咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是311-320 订阅
排序:
A Secure Federated Learning Framework for Residential Short-Term Load Forecasting
收藏 引用
IEEE Transactions on Smart Grid 2024年 第2期15卷 2044-2055页
作者: Husnoo, Muhammad Akbar Anwar, Adnan Hosseinzadeh, Nasser Islam, Shama Naz Mahmood, Abdun Naser Doss, Robin Deakin University Centre for Cyber Security Research and Innovation GeelongVIC3216 Australia Deakin University Centre for Smart Power and Energy Research GeelongVIC3216 Australia La Trobe University Department of Computer Science and Information Technology MelbourneVIC3086 Australia
Smart meter measurements, though critical for accurate demand forecasting, face several drawbacks including consumers' privacy, data breach issues, to name a few. Recent literature has explored Federated Learning ... 详细信息
来源: 评论
Automated Detection of Harmful Insects in Agriculture: A Smart Framework Leveraging IoT, Machine Learning, and Blockchain
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4787-4798页
作者: Rahman, Wahidur Hossain, Muhammad Minoar Hasan, Md. Mahedi Iqbal, Md. Sadiq Rahman, Mohammad Motiur Fida Hasan, Khondokar Moni, Mohammad Ali Mawlana Bhashani Science and Technology University Department of Computer Science and Engineering Tangail1902 Bangladesh Uttara University Department of Computer Science and Engineering Dhaka1230 Bangladesh Prime University Department of Management and Information System Mirpur Dhaka1216 Bangladesh Bangladesh University Department of Computer Science and Engineering Dhaka1207 Bangladesh School of Professional Studies CanberraNSW2052 Australia Artificial Intelligence and Cyber FuturesInstitute Charles Sturt University AI & Digital Health Technology BathurstNSW2795 Australia
Paddy cultivation is a significant global economic sector, with rice production playing a crucial role in influencing worldwide economies. However, insects in paddy farms predominantly impact the growth rate and ecolo... 详细信息
来源: 评论
Perception System of Autonomous Vehicles: Sophisticated Attacks, Defense Strategies, and Future Directions  15
Perception System of Autonomous Vehicles: Sophisticated Atta...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Neethu, M.R. Remyakrishnan, P. Mukesh, Sa Barath Kumar, J. Royal, Ala Manas Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore641112 India Amrita Vishwa Vidyapeetham TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore641112 India
The advent of autonomous vehicles marks a significant milestone in the evolution of automotive technologies. Central to the operation of autonomous vehicles is the perception system that interprets the surroundings an... 详细信息
来源: 评论
Investigating Labeled cyberbullying Incidents on the Weibo Social Network  21
Investigating Labeled Cyberbullying Incidents on the Weibo S...
收藏 引用
21st International Conference on Networking, Sensing and Control, ICNSC 2024
作者: Xu, Jun Yu, Songnan Lu, Xiaoyu Sean Wu, Di Kang, Qi School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing210000 China New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ United States
This study aims to investigate cyberbullying incidents on Weibo by constructing a comprehensive dataset of labeled conversations. We collect 89K social media sessions from 10K user profiles and manually annotated the ... 详细信息
来源: 评论
The Role of Blockchain technology in Supply chain Management for Data security  3
The Role of Blockchain Technology in Supply chain Management...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems security, ICBDS 2024
作者: Birari, Dipika R. Rathod, Vijay U. Dandavate, Aarti Shelke, Nilesh Kumar, Ranjit Kulkarni, Masira M. S Army Institute of Technology Department of Information Technology Pune India G H Raisoni College of Engineering and Management Department of Artificial Intelligent and Machine Learning Wagholi Pune India Dhole Patil College of Engineering Department of Computer Engineering Pune India Symbiosis International Deemed University Symbiosis Institute of Technology Department of Computer Science and Engineering Nagpur Campus Pune India Ajeenkya D Y Patil University Department of Computer Engineering Pune India G H Raisoni College of Engineering and Management Department of Cyber Security and Data Science Wagholi Pune India
