咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1401-1410 订阅
排序:
Anomaly Detection in Social Networks using Improved Local Outlier Factor
Anomaly Detection in Social Networks using Improved Local Ou...
收藏 引用
Intelligent Systems and Computational Networks (ICISCN), International Conference on
作者: Rana Veer Samara Sihman Bharattej R Muntader Mhsnhasan Sowmya M Prabhakaran M V K. Ghamya Department of Computer Science Saint Leo University FL USA Department of Computers Techniques Engineering College of Technical Engineering The Islamic University of Al Diwaniyah Al Diwaniyah Iraq Department of Artificial Intelligence and Data Science Nitte Meenakshi Institute of Technology Bengaluru India Department of Computer Science and Engineering (Cyber Security) Dhanalakshmi Srinivasan College of Engineering and Technology Mamallapuram India Department of Computer Science and Engineering (AI&ML) Mohan Babu University Tirupati India
In the present era, Anomaly Detection (AD) aims to identify malicious activities in social networks. Even though previous researchers suggest effective methods for AD still there are limitations such as a lack of labe... 详细信息
来源: 评论
Empirical Evaluation of Real-Time Diabetic Retinopathy Disease Detection using IoT Enabled Medical Imaging Processing Strategy
Empirical Evaluation of Real-Time Diabetic Retinopathy Disea...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: S. Agnes Shifani N. Saraswathy Margaret Clemencia. A G.B. Santhi Jayant Giri Mohammad Rasmi Al-Mousa Department of ECE Saveetha School of Engineering Saveetha Institute of Science and Technology (SIMATS) Saveetha University Chennai Department of Chemistry Parisutham Institute of Technology and Science(Autonomous) Thanjavur Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Chennai Department of Mechanical Engineering Yeshwantrao Chavan College of Engineering Nagpur India Department of Cyber Security College of Information Technology Zarqa University Zarqa Jordan
Diabetic Retinopathy (DR) poses a significant risk to vision among diabetic patients, necessitating early and accurate detection for effective intervention. This research introduced a novel methodology to detect the d... 详细信息
来源: 评论
The Importance of Cloud Monitoring Services with A Comprehensive Review of Essential Tools  7
The Importance of Cloud Monitoring Services with A Comprehen...
收藏 引用
7th IEEE Asia-Pacific Conference on Geoscience, Electronics and Remote Sensing technology, AGERS 2024
作者: Ayoob, Ayoob Khalil, Ghaith Aksoy, Muammer Iraqi Ministry of Communications Information & Telecommunication Public Company (ITPC) Nineveh Iraq University of Melbourne Faculty of Engineering and Information Technology VIC Australia College of Sciences Al-Mustaqbal University Cyber Security Department Babylon Iraq
Cloud computing is increasingly becoming de-facto-enabling technologies and advances on both the hardware and software fronts, further compounding their business value delivered to users, increasing the management com... 详细信息
来源: 评论
AuthUp: A Privacy-Preserving V2I Authentication Scheme for Vehicular Ad Hoc Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Li, Xincheng Yin, Xinchun Ning, Jianting Zhang, Tianwei Zhejiang Sci-Tech University School of Information Science and Engineering School of Cyber Science and Technology the Zhejiang Key Laboratory of Digital Fashion and Data Governance Hangzhou310018 China Jiangxi Vocational College of Science and Technology Nanchang330200 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science China College of Computer and Cyber Security Fuzhou350117 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore
Vehicular ad hoc networks (VANETs) play a crucial role in enhancing modern transportation systems, leading to the development of various authentication schemes to meet the stringent security and privacy requirements o... 详细信息
来源: 评论
Detection of Thyroid Disease Through Machine Learning Technique  25
Detection of Thyroid Disease Through Machine Learning Techni...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Almomani, Mutaz Al-Qerem, Ahmad Nashwan, Shadi Jebreen, Issam Rajab, Mohammed Alauthman, Mohammad Jeadi, Mohammad Elrashidi, Ali Zarqa University Faculty of Information Technology Computer Science Department Zarqa13110 Jordan Middle East University Faculty of Information Technology Cybersecurity Department Amman11831 Jordan University Headquarter University of Anbar Ramadi Iraq University of Petra Department of Information Security Amman11196 Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Thyroid disease, one of the most common endocrine disorders, requires prompt diagnosis to effectively treat it. To improve diagnostic precision and expedite medical procedures, this paper explores the use of Machine L... 详细信息
来源: 评论
A Survey on Semantic Communication Networks: Architecture, security, and Privacy
收藏 引用
IEEE Communications Surveys and Tutorials 2024年
作者: Guo, Shaolong Wang, Yuntao Zhang, Ning Su, Zhou Luan, Tom H. Tian, Zhiyi Shen, Xuemin Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an China University of Windsor Department of Electrical and Computer Engineering Windsor Canada University of Technology Sydney School of Computer Science Sydney Australia University of Waterloo Department of Electrical and Computer Engineering Waterloo Canada
With the rapid advancement and deployment of intelligent agents and artificial general intelligence (AGI), a fundamental challenge for future networks is enabling efficient communications among agents. Unlike traditio... 详细信息
来源: 评论
Enhancing Image security Using Novel Scrambling and Chaotic Techniques with ChaCha20 Algorithm
Enhancing Image Security Using Novel Scrambling and Chaotic ...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Datta Sai Manikanta Narayana Karun Kumar Enaganti P Mathivanan Department of Computer Science and Engineering(Cyber Security) Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai India
The importance of protecting the privacy and security of shared data has increased along with the popularity of image-sharing services. In this paper, we propose a method to improve image transmission security through... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Hybrid CNN-LSTM Model for DDoS Attack Detection in Internet of Things-based Healthcare Industry 5.0
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ullah, Zabeeh Arif, Fahim Haq, Qazi Mazhar Ul Khan, Nauman Ali Din, Ikram Ud Almogren, Ahmad Khan, Mudassar Ali Alsaleh, Omar Guizani, Mohsen Islamabad Pakistan Yuan Ze University Department of Computer Science and Engineering Taoyuan Taiwan The University of Haripur Department of Information Technology Pakistan King Saud University College of Computer and Information Sciences Cyber Security Department of Computer Science Riyadh11633 Saudi Arabia Mohamed Bin Zayed University of Artificial Intelligence Machine Learning Department Abu Dhabi United Arab Emirates
The convergence of the Internet of Things (IoT) and Software-Defined Networking (SDN) has paved the way for a new technological paradigm in Healthcare Industry 5.0. This integration addresses the complexity, heterogen... 详细信息
来源: 评论
Empowering Small and Medium Enterprises with Data Analytics for Enhanced Competitiveness  13
Empowering Small and Medium Enterprises with Data Analytics ...
收藏 引用
13th IEEE International Conference on Control System, Computing and engineering, ICCSCE 2023
作者: Mosbah, Aissa Ali, Musab A. M. Tahir, Nooritawati Md Dhofar University College of Commerce and Business Administration Salalah Oman University of Technology and Applied Sciences Ibri Oman International Information Technology University Department of Computer Engineering and Information Security Almaty Kazakhstan Universiti Teknologi Mara School of Electrical Engineering College of Engineering Malaysia Malaysia
In today's competitive landscape, Small and Medium-sized Enterprises (SMEs) are increasingly embracing business data analytics to gain valuable insights and make informed decisions. However, the true essence of bi... 详细信息
来源: 评论