咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1371-1380 订阅
排序:
Analysis of Anomaly Detection Techniques Applied to Web API Network Scenario  11
Analysis of Anomaly Detection Techniques Applied to Web API ...
收藏 引用
11th Joint International Information technology and Artificial Intelligence Conference, ITAIC 2023
作者: Huang, Zhendong Fan, Xuyan Li, Zhiqi Zhao, Changzhi Chen, Guangxuan Liu, Yuling People's Public Security University of China Department of Information and Network Security Beijing China Ruian Public Security Bureau Wenzhou China Zhejiang Police College Department of Computer and Information Security Hangzhou China The National Information Center of China Customs Beijing China Beijing State Grid Siji Network Security Technology Limited Company Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Web API networks comprise a multitude of API services, and compared to traditional network environments, they possess unique security requirements and face distinct threats. This article delves into the security chara... 详细信息
来源: 评论
Data Analytics for Identifying and Reducing Hospital Readmissions
Data Analytics for Identifying and Reducing Hospital Readmis...
收藏 引用
Advancement in Computation & computer Technologies (InCACCT), International Conference on
作者: Vidhya K Srinu N Ashok D Arun Sekar Rajasekaran Ashok Kumar S Rajasekaran U Division of Data Science and Cyber Security School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore India Department of Computer Science Engineering QIS College of Engineering and Technology Ongole India Department of AIMLDS QIS College of Engineering and Technology Ongole India Department of Electronics and Communication Engineering SR University Warangal Telangana India Department of Electronics and Communication Engineering Karpagam Academy of Higher Education Coimbatore India Department of Electronics and Communication Engineering Builders Engineering College Nathakadaiyur India
Data analytics examines healthcare data to identify patterns and personalize care plans ultimately by reducing hospital readmissions. Readmissions after discharge increase healthcare costs, lower quality, and dissatis... 详细信息
来源: 评论
Towards Fair Federated Learning via Unbiased Feature Aggregation
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: He, Zeqing Wang, Zhibo Dong, Xiaowei Sun, Peng Ren, Ju Ren, Kui Zhejiang University State Key Laboratory of Blockchain and Data Security China Institute of Blockchain and Data Security Hangzhou310027 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Zhongguancun Laboratory Beijing100094 China
Federated learning (FL) is a distributed machine learning framework that enables multiple clients to collaboratively train models without raw data exchange. Prior studies on FL mainly focus on optimizing learning perf... 详细信息
来源: 评论
A surrogate assisted evolutionary multitasking optimization algorithm[Formula presented]
收藏 引用
Applied Soft Computing 2023年 132卷
作者: Yang, Shangqi Qi, Yutao Yang, Rui Ma, Xiaoliang Zhang, Haibin School of Computer Science and Technology Xidian University Xi'an China School of Cyber Security Xidian University Xi'an China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
Evolutionary algorithms (EAs) have been applied with strong abilities to solve a wide range of applications, but it can solve one problem at a time. To improve efficiency, an emerging research paradigm in the field of... 详细信息
来源: 评论
Inaudible Sound Covert Channel with Anti-Jamming Capability: Attacks vs. Countermeasure
收藏 引用
Journal of Electronic Science and technology 2022年 第4期20卷 396-415页
作者: Xiao-Hang Wang Shou-Bin Li Ying-Tao Jiang Amit Kumar Singh Bi-Yun Ma Le-Tian Huang Mei Yang Fen Guo School of Cyber Science and Technology Zhejiang UniversityHangzhou 310012 ZJU-Hangzhou Global Scientific and Technological Innovation Center Hangzhou 310012 School of Software Engineering South China University of TechnologyGuangzhou 510006 Department of Electrical and Computer Engineering University of NevadaLas Vegas 89154 School of Computer Science and Electronic Engineering University of EssexColchester CO43SQ School of Electronics and Information Engineering South China University of TechnologyGuangzhou 510640 School of Electronic Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610054
When an inaudible sound covert channel(ISCC)attack is launched inside a computer system,sensitive data are converted to inaudible sound waves and then *** receiver at the other end picks up the sound signal,from which... 详细信息
来源: 评论
Patterns of Terror: A Comparative Predictive Model  5
Patterns of Terror: A Comparative Predictive Model
收藏 引用
5th IEEE International Conference on Electro-Computing Technologies for Humanity, NIGERCON 2024
作者: Olayinka, Tosin Comfort Adeniyi, Lawal Oghorodi, Duke Anazia, Kizito Eluemunor Onyijen, Ojei Harrison Nwankwo, Chukwuemeka Pascal Olayinka, Akinola Samson Nwankwo, Wilson Ukaoha, Kingsley Wellspring University Department of Computer Science Benin City Nigeria National Open University of Nigeria Department of Information Technology Abuja Nigeria Delta State University of Science and Technology Department of Computer Science Ozoro Nigeria Delta State University of Science & Technology Department of Information Systems & Technology Ozoro Nigeria Glorious Vision University Department of Computer Science Ogwa Nigeria Nigerian British University Department of Information Technology Asa Nigeria State University Department of Physics Edo Uzairue Nigeria Delta State University of Science & Technology Department of Cyber Security Ozoro Nigeria Wigwe University Department of Computer Science Isiokpo Nigeria
This study aims to develop an intelligent model for counter-terrorism operations using a dataset of 50,064 entries from the Armed Conflict Location and Event Data (ACLED) covering terrorism activities from 1997 to 202... 详细信息
来源: 评论
The Intersection of AI and IoT for Clinical Digitalization in Healthcare Domain
The Intersection of AI and IoT for Clinical Digitalization i...
