咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是271-280 订阅
排序:
PpNNT: Multiparty Privacy-Preserving Neural Network Training System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 370-383页
作者: Feng, Qi He, Debiao Shen, Jian Luo, Min Choo, Kim-Kwang Raymond Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China School of Information Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai201204 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
By leveraging smart devices [e.g., industrial Internet of Things (IIoT)] and real-time data analytics, organizations, such as production plants can benefit from increased productivity, reduced costs, enhanced self-mon... 详细信息
来源: 评论
An enhanced LSTM-CRF based approach for Knowledge Integration based Sentiment Analysis
An enhanced LSTM-CRF based approach for Knowledge Integratio...
收藏 引用
International Symposium on Advanced Computing and Communication (ISACC)
作者: Allam Balaram M. SilpaRaj K. Likhitha Sree V. Pramodh Kumar D. Vinay Kumar K. Venu Kumar Reddy Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India Department of Computer Science and Engineering (Cyber Security) CVR College of Engineering Hyderabad India
Sentiment analysis is a key element for expert reviews but is at a loss in terms of detection of sarcasm and irony, which distort the actual sentiments. This paper proposes an approach that will fuse syntactic and con... 详细信息
来源: 评论
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 421-432页
作者: Xiaodong Qu Chengcheng Guan Gang Xie Zhiyi Tian Keshav Sood Chaoli Sun Lei Cui the Shanxi Key Laboratory of Advanced Control and Equipment Intelligence Taiyuan University of Science and TechnologyTaiyuan 030024China the Faculty of Engineering and Information Technology University of Technology SydneyUltimo 2007Australia the Centre for Cyber Security Research and Innovation Deakin UniversityMelbourne 3125Australia the School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China
Accurate load forecasting is critical for electricity production,transmission,and *** learning(DL)model has replaced other classical models as the most popular prediction ***,the deep prediction model requires users t... 详细信息
来源: 评论
An Intelligent Vehicle License Plate Detection for an Emergency Notification System  5
An Intelligent Vehicle License Plate Detection for an Emerge...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Raja, Laxmi Bharathi, V.C. Ananthi, S. Sathya, R. Kathirvel, T. Razack, T. Shahin Abdul Karpagam Academy of Higher Education Faculty of Engineering Department of Cyber Security Coimbatore India VIT-AP University School of Computer Science and Engineering Andhra Pradesh Amaravati India Sri Eshwar College of Engineering Department of Cse Coimbatore India Kongunadu College of Engineering and Technology Department of It Tamil Nadu Trichy India
This research presents a vehicle license plate recognition and emergency notification system utilizing advanced image processing techniques. The system captures input images and employs Optical Character Recognition (... 详细信息
来源: 评论
An Ensemble Learning Approach to Improve Credit Scoring Accuracy for Imbalanced Data
An Ensemble Learning Approach to Improve Credit Scoring Accu...
收藏 引用
2023 International Conference on Integrated Intelligence and Communication Systems, ICIICS 2023
作者: Ranpara, Ripal D. Patel, Pratik S. Atmiya University Department of Computer Science & Information Technology Rajkot India Science University School of Cyber Security & Digital Forensic Gandhinagar India
The assessment of loan risks, known as credit scoring, is a critical procedure within the financial industry. However, this process often faces difficulties as a result of uneven data distributions. Imbalances are evi... 详细信息
来源: 评论
cybersecurity in Piezoelectric Biosensor for Sensing Application
Cybersecurity in Piezoelectric Biosensor for Sensing Applica...
收藏 引用
2024 Innovations in Intelligent Systems and Applications Conference, ASYU 2024
作者: Görmüş, Ahmet Faruk Markūnienė, Ieva Şenturk, Kenan Gönen, Serkan Barışkan, Mehmet Ali Karacayılmaz, Gökçe Yılmaz, Ercan Nurcan Technology Transfer Office Istanbul Gelisim University Istanbul Turkey Mechanical Engineering Kaunas University of Technology Kaunas Lithuania Mechatronic Engineering Istanbul Gelisim University Istanbul Turkey Software Engineering Cyber Security Research and Application Center Istanbul Gelisim University Istanbul Turkey Computer Engineering Cyber Security Research and Application Center Istanbul Gelisim University Istanbul Turkey Computer Engineeringr Istanbul Gelisim University Istanbul Turkey Electrical - Electronics Engineering Gazi University Ankara Turkey
Biosensors play a crucial role in various healthcare applications such as continuous health monitoring, targeted drug delivery, and nanosurgery. Enhancing the performance of biosensors involves integrating them with h... 详细信息
来源: 评论
Combating cyberbullied Images in the Real World: A Comparative Study of CNN Architectures  21
Combating Cyberbullied Images in the Real World: A Comparati...
收藏 引用
21st International Conference on Networking, Sensing and Control, ICNSC 2024
作者: Shui, Heyun Lu, Liming Shao, Luyi Xu, Qingyi Lu, Xiaoyu Sean Kang, Qi School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ United States
Image-based cyberbullying brings more complexity compared to text-based forms, presenting new challenges that tra-ditional methods struggle to address. Owing to the rapid advancement of deep learning, computer vision ... 详细信息
来源: 评论
Get A Sense of Accomplishment in Doing Exercises: A Reinforcement Learning Perspective  25
Get A Sense of Accomplishment in Doing Exercises: A Reinforc...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Niu, Songdeng Cao, Sheng University of Electronic Science and Technology of China School of Computer Science and Engineering Institute for Cyber Security China
Doing exercises is vital to improving students' learning effects. Setting reasonable rewards in the process of doing exercises can promote students' problem-solving interests. Reinforcement learning has been e... 详细信息
来源: 评论
A Behavior-Aware Scheme for Personalized Credit Computing  25
A Behavior-Aware Scheme for Personalized Credit Computing
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Dang, Sixuan Cao, Sheng Institute for Cyber Security University of Electronic Science and Technology of China School of Computer Science and Engineering China
Quality of Service (QoS) and Quality of Experience (QoE) are employed to characterize network performance to improve network resource utilization in web/internet-based services. However, user credit that also contribu... 详细信息
来源: 评论
Feature Fusion for Malware Traffic Detection Using Image Visualization and Transfer Learning  10
Feature Fusion for Malware Traffic Detection Using Image Vis...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Kumar, Sanjeev Sapru, Yudhishthira Purushottama Rao, K. Centre For Development of Advanced Computing Cyber Security Technology Division Mohali India CERT-In Indian Computer Emergency Response Team Delhi India Nit Department of Computer Applications Tamil Nadu Tiruchirappalli India
Malware threats have become increasingly sophisticated and more complex, making detecting and preventing them difficult. Traditional malware detection methods, such as signature-based detection, are no longer effectiv... 详细信息
来源: 评论