咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是261-270 订阅
排序:
Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique
收藏 引用
International Journal of Intelligent Networks 2023年 第1期4卷 62-67页
作者: Kousalya, A. Baik, Nam-kyun Department of Information Technology Sri Krishna College of Engineering and Technology Coimbatore India Dept. of Cyber Security College of Science and Technology Duksung Women's University 33 Samyang-ro 144-gil Dobong-gu Seoul Korea Republic of
In the current era, numerous products are accessible online from anywhere and every minute. This work used encryption with access management because authenticities, anonymity, and security over accessibility are manda... 详细信息
来源: 评论
Optimizing Real-time Task Scheduling in Cloud-based AI Systems using Genetic Algorithms  7
Optimizing Real-time Task Scheduling in Cloud-based AI Syste...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Mohammed, Abdul Sajid Mallikarjunaradhya, Vinay Sreeramulu, Madhusudhan Dasari Boddapati, Nagesh Jiwani, Nasmin Natarajan, Yuvaraj University of the Cumberlands Department of School of Computer and Information Sciences KY United States Thomson Reuters Toronto Canada American Express Department of Cyber Security United States Microsoft Department of Computer Science CharlotteNC United States University of The Cumberlands Department of Information Technology WilliamsburgKY United States Sri Shakthi Institute of Engineering and Technology Department of Computer Science Engineering Tamil Nadu Coimbatore India
Artificial Intelligence (AI) has also started to be regularly introduced in cloud-based systems as it can help improve performance and skyrocket efficiency. It is a challenge for such systems to schedule tasks in real... 详细信息
来源: 评论
InvMetrics: Measuring Privacy Risks for Split Model-Based Customer Behavior Analysis
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 4168-4177页
作者: Deng, Ruijun Hu, Shijing Lin, Junxiong Yang, Jirui Lu, Zhihui Wu, Jie Huang, Shih-Chia Duan, Qiang Fudan University Sch. of Comp. Science and the Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai200433 China Fudan University School of Computer Science Shanghai200433 China Shanghai Blockchain Engineering Research Center Shanghai200433 China National Taipei University of Technology Department of Electronic Engineering Taipei City10608 Taiwan Pennsylvania State University Information Sciences and Technology Department AbingtonPA19001 United States
Mobile Edge Computing (MEC) has great potential to facilitate cheap and fast customer behavior analysis (CBA). Model splitting, widely adopted in collaborative learning of MEC, partitions the CBA models between the cu... 详细信息
来源: 评论
Phishing Classification Based on Text Content of an Email Body Using Transformers
Phishing Classification Based on Text Content of an Email Bo...
收藏 引用
International Conference on Information security, Privacy, and Digital Forensics, 2022
作者: Somesha, M. Pais, Alwyn R. Department of Computer Science and Engineering Information Security Research Lab National Institute of Technology Karnataka Surathkal575025 India
Phishing attacks steal sensitive credentials using different techniques, tools, and some sophisticated methods. The techniques include content injection, information re-routing, social engineering, server hacking, soc... 详细信息
来源: 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 评论
Meta Heuristic Image Optimisation in LiDAR Sensor Based on Cloud IoT Network and Deep Learning Algorithms
收藏 引用
Remote Sensing in Earth Systems Sciences 2025年 第2期8卷 566-575页
作者: Meenakshi, K. Manoj, Gunna Diwakar, Meenakshi Prabakaran, Manjula Sravan, Padala Babu, Gaddam Ravindra Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India Cyber Security Marri Laxman Reddy Institute of Technology and Management Telangana Hyderabad India Department of IT Panimalar Engineering College Chennai India Dept of CSE (Data Science) Madanapalle Institute of Technology & Science Andhra Pradesh Angallu India Computer Science and Engineering NIIT with learning partner Hainan Normal University Haikou China Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Telangana Hyderabad India
LiDAR technology has become a vital tool for researching these atmospheric components because of its capacity to measure backscattered signals and investigate the atmosphere at extremely high spatial and temporal reso... 详细信息
来源: 评论
Blockchain-Enabled DNS: Enhancing security and Mitigating Attacks in Domain Name Systems  6
Blockchain-Enabled DNS: Enhancing Security and Mitigating At...
收藏 引用
6th International Conference on Signal Processing and Information security, ICSPIS 2023
作者: Shah, Kaushal Padhya, Mukti Sharma, Sachin Pandit DeenDayal Energy University School of Technology Department of Computer Science and Engineering Gandhinagar India National Forensic Sciences University School of Cyber Security and Digital Forensics Gandhinagar India
The importance of Internet security is increasing as businesses expand through digitalization. Like in the physical world, data transmitted over the Internet must be safeguarded to ensure confidentiality, integrity, a... 详细信息
来源: 评论
security and Privacy Preservation for Future Vehicular Transportation Systems: A Survey  12
Security and Privacy Preservation for Future Vehicular Trans...
收藏 引用
12th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2023
作者: Almarshoodi, Abdulazeiz Keenan, James Campbell, Ivan Hassan, Tashfin Ibrahem, Mohamed I. Fouda, Mostafa M. George Mason University Department of Cyber Security Engineering FairfaxVA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
Electric Vehicles (EVs) with numerous optimized features are becoming more popular in today's world of vehicle technology. This is especially in these days when climate change is becoming more of a concern, and th... 详细信息
来源: 评论
Enhancing IoT Data security: Integrating Elliptic Galois Cryptography with Matrix XOR Steganography and Adaptive Firefly Optimization  8
Enhancing IoT Data Security: Integrating Elliptic Galois Cry...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Chinnasamy, P. Ayyasamy, Ramesh Kumar Anuradha, K. Alam, Irfan Nair, Deveendra Menon Narayanan Kiran, Ajmeera Kalasalingam Academy of Research and Education School of Computing Department of Computer Science and Engineering Tamilnadu India Faculty of Information and Communication Technology Kampar Malaysia Telangana India Scai Vit Bhopal University Cyber Security and Digital Forensics Division Kothari Kalan Sehore India Mlr Institute of Technology Department of Computer Science and Engineering Hdyerabad India
Securing the uninterrupted data flow is crucial in the fast-advancing Internet of Things (IoT) market. This work investigates the incorporation of elliptic Galois cryptography and matrix XOR coding steganography to im... 详细信息
来源: 评论
Decrease the Prompt Uncertainty: Adversarial Prompt Learning for Few-shot Text Classification
Decrease the Prompt Uncertainty: Adversarial Prompt Learning...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Weng, Jinta Zhang, Zhaoguang Yaqi, Jing Niu, Chenxu Huang, Heyan Hu, Yue School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Computer Science and Cyber Engineering Guangzhou University China National Computer Network Emergency Response Technical Team Coordination Center of China China Beijing Institute of Technology School of Computer Science and Technology Beijing China Southeast Academy of Information Technology Putian China
With few-shot learning abilities, pre-trained language models (PLMs) have achieved remarkable success in classification tasks. However, recent studies have shown that the performance of PLM is vulnerable due to differ... 详细信息
来源: 评论