咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是231-240 订阅
排序:
Powering Inaccessible IoT Devices Through a WPT-enabled Sustainable UAV Network
Powering Inaccessible IoT Devices Through a WPT-enabled Sust...
收藏 引用
2023 IEEE INFOCOM Conference on computer Communications Workshops, INFOCOM WKSHPS 2023
作者: Mekikis, Prodromos-Vasileios Bouzinis, Pavlos Mitsiou, Nikos Tegos, Sotiris Papanikolaou, Vasilis Tyrovolas, Dimitrios Diamantoulakis, Panagiotis Karagiannidis, George K. Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Thessaloniki Greece Cyber Security Systems and Applied AI Research Center Lebanon
Powering Internet of Things (IoT) devices in hard to reach or hazardous locations could be prohibitive in terms of cost and safety. In this work, we demonstrate a thorough solution that tackles this problem using a ne... 详细信息
来源: 评论
Credit Card Fraud Detection using ML: A Survey
Credit Card Fraud Detection using ML: A Survey
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Bonkoungou, Samiratou Roy, Nihar Ranjan Ako, Nomel Haymes Axel-Elie Batra, Usha Sharda University Department of Computer Science and Engineering India Center of Cyber Security and Cryptography Sharda University India MRIIRS Faridabad India
The popularity of credit card fraud is rising as the number of cashless transactions increases. Online transactions are expanding as more people use credit cards and mobile wallets. The growth of internet commerce has... 详细信息
来源: 评论
Utilizing Smartwatches and Deep Learning Models for Enhanced Avalanche Victim Identification, Localization, and Efficient Recovery Strategies: An In-depth Study  5
Utilizing Smartwatches and Deep Learning Models for Enhanced...
收藏 引用
5th International Conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Jha, Khyati Pasbola, Mansi Rai, Hari Mohan Amanzholova, Saule Department of Computer Science Dronacharya Group of Institutions Greater Noida India Faculty of Computer Technologies and Cyber Security International University of Information Technology Almaty Kazakhstan
This article explores the transformative impact of modern technology on avalanche response and safety, addressing the longstanding challenges associated with avalanches in mountainous regions. Historically, avalanches... 详细信息
来源: 评论
Transformation technique for derivation of similarity scores for signatures
收藏 引用
Iran Journal of computer Science 2022年 第4期5卷 317-328页
作者: Adewuyi, Joel Adeyanju Iwasokun, Gabriel Babatunde Gabriel, Arome Junior Department of Computer Science Federal University of Technology Akure Nigeria Department of Software Engineering Federal University of Technology Akure Nigeria Department of Cyber Security Federal University of Technology Akure Nigeria
The human signature is a widely acceptable biometric characteristic that provides a very secure means for authorizing legal documents. However, signature-based authorization is characterized by problems of counterfeit... 详细信息
来源: 评论
Tracking Objects and Activities with Attention for Temporal Sentence Grounding  48
Tracking Objects and Activities with Attention for Temporal ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Xiong, Zeyu Liu, Daizong Zhou, Pan Zhu, Jiahao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Peking University Wangxuan Institute of Computer Technology China
Temporal sentence grounding (TSG) aims to localize the temporal segment which is semantically aligned with a natural language query in an untrimmed video. Most existing methods extract frame-grained features or object... 详细信息
来源: 评论
Bitcoin Price Prediction Using Cuckoo Search Algorithm for Feature Selection with LSTM Model  2
Bitcoin Price Prediction Using Cuckoo Search Algorithm for F...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Radmand, Elnaz Pirgazi, Jamshid Odeh, Mahmoud Sorki, Ali Ghanbari University of Science and Technology of Mazandaran Faculty of Electrical and Computer Engineering Behshahr Iran School of Information Technology Zarqa University Cyber Security Department Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia
Deep learning is now a top method for predicting the price of Bitcoin, providing an excellent and well thought out strategy. This technique makes use of a wealth of historical data from reliable sources covering the f... 详细信息
来源: 评论
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2245-2267页
作者: Ashraf S.Mashaleh Noor Farizah Binti Ibrahim Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh School of Computer Sciences Universiti Sains MalaysiaPenangMalaysia Department Computer Center Al-Balqa Applied UniversitySaltJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Department of Computer Science Tafila Technical UniversityTafilaJordan College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic *** IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection *** paper pro... 详细信息
来源: 评论
LSTM - Recurrent Neural Network Model to Forecast the Risk Factors in Recurrent Cervical Carcinoma  2
LSTM - Recurrent Neural Network Model to Forecast the Risk F...
收藏 引用
2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Geeitha, S. Renuka, P. Thilagavathi, C. Ananth, S. Ramya, S. Sinduja, K. M.Kumarasamy College of engineering Department of Information Technology Karur India Mahendra Engineering College Department of Ai&ds Namakkal India Paavai Engineering College Department of Cyber Security Pachal India Sri Krishna College of engineering and technology Department of Information Technology Coimbatore India
Cervical carcinoma is a healthcare issue globally, and despite advancements in prevention, diagnosis and treatment, recurrence remains as a challenge. Understanding the risk factors associated with cervical cancer rec... 详细信息
来源: 评论
Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network security: A Comprehensive Literature Review  2
Unveiling the Landscape of Machine Learning and Deep Learnin...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Saeed, Nouf Majid Sultan Eid Ibrahim, Amer Ali, Liaqat Al-Dmour, Nidal A. Mohammed, Abdul Salam Ghazal, Taher M. American University In The Emirates Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates College Of Engineering Mutah University Department Of Computer Engineering Jordan Skyline University College University City Sharjah Shariah United Arab Emirates Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
The dynamic nature of cyber threats offers a continual problem in the field of cybersecurity in the context of the expanding internet environment. This study provides an in-depth assessment of the literature on machin... 详细信息
来源: 评论
A Comprehensive Threat Model for Autonomous Vehicle Communication security  6
A Comprehensive Threat Model for Autonomous Vehicle Communic...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Meegammana, Niranjan W. Fernando, Harinda Shilpa Sayura Foundation Cyber Security Research Lab Kandy Sri Lanka Sri Lanka Institute of Information Technology Dept. of Computer Systems Engineering Malabe Sri Lanka
The rapid advancement of autonomous vehicles (AVs) promises to enhance transportation efficiency, reliability, and safety. However, these systems, particularly multi-channel vehicular communications, are vulnerable to... 详细信息
来源: 评论