咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是351-360 订阅
排序:
AI-Based Detection and Analysis of Phishing Domains: Leveraging Machine Learning for Enhanced cybersecurity
AI-Based Detection and Analysis of Phishing Domains: Leverag...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Dhanalakshmi, R. Vijayaraghavan, N. Kumar, Akhil Beni Prathiba, B. Sahaya School of Computer Science and Engineering Vellore Institute of Technology - Chennai Center for Cyber Physical Systems Chennai India Kcg College of Technology Department of Mathematics Chennai India Scset Bennett University Greater Noida India School of Computer Science and Engineering Vellore Institute of Technology Center for Cyber Physical Systems Chennai India
In the ever-evolving landscape of cyber security, the prevalence of phishing attacks poses a formidable threat to information security systems worldwide, compromising data integrity and eroding user trust. This paper ... 详细信息
来源: 评论
IntSHU: A security-Enabled Intelligent Soft Handover Approach for UAV-Aided 5G and Beyond
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Karmakar, Raja Kaddoum, Georges Akhrif, Ouassima Heritage Institute of Technology Department of Computer Science and Engineering IoT and Cyber Security including Blockchain Technology Kolkata700107 India University of Quebec Department of Electrical Engineering ETS Montreal Canada Lebanese American University Cyber Security Systems and Applied AI Research Center Beirut Lebanon
Unmanned aerial vehicles (UAVs) play a significant role in serving as gNodeBs (gNBs), or user devices (UDs). However, considering the high data rates and low latency required by fifth generation (5G) and beyond, it is... 详细信息
来源: 评论
Greedy Overall-Relevancy (GOR): An Efficient Greedy Search for Feature Reduction  2
Greedy Overall-Relevancy (GOR): An Efficient Greedy Search f...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Zamanian, Ayda Alqammaz, Abdullah Boostani, Reza Shiraz University Faculty of Electrical and Computer Engineering Cse and It Dept. Shiraz Iran Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia
Various feature selection strategies such as brute-force search, randomized and sequential search have been suggested to remove the redundant features, among which, sequential search strategy is computationally effici... 详细信息
来源: 评论
Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models
Targeted Anonymization: A Face Image Anonymization Method fo...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Ding, Kangyi Hu, Teng Liu, Xiaolei Niu, Weina Wang, Yanping Zhang, Xiaosong School of Computer Science and Engineering Institute for Cyber Security University of Electronic Science and Technology of China Chengdu China
As an important biometric feature of every person, face data has faced serious risks of leakage in recent years. Lawbreakers can use face recognition systems (FRS) to analyze the leaked face data and then correlate ot... 详细信息
来源: 评论
A novel medical image data protection scheme for smart healthcare system
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 821-836页
作者: Mujeeb Ur Rehman Arslan Shafique Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad School of Computer Science and Informatics Cyber Technology InstituteDe Montfort UniversityLeicesterUK Department of Biomedical Engineering University of GlasgowGlasgowUK School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghUK Robotics and Internet‐of‐Things Laboratory Prince Sultan UniversityRiyadhSaudi Arabia Department of Computer Science Al Ain UniversityAl AinUnited Arab Emirates Department of Computer Engineering College of Computer Science King Khalid UniversityAbhaSaudi Arabia Computer Sciences Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,parti... 详细信息
来源: 评论
Predicting Customer Behavior Using Neural Network Optimized by Grasshopper Algorithm  2
Predicting Customer Behavior Using Neural Network Optimized ...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Loaeibi, Zoheir Alqammaz, Abdullah Sara, Massar Boostani, Reza School of Engineering Shiraz University Electrical and Computer Engineering Faculty Cse and It Dept. Shiraz Iran Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia
Digital marketing, as an essential branch of science, could provide value for commercial organizations and strengthen the interaction with customers via increasing the electronic services. In digital marketing, real-t... 详细信息
来源: 评论
Enhancing visual clarity in hazy media: a comprehensive approach through preprocessing and feature fusion attention-based dehazing
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18071-18093页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and atte... 详细信息
来源: 评论
Integration of Process Optimization and Automation: A Way to AI Powered Digital Transformation  1
Integration of Process Optimization and Automation: A Way to...
收藏 引用
1st International Conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Kotte, Kulasekhara Reddy Thammareddi, Latha Kodi, Divya Anumolu, Venkateswara Rao Arun Kumar, K. Joshi, Shubham INC SLRI Solutions India India Cyber Security Senior Data Analyst Truist Financial India Technical Architect ERP Solutions- Information Technology India Big Data Architect India Bipin Tripathi Kumaon Institute of Technology Department of Computer Science & Engineering Almora India
One of the most important factors facilitating AI-powered digital transformation is the combination of process automation and optimisation. Organisations may improve operational efficacy, save costs, and streamline pr... 详细信息
来源: 评论
Explainable Artificial Intelligence in Drones: A Brief Review  14
Explainable Artificial Intelligence in Drones: A Brief Revie...
收藏 引用
14th International Conference on Information and Communication Systems, ICICS 2023
作者: Banimelhem, Omar Al-Khateeb, Baghdad Jordan University of Science and Technology Department of Network Engineering and Security Irbid Jordan Jordan University of Science and Technology Department of Computer Engineering Irbid Jordan
The lack of clarity of most artificial intelligence algorithms which have many applications has led to the emergence of explainable artificial intelligence (XAI), which includes machine learning algorithms that introd... 详细信息
来源: 评论
Video key concept extraction using Convolution Neural Network  3
Video key concept extraction using Convolution Neural Networ...
收藏 引用
3rd IEEE International Conference on AI in cybersecurity, ICAIC 2024
作者: Sardar, Tanvir H Amin Hazarika, Ruhul Pandey, Bishwajeet Guru Prasad, M.S. Mahmudul Hassan, Sk Dodmane, Radhakrishna Gohel, Hardik Dept. of Computer Science & Engg Bengaluru India Manipal Institute of Technology Department of Information Technology Bengaluru India Astana It University Department of Intelligent System and Cyber Security Kazakhstan Dept. of Computer Science & Engg. Dehradun India VIT-AP School of Computer Science and Engineering India Nmam Institute of Technology Department of Computer Science & Engg. Nitte India University of Houston Department of Cse Victoria United States
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video ***: The methodology comprises extractin... 详细信息
来源: 评论