咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是401-410 订阅
排序:
MINERVA: Secure Collaborative Machine Tool Data Utilization Leveraging Confidentiality-Protecting Technologies
MINERVA: Secure Collaborative Machine Tool Data Utilization ...
收藏 引用
Open Identity Summit 2024
作者: Ludwig, Andy Heinl, Michael P. Giehl, Alexander Fraunhofer AISEC Department Product Protection and Industrial Security Garching bei München Germany Technical University of Munich TUM School of Computation Information and Technology Department of Computer Engineering IT Security Germany
The digitization of shop floors opens up opportunities for innovative applications and business models due to the vast amount of generated data. However, a lot of this potential is currently not utilized because compa... 详细信息
来源: 评论
An Energy-Efficient Protocol for Internet of Things Based Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2397-2412页
作者: Mohammed Mubarak Mustafa Ahmed Abelmonem Khalifa Korhan Cengiz Nikola Ivkovic Department of Information Technology Sri Krishna College of Engineering&TechnologyCoimbatoreIndia Department of Networking and Security College of Information TechnologyUniversity of FujairahFujairahUAE Switching and Traffic Department National Telecommunication InstituteCairoEgypt Department of Computer Engineering Istinye UniversityZeytinburnuIstanbulTurkey Faculty of Organization and Informatics University of ZagrebVarazdinCroatia
The performance of Wireless Sensor Networks(WSNs)is an important fragment of the Internet of Things(IoT),where the current WSNbuilt IoT network’s sensor hubs are enticing due to their critical *** grouping hubs,a clu... 详细信息
来源: 评论
Reinforcement learning-based unknown reference tracking control of HMASs with nonidentical communication delays
收藏 引用
Science China(Information Sciences) 2023年 第7期66卷 46-57页
作者: Yong XU Zheng-Guang WU Wei-Wei CHE Deyuan MENG School of Automation Beijing Institute of Technology Institute of Cyber-Systems and Control Zhejiang University College of Mathematics and Computer Science Zhejiang Normal University Department of Automation Qingdao University School of Automation Science and Electrical Engineering Beihang University(BUAA)
This paper focuses on the optimal output synchronization control problem of heterogeneous multiagent systems(HMASs) subject to nonidentical communication delays by a reinforcement learning *** with existing studies as... 详细信息
来源: 评论
Fog enabling technologies in healthcare: A review
Fog enabling technologies in healthcare: A review
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and security, ICABCS 2023
作者: Yadav, Aditya Pradhan, Onesimus Chandra Khanam, Ruqaiya Amrita Computer Science and Engineering Sharda School of Engineering and Technology Sharda University U.P Greater Noida India Department of EECE Center for AI in Medicine Imaging and Forensic Sharda University U.P Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University U.P Greater Noida India
This paper provides an overview of fog computing healthcare technologies that are playing a huge role in the current healthcare Industry. In this paper, we suggest the Data mining is the most effective option for dise... 详细信息
来源: 评论
Optimized Predictive Modelling for Chronic Kidney Disease: A Hybrid Ensemble Approach with Bacterial Foraging Optimization and SMOTE  6
Optimized Predictive Modelling for Chronic Kidney Disease: A...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Pavan Kumar, V.S. Yadla, Jyothi Parvatham, Niranjan Kumar Lokesh Kumar, P. Tulluri, Usha Amrutha, K. Department of CSE-AIML MLR Institute of Technology Hyderabad India Department of CSE Sir C R Reddy College of Engineering Eluru India Department of CSE CVR College of Engineering Hyderabad India Department of CSE-Cyber Security CMR Engineering College Hyderabad India Bhimavaram India
Chronic kidney disease is a disease with obvious seriousness of severity. It can cause more severe complications if it further develops, so early diagnosis is very important for disease control and the improvement of ... 详细信息
来源: 评论
Supervised Feature Learning for Offline Writer Identification Using VLAD and Double Power Normalization
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 279-293页
作者: Dawei Liang Meng Wu Yan Hu College of Computer Nanjing University of Posts and TelecommunicationsNanjing210023China Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China JinCheng College Nanjing University of Aeronautics and AstronauticsNanjing211156China Engineering Research Center of Electronic Data Forensics Analysis Nanjing210031Jiangsu ProvinceChina
As an indispensable part of identity authentication,offline writer identification plays a notable role in biology,forensics,and historical document ***,identifying handwriting efficiently,stably,and quickly is still c... 详细信息
来源: 评论
Investigation of Red Fox Algorithm for Solving Task Assignment Problem in Heterogeneous Unmanned Aerial Vehicle Swarm  3
Investigation of Red Fox Algorithm for Solving Task Assignme...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Manaswitha, K. Issac, Titus Silas, Salaja Terance, J Sebastian Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Artificial Intelligence and Machine Learning Karunya Institute of Technology and Sciences Coimbatore India
In recent years, there have been significant advancements in Unmanned Aerial Vehicles (UAVs), leading to their integration into everyday life. UAVs are constrained by limited energy, communication, and localization. T... 详细信息
来源: 评论
Multi-Scale Fusion and Decomposition Network for Single Image Deraining
收藏 引用
IEEE Transactions on Image Processing 2024年 33卷 191-204页
作者: Wang, Qiong Jiang, Kui Wang, Zheng Ren, Wenqi Zhang, Jianhui Lin, Chia-Wen Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan430072 China Sun Yat-sen University School of Cyber Science and Technology Guangzhou510275 China Hangzhou Dianzi University College of Computer Science and Technology Hangzhou310018 China National Tsing Hua University Department of Electrical Engineering The Institute of Communications Engineering Hsinchu30013 Taiwan
Convolutional neural networks (CNNs) and self-attention (SA) have demonstrated remarkable success in low-level vision tasks, such as image super-resolution, deraining, and dehazing. The former excels in acquiring loca... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography security of Financial Data
收藏 引用
SN computer Science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
Development of Modified Homomorphic Encryption for IIoT on Textual Data
Development of Modified Homomorphic Encryption for IIoT on T...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Rathinakumar, P. Dhivya, R. Prasath, S. Jayapriya, K.N. Kumar, M.Sathish Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Ece Vadapalani Campus Tamilnadu Chennai600026 India M.Kumarasamy College of Engineering Department of Information Technology Tamilnadu Karur India Mohamed Sathak A J College of Engineering Department of Mechanical Engineering Tamil Nadu Chennai603103 India Kathir College of Engineering Department of Computer Science and Engineering Tamilnadu Coimbatore641062 India Karpagam College of Engineering Department of Cyber Security Tamilnadu Coimbatore641032 India
Digitalizing existing systems for mass production is what's known as 'Smart Industry' or the Industrial Internet of Things (IIoT). As a result of the interoperability of modern industrial equipment with Io... 详细信息
来源: 评论