咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1381-1390 订阅
排序:
A Bi-objective Optimal Scheme for 5G Base Station Deployment Based on BPSO  12th
A Bi-objective Optimal Scheme for 5G Base Station Deployment...
收藏 引用
12th International Conference on computer engineering and Networks, CENet 2022
作者: Zhu, Tao Xu, Yin-qing Guo, Hao-qi Wang, Yi-bo Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Province Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing210031 China
The 5G mobile network is a kind of critical information infrastructure for future Internet of Things. Due to its rapid development, the planning and deployment of 5G network base stations is a more urgent and meaningf... 详细信息
来源: 评论
AI-driven Dynamic Workload Balancing for Real-time Applications on Cloud Infrastructure
AI-driven Dynamic Workload Balancing for Real-time Applicati...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Madhusudhan Dasari Sreeramulu Abdul Sajid Mohammed Dinesh Kalla Nagesh Boddapati Yuvaraj Natarajan Department of Cyber Security American Express USA Department of School of Computer and Information Sciences University of the Cumberlands Kentucky USA Department of Computer Science Colorado Technical University Charlotte NC USA Department of Computer Science Microsoft Charlotte NC USA Department of Computer Science Engineering Sri Shakthi Institute of Engineering and Technology Coimbatore Tamil Nadu India
The specification provides a new, resource-efficient method of Dynamic Workload Balancing in AI-driven Real-time Applications over Cloud Infrastructure. The real-time application keeps processing data at high speeds, ... 详细信息
来源: 评论
Image Classification and Analysis Using Deep Learning: Trends, Insights, and Applications of Convolutional Neural Networks
Image Classification and Analysis Using Deep Learning: Trend...
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering (RMKMATE), International Conference on
作者: Smita Rukhande Nilakshi Jain Vineet Kumar Department of Information Technology Shah and Anchor Kutchhi Engineering College Mumbai India Department of Cyber Security Shah and Anchor Kutchhi Engineering College Mumbai India Cyberpeace Foundation Delhi India
Dental imaging plays a crucial role in various healthcare applications such as dental planning, disease treatment, and post-mortem human identification in case of a disaster scenario. This paper provides a comprehensi... 详细信息
来源: 评论
Energy-Efficient Routing Algorithm Based on Multipath Routing in Large-Scale Networks
收藏 引用
computers, Materials & Continua 2021年 第8期68卷 2029-2039页
作者: Haijun Geng Qidong Zhang Jiangyuan Yao Wei Wang Zikun Jin Han Zhang Yangyang Zhang School of Computer and Information Technology Shanxi UniversityShanxi030006China School of Computer Science and Cyberspace Security Hainan UniversityHaikou570228China School of Cyber Space and Technology Beihang UniversityBeijing100191China College of Engineering Northeastern University Boston02115MAUSA
A reduction in network energy consumption and the establishment of green networks have become key scientific problems in academic and industrial *** energy efficiency schemes are based on a known traffic matrix,and ac... 详细信息
来源: 评论
SE-PifPaf: A Multi-Person Human Pose Estimation Methond for Complex Scenes
SE-PifPaf: A Multi-Person Human Pose Estimation Methond for ...
收藏 引用
2023 International Conference on Image Processing and computer Vision, IPCV 2023
作者: Wang, Tianbao Meng, Caixia Shi, Lei Gao, Yufei Wang, Qingxian Wei, Lin School of Cyber Science and Engineering Zhengzhou University Zhengzhou China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China Railway Police College Department of Image and Network Investigation Technology Zhengzhou China
Images in complex scenes are prone to cross-obscuration of people, which brings great challenges to multi-person human pose estimation. Previous multi-person human pose estimation algorithms suffer from limited accura... 详细信息
来源: 评论
Classification of benign and malignant breast lesions in mammograms using dense-unified multiscale attention network and data-efficient image transformers
收藏 引用
The European Physical Journal Special Topics 2025年 1-19页
作者: Paavankumar, S. Karthik, R. Idayachandiran, Gangatharan Sri, Pulaparthi Penchala Deepthi Illakiya, T. School of Computer Science Engineering Vellore Institute of Technology Chennai India Centre for Cyber Physical Systems Vellore Institute of Technology Chennai India Department of Computational Intelligence Faculty of Engineering and Technology School of Computing SRM Institute of Science and Technology Chennai India
Breast cancer is a common and a serious health problem and it is the major cause of morbidity and mortality for women. Early detection of the disease is particularly challenging because abnormalities such as masses an...
来源: 评论
A Study on Classification of Mobile Application Network Traffic on MIRAGE-COVID-CCMA-2022 Dataset via Machine/Deep Learning and Feature Selection Methods
A Study on Classification of Mobile Application Network Traf...
收藏 引用
Information security and Cryptology (ISCTURKEY), International Conference on
作者: İmren Daşdemir Yaşar Aysun Coşkun Department of Information Security Engineering Gazi University Ankara Turkey Department of Computer Engineering Faculty of Technology Gazi University Ankara Turkey
In recent years, the use of mobile internet has become widespread rapidly with the introduction of smartphones. The increasing weight of mobile network traffic in the overall network traffic has made mobile network tr... 详细信息
来源: 评论
A Novel Framework for Scalable Video Transmission Based on the Outage Probability Analysis of MIMO Coding
A Novel Framework for Scalable Video Transmission Based on t...
收藏 引用
Information Communication Technologies Conference (ICTC)
作者: Yongjian Zhang Dongyu Wang Zhiqiang Zhang Shiguo Wang School of Cyber Science and Engineering University of International Relations Beijing China Department of Electronic Engineering North China University of Technology Beijing China Department of Cyber Security Shanxi Police College Taiyuan China Computer and Communication Engineering Institute Changsha University of Science and Technology Changsha China
This work presents a radical approach for space-time codings, which could realize the goal of unequal error protection (UEP) transmitting for scalable video. This analysis leads us to develop a hybrid coding framework...
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Correction to: Color image encryption based on novel kolam scrambling and modified 2D logistic cascade map (2D LCM)
收藏 引用
The Journal of Supercomputing 2023年 第3期80卷 4420-4422页
作者: Mathivanan, P. Maran, Ponnambalam Department of Computer Science and Engineering (Cyber Security) Amrita Vishwa Vidyapeetham Chennai Campus Vengal India Department of Electronics and Communication Engineering Amrita Vishwa Vidyapeetham Chennai Campus Vengal India
来源: 评论