In a traditional supply chain system, the process of producing raw materials so that a product may be delivered to a customer is a manual operation with insufficient data and transaction security. The entire process i... 详细信息
来源: 评论
Transforming cybersecurity in the Digital Era: The Power of AI  2
Transforming Cybersecurity in the Digital Era: The Power of ...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Mahfuri, Mahmoud Ghwanmeh, Sameh Almajed, Rsha Alhasan, Waseem Salahat, Mohammed Lee, Jin Hie Ghazal, Taher M. International University For Science And Technology Computer And Information Technology Department Damascus Syria American University In The Emirates Department Of Computer Scienc Dubai United Arab Emirates School Of Computer Science And Informatics De Montfort University Dubai Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates Miracle Clinic Seoul Korea Republic of Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
In the midst of the digital revolution of the 21st century, cybersecurity has come to be a primary social situation, requiring revolutionary and Innovative solution. To find the proper answer for this pressing demand,... 详细信息
来源: 评论
Simulating a Finite-State Markov Chain for Rayleigh Block-Fading Channel based on its Mathematical Model, and Practical Representation  25
Simulating a Finite-State Markov Chain for Rayleigh Block-Fa...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Attar, Hani Ababneh, Jafar Al-Hihi, Mohammad Rachini, Ali Solyman, Ahmed Zarqa University Faculty of Engineering Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Erlangen Germany Department of Computer Science and Information Technology Jounieh Lebanon Glasgow Caledonian University School of Computing Engineering and Built Environment Glasgow United Kingdom
In the proposed paper, simulating the Finite State Markov Chain (FSMC) to be implemented as Rayleigh Block-fading channel. Indeed, FSMC is regarded as a practical fading channel because of its random choice for future... 详细信息
来源: 评论
Fault Classification based on Deep Learning for Photovoltaic Systems  2
Fault Classification based on Deep Learning for Photovoltaic...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Kelin, A. R. Darshika Sudhakar, K. Surekha, Pothireddy Palanivel, R. Al-Jawahry, Hassan M. Karunya Institute of Technology and Sciences Data Science and Cyber Security Karunya Nagar Coimbatore India Department Electronics and Communication Engineering Telangana Hyderabad India Griet Department of Computer Science and Engineering Telangana Hyderabad India Nitte Meenakshi Institute of Technology Department of Ai and Ds Bengaluru India The Islamic University Najaf Iraq
In general, high power electronic converters such as Multilevel Inverters (MLI), that find their use in many applications, create difficulties of augmented switch count, capacitor flow current and reverse current flow... 详细信息
来源: 评论
Improving LSTM forecasting through ensemble learning: a comparative analysis of various models
收藏 引用
International Journal of Information technology (Singapore) 2024年 第8期16卷 5113-5131页
作者: Ahmad, Zishan Shanmugasundaram, Vengadeswaran Biju Khan, Rashid Department of Computer Science and Engineering Indian Institute of Information Technology Kerala Kottayam 686635 India LANOVIZ Security Solutions Kerala Ernakulam 682011 India
Supply chain management involves managing the entire manufacturing process, from purchasing supplies to delivering the final product. Demand forecasting helps businesses predict future customer demand by analyzing his... 详细信息
来源: 评论
User Behaviour based Insider Threat Detection using a Hybrid Learning Approach
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第4期14卷 4573-4593页
作者: Singh, Malvika Mehtre, B.M. Sangeetha, S. Govindaraju, Venu Centre of Excellence in Cyber Security Institute for Development and Research in Banking Technology Established by Reserve bank of India Telangana Hyderabad500057 India Department of Computer Applications National Institute of Technology Trichy Tamil Nadu Tiruchirappalli620015 India Center for Unified Biometrics and Sensors Department of Computer Science and Engineering State University of New York at Buffalo New York BuffaloNY14260 United States
Insider threats constitute a major cause of security breaches in organizations. They are the employees/users of an organization, causing harm by performing any malicious activity. Most of the existing methods to detec... 详细信息
来源: 评论