咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是11-20 订阅
排序:
Panoptic Region Slicing Segmentation and Optimized Alexnet-Based CNN for Early Melanoma Diagnosis
收藏 引用
SN computer Science 2024年 第6期5卷 756页
作者: Ganesh, V.N. Gulappagol, Laxmi Pushparani, M.K. Ganesh, K. Department of Electronics and Communication Engineering Alvas Institute of Engineering and Technology Department of Internet of Things and Cyber Security including Block chain Technology A J Institute of Engineering and Technology Department of Computer Science & amp Design Alvas Institute of Engineering and Technology
Early and accurate diagnosis of melanoma, a potentially life-threatening skin cancer, is crucial for improving patient outcomes. In this study, we propose a novel approach for melanoma detection, termed Panoptic Regio... 详细信息
来源: 评论
Exploring the landscape of network security: a comparative analysis of attack detection strategies
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3211-3228页
作者: Rajesh Kanna, P. Santhi, P. Department of Computer Science and Engineering Bannari Amman Institute of Technology Tamil Nadu Erode India TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Tamil Nadu Coimbatore India
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the prim... 详细信息
来源: 评论
Electronic Medical Records Management and Administration: Current Trends, Issues, Solutions, and Future Directions
收藏 引用
SN computer Science 2024年 第5期5卷 460页
作者: Abdulkadir, Umar Waziri, Victor Onomza Alhassan, John Kolo Ismaila, Idris Department of Cyber Security Science Federal University of Technology Minna Nigeria Department of Computer Science Federal University of Technology Minna Nigeria
Electronic Medical Records (EMR) is often used to refer to as electronic personal health (EPH) records or electronic healthcare records (EHR). These are considered vivacious assets of health facilities and patients. T... 详细信息
来源: 评论
TU-IR Apple Image Dataset: Benchmarking, Challenges, and Asymmetric Characterization for Bruise Detection in Application of Automatic Harvesting
IEEE Transactions on AgriFood Electronics
收藏 引用
IEEE Transactions on AgriFood Electronics 2024年 第1期2卷 105-124页
作者: Das, Dipak Hrishi Roy, Sourav Dey Saha, Priya Bhowmik, Mrinal Kanti Government Degree College Department of Information Technology Santirbazar 799144 India Department of Computer Science and Engineering Suryamaninagar 799022 India Department of Cyber Security and Digital Forensics Agartala799001 India
With the blooming interest in computer vision-based technologies for future automation of food producers, there is a need for incorporating an automatic bruise detection module in robotic apple harvesting because of d... 详细信息
来源: 评论
Effectiveness of a touch-based hand therapeutic application for hand dexterity in children with handwriting difficulties-a pilot study
收藏 引用
Multimedia Tools and Applications 2024年 1-35页
作者: Smitha, John Renumol, V.G. School of Computer Science and Technology Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India School of Engineering Cochin University of Science and Technology Kochi India
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of... 详细信息
来源: 评论
Effective Tool Augmented Multi-Agent Framework for Data Analysis
收藏 引用
Data Intelligence 2024年 第4期6卷 923-945页
作者: Xilin Zhang Zhixin Mao Ziwen Chen Shen Gao School of Automation Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Computer Science and Engineering(School of Cyber Security) University of Electronic Science and Technology of ChinaChengdu 611731China
Data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(L... 详细信息
来源: 评论
Novel method for ranking batsmen in Indian Premier League
收藏 引用
Data Science and Management 2023年 第3期6卷 158-173页
作者: M.K.Manju Abin Oommen Philip Department of Computer Science&Engineering Toch Institute of Science&TechnologyErnakulamKerala682313India Department of CSE-Cyber Security Indian Institute of Information TechnologyKottayam686635India
Sports analytics have benefited immensely from the growth and popularity of artificial intelligence and machine *** techniques enable sports analysts to evaluate player performance more effectively.A literature review... 详细信息
来源: 评论
MODELGUARD: Information-Theoretic Defense Against Model Extraction Attacks  33
MODELGUARD: Information-Theoretic Defense Against Model Extr...
收藏 引用
33rd USENIX security Symposium, USENIX security 2024
作者: Tang, Minxue Dai, Anna DiValentin, Louis Ding, Aolin Hass, Amin Gong, Neil Zhenqiang Chen, Yiran Li, Hai Department of Electrical and Computer Engineering Duke University United States Cyber Security Lab Accenture
Malicious utilization of a query interface can compromise the confidentiality of ML-as-a-Service (MLaaS) systems via model extraction attacks. Previous studies have proposed to perturb the predictions of the MLaaS sys... 详细信息
来源: 评论
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 1-12页
作者: WANG Zhibo LIU Kaixin HU Jiahui REN Ju GUO Hengchang YUAN Wei School of Cyber Science and Engineering Wuhan University School of Cyber Science and Technology Zhejiang University Department of Computer Science and Technology Tsinghua University
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive inform... 详细信息
来源: 评论
Endogenous security of FQn Networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论