咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是341-350 订阅
排序:
A Survey on Privacy Preservation Methods in Future Vehicular Networks  11
A Survey on Privacy Preservation Methods in Future Vehicular...
收藏 引用
11th International Conference on Information and Communication technology, ICoICT 2023
作者: Eghtessad, Shayan Hasanli, Turan Huynh, Richard Workneh, Kidus Ibrahem, Mohamed I. Fouda, Mostafa M. George Mason University Dept of Cyber Security Engineering FairfaxVA United States Augusta University School of Computer and Cyber Sciences AugustaGA United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States
As increasing vehicular technology is becoming more popular due to global climate change and the promotion of renewable energy sources, electric vehicles (EVs) with an array of improved features are becoming increasin... 详细信息
来源: 评论
Privacy-Aware Artificial Intelligence with Homomorphic Encryption using Machine Learning
Privacy-Aware Artificial Intelligence with Homomorphic Encry...
收藏 引用
2023 International Conference on Sustainable Computing and Smart Systems, ICSCSS 2023
作者: Srinivasa Rao, B. Chattopadhyay, Saumitra Singh, Prashant Hazela, Bramah Sabarinathan, G. Yamini, Kalva Department of Computer Science and Engineering Bachupally Telangana Hyderabad India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Amity University Amity School of Engineering and Technology Lucknow Department of Computer Science and Engineering Uttar Pradesh India Psna College of Engineering and Technology Department of Mathematics Tamilnadu Dindigul India Sri Ramachandra Institute of Higher Education and Research Cyber Security in Computer Science and Engineering Tamilnadu Chennai India
Along with the expansion of machine learning (ML) applications, the amount of data required to create predictions increases. Big-data ML has always been limited by off-chip memory capacity and computational speed. Con... 详细信息
来源: 评论
Detecting Fake News on Twitter by Using Artificial Intelligence  3
Detecting Fake News on Twitter by Using Artificial Intellige...
收藏 引用
3rd International Conference on Advancement in Electronics and Communication engineering, AECE 2023
作者: Suhasini, R. Ratnamala, B. Sravanthi, Gurram Kumari, K. Prasanna Polamuri, Subba Rao Cmr College of Engineering and Technology Department of CSE-Cyber Security Hyderabad India Cmr Technical Campus Department of Ece Hyderabad India Odalarevu India
A great deal of information, particularly on social networking sites where individuals from all over the globe have continual and straightforward access to upload materials and messages, spreads rapidly throughout the... 详细信息
来源: 评论
Voice Controlled Humanoid Robot 3-D Printing Industrial Application  3
Voice Controlled Humanoid Robot 3-D Printing Industrial Appl...
收藏 引用
3rd International Conference on Artificial Intelligence and Signal Processing, AISP 2023
作者: Gupta, Amit Meeravali, Shaik Srinivas, K.Y. Chouhan, Arun Singh Malla Reddy University School of Engineering Department of Cyber Security Telangana India Malla Reddy Institute Technology and Science Department of ECE Telangana India
At this time this rapid evaluation industrial 5.0 age each and each company necessities rapidity in manufacturing to cope up with the customer's requirements. Each and each industrialist cannot meet the expense to... 详细信息
来源: 评论
Utilizing Machine Learning in Medical Diagnosis: Systematic Review and Empirical Analysis  24
Utilizing Machine Learning in Medical Diagnosis: Systematic ...
收藏 引用
24th International Arab Conference on Information technology, ACIT 2023
作者: Alazaidah, Raed Hassan, Mohammad Al-Rbabah, Lara Samara, Ghassan Yusof, Marina Al-Sherideh, Ala'a Saeb Zarqa University Ai Faculty of Information Technology Department of Data Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan The Hashemite University Faculty of Engineering Department of Computer Engineering Zarqa Jordan Selanger Malaysia Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan
During the last few years, several real-life applications have attempted to utilize the proven high capabilities of artificial intelligence in general and machine learning in particular. Machine learning has been util... 详细信息
来源: 评论
The Role of AI in Vehicle-to-Infrastructure Communication for Tolling Systems
The Role of AI in Vehicle-to-Infrastructure Communication fo...
收藏 引用
IEEE International WIE Conference on Electrical and computer engineering (WIECON-ECE)
作者: Mahalakshmi S Nithiya Baskaran Pachaivanna Partheeban Kowsalyadevi Krishnara Arjun S Department of Computer Science and Engineering Chennai Institute of Technology Kundrathur Chennai India Department Cyber Security Chennai Institute of Technology Kundrathur Chennai India Department Civil EngDepartment Cyber Security Chennai Institute of Technology Kundrathur Chennai India Department of Cyber Security Sona Institute of Technology Salem India
The number of vehicles people use is substantial; thus, surveillance must be accurate. License plates are detected and recognized by detecting static and real-time images captured by the camera using OCR technology, C... 详细信息
来源: 评论
Secure and efficient covert communication for blockchain-integrated SAGINs
收藏 引用
security and Safety 2024年 第2期3卷 25-42页
作者: Weijia Li Yuan Zhang Xinyu He Yaqing Song School of Computer Science and Engineering(School of Cyber Security) University of Electronic Science and Technology of ChinaChengdu 611731China
Blockchain has brought great potential in improving Space-Air-Ground Integrated Networks(SAGINs)in terms of security and *** blockchain-integrated SAGINs,many applications and services inherently require both the comm... 详细信息
来源: 评论
Digital-Bracers: A Design Process for an Interactive Monitoring Generative System That Helps People with Hand Movements
Digital-Bracers: A Design Process for an Interactive Monitor...
收藏 引用
2023 International Symposium on World Ecological Design, ISWED 2023
作者: Yao, Yousheng Xie, Yuan Ying, Fangtian Wang, Haoran Huang, Zhihao Zheng, Junpeng Faculty of Humanities and Arts Macau University of Science and Technology China Hexiangning College of Art and Design Zhongkai University of Agriculture and Engineering China College of Computer and Cyber Security Fujian Normal University China
In the post-New Crown epidemic era, people need to face a period of physical recovery after being infected with New Crown, especially when there are frequent cases of deaths due to over-aggressive or excessive physica... 详细信息
来源: 评论
Designing a Forensic Investigation Framework for IoT Monitoring and Modelling
Designing a Forensic Investigation Framework for IoT Monitor...
收藏 引用
2022 IEEE International Conference on Internet of Things and Intelligence Systems, IoTaIS 2022
作者: Jacob, Rijo Nisbet, Alastair Auckland University of Technology Cyber Security Research Laboratory School of Engineering Computer and Mathematical Sciences Csse Department Auckland New Zealand
Securing a wireless digital scene for IoT based digital investigations has been problematic. Amongst the most pressing issues is the increasingly challenging task of identifying IoT devices. Practical difficulties ari... 详细信息
来源: 评论
Multi Label Classification Algorithm Based on Conditional Local Correlations among Labels and Ensemble Learning  25
Multi Label Classification Algorithm Based on Conditional Lo...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Alazaidah, Raed Nasir, Ola Hadi, Wael Samara, Ghassan Al Daoud, Essam Aljaidi, Mohammad Khouj, Mohammed Talat Elsoud, Esraa Abu Alzoubi, Haneen Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Petra University Faculty of Information Technology Department of Cyber Security Amman Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Applied Science Private University Faculty of Information Technology Department of Computer Science Amman Jordan
Multi-Label Classification (MLC) is an advanced form of traditional classification, where each data instance is simultaneously associated with multiple labels. The importance of MLC has increased significantly in rece... 详细信息
来源: 评论