – Cyber Security Data Science and Artificial Intelligence & Data Science VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad India
In today’s digital world, it is crucial to keep a company’s information safe from cyber threats. With new and more sophisticated network attacks emerging all the time, better security measures and ways to monitor ou...
来源: 评论
CAViaR Secretary Bird Optimization Algorithm Enabled Transfer Learning for Melanoma Classification
CAViaR Secretary Bird Optimization Algorithm Enabled Transfe...
收藏 引用
8th IEEE-EMBS Conference on Biomedical engineering and Sciences, IECBES 2024
作者: Vijaya, P. Kumar, Basant Mani, Joseph Chander, Satish Fernandes, Roshan Jassim, Hothefa Singvi, Dilip Kumar Modern College of Business and Science Department of Mathematics and Computer Science Bowshar Oman Birla Institute of Technology Mesra Department of Computer Science and Engineering Ranchi India NMAMIT Department of Cyber Security Karnataka Karkala India Burjeel Hospital Department of Internal Medicine Oman
Melanoma is one amongst aggressive diseases with some ordinary treatment choices. The fatality rates and their occurrence vary expansively around the world relying upon access to earlier identification and basic medic... 详细信息
来源: 评论