咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是361-370 订阅
排序:
Privacy Data Management Mechanism Based on Blockchain and Federated Learning
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 37-53页
作者: Mingsen Mo Shan Ji Xiaowan Wang Ghulam Mohiuddin Yongjun Ren Engineering Research Center of Digital Forensics of Ministry of Education School of ComputerNanjing University of Information Science&TechnologyNanjing210044China Zhengde Polytechnic Nanjing211106China Xi’an University of Posts&Telecommunications Xi’an710061China Department of Cyber Security at VaporVM Abu Dhabi999041United Arab Emirates
Due to the extensive use of various intelligent terminals and the popularity of network social tools,a large amount of data in the field of medical *** to manage these massive data safely and reliably has become an im... 详细信息
来源: 评论
Guardian of the Ensembles: Introducing Pairwise Adversarially Robust Loss for Resisting Adversarial Attacks in DNN Ensembles
Guardian of the Ensembles: Introducing Pairwise Adversariall...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Shukla, Shubhi Dalui, Subhadeep Alam, Manaar Datta, Shubhajit Mondal, Arijit Mukhopadhyay, Debdeep Chakrabarti, Partha Pratim Centre for Computational and Data Sciences Iit Kharagpur India Iit Kharagpur Computer Science and Engineering Department India Center for Cyber Security New York University Abu Dhabi United Arab Emirates Iit Kharagpur Department of Artificial Intelligence India Iit Patna Computer Science and Engineering Department India
Adversarial attacks rely on transferability, where an adversarial example (AE) crafted on a surrogate classifier tends to mislead a target classifier. Recent ensemble methods demonstrate that AEs are less likely to mi... 详细信息
来源: 评论
Secure speaker identification in open and closed environments modeled with symmetric comb filters
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19147-19189页
作者: Shafik, Amira Monir, Mohamad El-Shafai, Walid Khalaf, Ashraf A. M. Nassar, M.M. El-Fishawy, Adel S. El-Din, M. A. Zein Dessouky, Moawad I. El-Rabaie, El-Sayed M. Abd El-Samie, Fathi E. Department Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Laboratory Department of Computer Science Prince Sultan University Riyadh11586 Saudi Arabia Electrical Engineering Department Faculty of Engineering Minia University Minia61519 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. Howe... 详细信息
来源: 评论
A U-Shaped Multi-Scale Network for Defocus Blur Detection  17
A U-Shaped Multi-Scale Network for Defocus Blur Detection
收藏 引用
17th International Congress on Image and Signal Processing, BioMedical engineering and Informatics, CISP-BMEI 2024
作者: Li, Longrui Huang, Liqing College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Digital Fujian Institute of Big Data Security Technology Fuzhou350117 China Fujian Provincial Engineering Research Center of Big Data Analysis and Application Fuzhou350117 China
Defocus blur detection (DBD) aims at accurately extract the in-focus sharp regions in natural images. Despite significant progress, the presence of uniform regions and gradient boundaries remain two of the most challe... 详细信息
来源: 评论
Advance Public Bus Transport Management System: An Innovative Smart Bus Concept
Advance Public Bus Transport Management System: An Innovativ...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Patel, Keyurkumar Patel, Divya Chaudhary, Nishit Thakkar, Darsh Savaliya, Pratham Mistry, Armaan Rashtriya Raksha University Artificial Intelligence and Cyber Security Department of IT Gujarat Gandhinagar382305 India Karnavati University Unitedworld School of Computational Intelligence Department of Computer Science and Engineering Gujarat Gandhinagar382422 India
In the present era, public bus transportation services often lag behind in adopting modern technologies, resulting in numerous operational complexities. These issues encompass challenges such as poor passenger density... 详细信息
来源: 评论
Multi-View Incongruity Learning for Multimodal Sarcasm Detection  31
Multi-View Incongruity Learning for Multimodal Sarcasm Detec...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Guo, Diandian Cao, Cong Yuan, Fangfang Liu, Yanbing Zeng, Guangjie Yu, Xiaoyan Peng, Hao Yu, Philip S. Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science University of Illinois Chicago United States
Multimodal sarcasm detection (MSD) is essential for various downstream tasks. Existing MSD methods tend to rely on spurious correlations. These methods often mistakenly prioritize non-essential features yet still make... 详细信息
来源: 评论
Enhanced Phishing Detection: Integrating Random Forest Classifier and Domain Analysis for Proactive cybersecurity
Enhanced Phishing Detection: Integrating Random Forest Class...
收藏 引用
International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
作者: Dharini N E P Vishnu Sudarsan B.Praveen Thirugnanam D Sibi K Department of Computer Science and Engineering (Cyber Security) R.M.K. College of Engineering and Technology Puduvoyal Tamilnadu
This work provides a multimodal strategy for detecting phishing attack that combines URL structure analysis and machine learning methodologies. The process starts with Level 1 analysis, which includes parsing the URL ... 详细信息
来源: 评论
FTGraph: A Flexible Tree-Based Graph Store on Persistent Memory for Large-Scale Dynamic Graphs
FTGraph: A Flexible Tree-Based Graph Store on Persistent Mem...
收藏 引用
2024 IEEE International Conference on Cluster Computing, CLUSTER 2024
作者: Sun, Gan Zhou, Jiang Li, Bo Gu, Xiaoyan Wang, Weiping He, Shuibing Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China College of Computer Science and Technology Zhejiang University Hangzhou China
Traditional in-memory graph systems often suffer from scalability due to the limited capacity and volatility of DRAM. Emerging non-volatile memory (NVM) provides an opportunity to achieve highly scalable and high-perf... 详细信息
来源: 评论
An IT/OT Converged cyber Range Framework Supporting Ensemble of Large Multimodal Models-Human Teaming and RAG Capability for Bigdata Information Retrieval - 6G Perspective
An IT/OT Converged Cyber Range Framework Supporting Ensemble...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Rahman, M. Abdur Islam, M. Saiful Islam, M. Repon Hossain, M. Shamim Al-Hazzaa, Selwa University of Prince Mugrin Cyber Security and Forensic Computing Department Medina Saudi Arabia UoL Worldwide University of London London United Kingdom Khulna University of Engineering & Technology Department of Computer Science and Engineering Khulna Bangladesh King Saud University Department of Software Engineering Riyadh Saudi Arabia Riyadh Saudi Arabia
In IT/OT converged enterprise networks, the management of multimodal big data has surpassed human capabilities, presenting critical challenges in business decision-making. This paper introduces an innovative IT/OT Con... 详细信息
来源: 评论
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 评论