咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是451-460 订阅
排序:
An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm  1
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Huang, Peixin Dong, Chen Chen, Zhenyi Zhen, Zihang Jiang, Lei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
With the development of technology, robots are gradually being used more and more widely in various fields. Industrial robots need to perform path planning in the course of their tasks, but there is still a lack of a ... 详细信息
来源: 评论
Energy-Aware Reliable Routing with Blockchain security for Heterogeneous Wireless Sensor Networks  5th
Energy-Aware Reliable Routing with Blockchain Security for H...
收藏 引用
5th International Conference on Advances in Information Communication technology and Computing, AICTC 2024
作者: Swapna, M.P. Ramkumar, J. Karthikeyan, R. Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Kollam Amritapuri India Department of Information Technology & Cognitive Systems Sri Krishna Arts & Science College Coimbatore India Department of Computer Technology Sri Krishna Adithya College of Arts and Science Coimbatore India
Wireless sensor networks, the dynamic networks with spatially dispersed sensors are used indispensably in a wide range of applications. Heterogeneous wireless sensor networks represent a collection of sensor nodes of ... 详细信息
来源: 评论
Systematic Analysis of Machine Learning Techniques for Machine Idle Time Detection Using Industrial Internet of Things (IIOT)
Systematic Analysis of Machine Learning Techniques for Machi...
收藏 引用
International Conference on Communication and Electronics Systems (ICCES)
作者: Kamineni B T Sundari B. Janet Department of Computer Science Engineering -Cyber Security Geetanjali College of Engineering and Technology Medchal district Telangana India Department of Computer Applications National Institute of Technology Tiruchirappalli Tamilnadu India
Given the IOT's huge success in linking consumer electronics, we see a natural trend toward connecting devices in industrial settings, dubbed the Industrial Internet of Things or Industry 4.0. Conventional product... 详细信息
来源: 评论
Machine Learning Supported Network Attack Detection with a Novel Method Based on Random Forest-Based Feature Fusion  17
Machine Learning Supported Network Attack Detection with a N...
收藏 引用
17th International Conference on Information security and Cryptology, ISCTurkiye 2024
作者: Cinar, Cihan Dogru, Ibrahim Alper Atacak, Ismail Information Security Engineering Graduate School of Natural and Applied Sciences Gazi University Ankara Turkey Department of Computer Engineering Faculty of Technology Gazi University Ankara Turkey
Nowadays, Innovative techniques, including artificial intelligence and machine learning (ML), have been employed in attack detection systems across numerous domains to create effective detection mechanisms that identi... 详细信息
来源: 评论
Forensics Analysis of TOR Browser
Forensics Analysis of TOR Browser
收藏 引用
International Conference on Information security, Privacy, and Digital Forensics, 2022
作者: Kumar, Adarsh Sondarva, Kumar Gohil, Bhavesh N. Patel, Sankita J. Shah, Ramya Rajvansh, Sarang Sanghvi, H.P. Computer Engineering Department Sardar Vallabhbhai National Institute of Technology Gujarat Surat395-007 India School of Cyber Security and Digital Forensics National Forensic Sciences University Gujarat Gandhinagar382007 India Directorate of Forensic Science Gujarat Gandhinagar India
The Onion Router is a web browser that uses the Tor network to anonymize web traffic by making it simple to conceal one’s identity on social media. It uses the onion routing technology to access the multiple-level en... 详细信息
来源: 评论
Customized Criteria Based Trending Analysis for YouTube Platform
Customized Criteria Based Trending Analysis for YouTube Plat...
收藏 引用
2023 IEEE Conference on computer Applications, ICCA 2023
作者: Nyunt, Khin Than Khin, Naw Thiri Wai Naypyitaw Technological University Faculty of Computer Engineering and Information Technology Myanmar University of Technology Department of Information Science Yatanarpon Cyber City Myanmar
Users of today's technology regularly use direct applications and internet platform to access YouTube. Also, with the increase in YouTube users in the US today, the number of people making a living from YouTube ha... 详细信息
来源: 评论
Secure Cloud Computing: Mitigating Network Vulnerabilities  15
Secure Cloud Computing: Mitigating Network Vulnerabilities
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Gopal, Santhosh Kumar Mohammed, Abdul Sajid Sreeramulu, Madhusudhan Dasari Srinivasan, Dhamodharan Charlotte NC United States University of the Cumberlands Dept of School of Computer and Information Sciences KY United States American Express Dept of Cyber Security United States Sri Eshwar College of Engineering Department of Computer and Communication Engineering Tamil Nadu Coimbatore641202 India
As businesses increasingly depend on these cloud-based services, secure cloud computing is vital. There is no free way with the cloud network, and our information is susceptible to vulnerability. Mitigation strategies... 详细信息
来源: 评论
Evaluation of Chest CT-Scan Anomaly Detection Models Using Principal Component Analysis  25
Evaluation of Chest CT-Scan Anomaly Detection Models Using P...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Alyabrodi, Ala Al-Daja, Shrouq Injadat, MohammadNoor Moubayed, Abdallah Elrashidi, Ali Zarqa University Cyber Security Department Zarqa Jordan Zarqa University Data Science & Ai Department Zarqa Jordan King Fahd University of Petroleum & Minerals Research Center for Intelligent Secure Systems Computer Engineering Department and Interdisciplinary Dhahran Saudi Arabia University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Machine learning-based improvements in anomaly detection, visualization, and segmentation are made possible by the growing digitization of medical imaging, which reduces the workload for medical specialists. Neverthel... 详细信息
来源: 评论
Automated Crop Growth Monitoring and Optimizing the Yield with Reinforcement Learning  3
Automated Crop Growth Monitoring and Optimizing the Yield wi...
收藏 引用
3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: Gorantla, Snehitha Veluchamy, S. Amrita School of Computing Department of Computer Science and Engineering - Artificial Intelligence Amrita Vishwa Vidyapeetham Chennai601103 India Amrita School of Computing Department of Computer Science and Engineering - Cyber Security Amrita Vishwa Vidyapeetham Chennai601103 India
A reinforcement learning agent for optimal green-house management through Proximal Policy Optimisation is developed and evaluated in this work. With variable elements like lighting, irrigation, humidity, and temperatu... 详细信息
来源: 评论
Deep Learning Cost-Effective Evaluation Metrics
Deep Learning Cost-Effective Evaluation Metrics
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Zhao, Jian Zhao, Zisong Shi, Lijuan Kuang, Zhejun Wang, Runmin Li, Haixia College of Cyber Security Changchun University Changchun China College of Electronic Information Engineering Changchun University Changchun China College of Computer Science and Technology Changchun University Changchun China
Deep learning has been a driving force behind recent breakthroughs in artificial intelligence. In particular, neural networks have shown great promise in handling a wide range of tasks. With the improvement of perform... 详细信息
来源: 评论