收藏 引用
2025 International Conference on Intelligent Computing and Control Systems, ICICCS 2025
作者: Kavitha, K. Sangeethapriya, R. Malathi, V. Mylsami, T. Hazra, Riyanka Mohankumar, R. Mohan Babu University School of Computing Department of AI and ML Tirupati India Sona College of Technology Department of Information Technology Tamil Nadu Salem India Dr. N.G.P Arts and Science College Department of Computer Science With Cyber Security Tamil Nadu Coimbatore India Dr. G.R. Damodaran College of Science Department of Computer Science Tamil Nadu Coimbatore India Brainware University Department of Computational Science West Bengal Barasat India Paavai Engineering College Department of Computer Science and Engineering PachalTamilnadu Namakkal India
People in modern world suffer from a multitude of diseases, the most common of which is diabetes, which affects most senior citizens. Diabetes is associated with kidney problems, cancer, and heart disease. Combining I... 详细信息
来源: 评论
Guarding Voices, Protecting Homes: A Comprehensive Case Study on Voice Assistant security in Smart Living
Guarding Voices, Protecting Homes: A Comprehensive Case Stud...
收藏 引用
International Symposium on Digital Forensic and security (ISDFS)
作者: Fazalur Rehman Joudat Hashmi Moiz Abdullah Hafsah Zaman School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan Department of Analytics College of Engineering Georgia Tech University USA Department of Cyber Security Faculty of Computing and Artificial Intelligence Air University Islamabad Pakistan
The evolution of technologies in the last decades has transformed the whole human interaction experience with the digital world. Integrated into users' home voice assistant devices has rationalized personal intera... 详细信息
来源: 评论
E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Cong Yang, Jiahai Li, Yun Wu, Yue Chen, Yufan Li, Chenglong Jiao, Haoran Yin, Xia Liu, Yuling Zhongguancun Laboratory China Department of Computer Science and Technology Tsinghua University China Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China
In recent years, DNS over Encrypted (DoE) methods have been regarded as a novel trend within the realm of the DNS ecosystem. In these DoE methods, DNS over HTTPS (DoH) provides encryption to protect data confidentiali... 详细信息
来源: 评论
RRDD: An ATT&CK-based ICS Network security Risk Assessment Method  23
RRDD: An ATT&CK-based ICS Network Security Risk Assessment M...
收藏 引用
2nd International Conference on Networks, Communications and Information technology, CNCIT 2023
作者: Wang, Yuman Wang, Wenhui Bai, Xiaoxue Hu, Bo Ge, Guangkai Qian, Kexiang State Grid Smart Grid Research Institute Co. Ltd Sgri Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology China State Grid Liaoning Electric Power Supply Co. Ltd China School of Information and Communication Engineering Beijing University of Posts and Telecommunications State Grid Smart Grid Research Institute Co. Ltd Sgri Power Grid Digitizing Technology Department State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology China
The current network security situation of industrial control systems is becoming increasingly severe, and the ICS ATT&CK framework provides a unified knowledge base for attack tactics and techniques for industrial... 详细信息
来源: 评论