咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是381-390 订阅
排序:
A Pricing-Based Cooperative Relay Selection Scheme for Reliable Communications
收藏 引用
China Communications 2024年 第8期21卷 30-44页
作者: Xiao Yulong Wu Yu Amr Tolba Chen Ziqiang Li Tengfei School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science Community CollegeKing Saud UniversityRiyadh 11437Saudi Arabia
With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety... 详细信息
来源: 评论
COVID-19 Classification from X-Ray Images:An Approach to Implement Federated Learning on Decentralized Dataset
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3883-3901页
作者: Ali Akbar Siddique S.M.Umar Talha M.Aamir Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Department of Telecommunication Engineering Sir Syed University of Engineering&TechnologyKarachi75300Pakistan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
The COVID-19 pandemic has devastated our daily lives,leaving horrific repercussions in its *** to its rapid spread,it was quite difficult for medical personnel to diagnose it in such a big *** who test positive for Co... 详细信息
来源: 评论
Investigation of Endorsement Guideline Protocol Actuality Problem Using Blowfish AES Algorithm  2
Investigation of Endorsement Guideline Protocol Actuality Pr...
收藏 引用
2nd IEEE International Conference on Futuristic Technologies, INCOFT 2023
作者: Rajmohan, R. Raj, S. Saran Karthikram, A. Kumar, T. Ananth Syed Fiaz, A.S. Srm Institute of Science and Technology Department of Computing Technologies Tamil Nadu India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu India Madanapalle Institute of Technology and Science Department of Computer Science Engineering - Cyber Security Andhra Pradesh India Ifet College of Engineering Department of Computer Science and Engineering Tamil Nadu India
A larger an organization's dependence on, Potential distributed information systems for its everyday activities, the greater its vulnerability to security vulnerabilities, even as it gains efficiency and productiv... 详细信息
来源: 评论
Facial Expressions and EEG Signals for Emotion Recognition Using Deep2 Face Algorithm  10
Facial Expressions and EEG Signals for Emotion Recognition U...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Swetha, S. Babu, Nirmal Varghese Karunya Institute of Technology and Science Division of Computer Science and Engineering Karunya Nagar Tamil Nadu Coimbatore India Karunya Institute of Technology and Science Division of Data Science and Cyber Security Karunya Nagar Tamil Nadu Coimbatore India
Emotions, the essence of human connection and understanding, take center stage in this pioneering research on emotion recognition. We look at identifying common emotions including joy, sorrow, neutral, anger, fear, an... 详细信息
来源: 评论
Energy and Bandwidth Based Link Stability Routing Algorithm for IoT
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3875-3890页
作者: D.Kothandaraman A.Balasundaram R.Dhanalakshmi Arun Kumar Sivaraman S.Ashokkumar Rajiv Vincent M.Rajesh School of Computer Science and Artificial Intelligence SR UniversityWarangalTSIndia School of Computer Science and Engineering Center for Cyber Physical SystemsVellore Institute of Technology(VIT)ChennaiIndia Department of Computer Science and Engineering KCG College of TechnologyChennaiIndia School of Computer Science and Engineering Vellore Institute of Technology(VIT)ChennaiIndia Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennaiIndia
Internet of Things(IoT)is becoming popular nowadays for collecting and sharing the data from the nodes and among the nodes using internet ***,some of the nodes in IoT are mobile and dynamic in *** maintaining the link... 详细信息
来源: 评论
Preserving Privacy of User Identity Based on Pseudonym Variable in 5G
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 5551-5568页
作者: Mamoon M.Saeed Mohammad Kamrul Hasan Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta Electrical Engineering Department Faculty of EngineeringAlzaiem Alazahri UniversityKhartoumSudan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti KebangsaanMalaysia(UKM)43600BangiMalaysia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityPO Box 11099Taif21944Saudi Arabia Department of Electronics Engineering College of EngineeringSudan University of Science and TechnologyKhartoumSudan Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia
The fifth generation(5G)system is the forthcoming generation of the mobile communication *** has numerous additional features and offers an extensively high data rate,more capacity,and low ***,these features and appli... 详细信息
来源: 评论
Detection and Recovery of RFID Harmonic Signal for Wi-Fi Interference
收藏 引用
Journal of Communications and Information Networks 2024年 第4期9卷 330-339页
作者: Chao Gong Ping Li Panlong Yang Zhao Lv School of Computer Science and Technology Anhui UniversityHefei 230000China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of TechnologyMa’anshan 243032China School of Computer science School of Cyber Science and EngineeringNanjing University of Information Science and TechnologyNanjing 210000China
In the realm of the Internet of things(IoT),radio frequency identification(RFID)technology is essential for linking physical objects to digital *** introduction of harmonic technology has expanded RFID’s applications... 详细信息
来源: 评论
Accurate segmentation based on heuristic shape attention for occlusal tooth on CBCT  11
Accurate segmentation based on heuristic shape attention for...
收藏 引用
11th International Conference on Information technology: IoT and Smart City, ICIT 2023
作者: Cai, Jiancheng Zou, Zheng Wu, Yi Liu, Shijian Liao, Shenghui College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Computer Science and Mathematics Fujian University of Technology Fuzhou China School of Computer Science and Engineering Central South University Changsha China
Accurate occlusal tooth segmentation for dental CBCT is essential for traumatic occlusal force diagnosis. As tiny multi-objects, adhesion from surrounding touching would largely hinder the correct detection. Especiall... 详细信息
来源: 评论
AOCC-FL: Federated Learning with Aligned Overlapping via Calibrated Compensation  42
AOCC-FL: Federated Learning with Aligned Overlapping via Cal...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Wang, Haozhao Xu, Wenchao Fan, Yunfeng Li, Ruixuan Zhou, Pan Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China The Hong Kong Polytechnic University Department of Computing Hong Kong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan China
Federated Learning enables collaboratively model training among a number of distributed devices with the coordination of a centralized server, where each device alternatively performs local gradient computation and co... 详细信息
来源: 评论
Quantum Resistance Group Key Management for IoTs  2
Quantum Resistance Group Key Management for IoTs
收藏 引用
2nd International Conference on Emerging Trends in Electrical, Control, and Telecommunication engineering, ETECTE 2023
作者: Samiullah, Fouzia Gan, Ming-Lee Akleylek, Sedat Aun, Yichiet Universiti Tunku Abdul Rahman Faculty of Information and Communication Technology Kampar Perak31900 Malaysia Ondokuz Mayis University Cyber Security and Information Technologies Research and Development Centre and Department of Computer Engineering Samsun Turkey University of Tartu Chair of Security and Theoretical Computer Science Estonia
Group communication plays a vital role in our interconnected society, facilitating efficient and secure data exchange among multiple endpoints. The issue pertains to the intricate nature that emerges within the limite... 详细信息
来源: 评论