咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是461-470 订阅
排序:
Detection and Mitigation of DDoS attack in Software Defined Networking: A Survey
Detection and Mitigation of DDoS attack in Software Defined ...
收藏 引用
2022 International Conference on Sustainable Computing and Data Communication Systems, ICSCDS 2022
作者: Ashodia, Namita Makadiya, Kishan Marwadi University Department of Cyber Security Gujarat Rajkot India Marwadi University Department of Computer Engineering Gujarat Rajkot India
Software Defined Networking (SDN) is an emerging technology, which provides the flexibility in communicating among network. Software Defined Network features separation of the data forwarding plane from the control pl... 详细信息
来源: 评论
Criteria-based Unsupervised Feature Selection Techniques: A Comparative Study Over Chest CT Scan  25
Criteria-based Unsupervised Feature Selection Techniques: A ...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Al-Daja, Shrouq Alyabrodi, Ala' Moubayed, Abdallah Injadat, MohammadNoor Elrashidi, Ali Zarqa University Data Science & Ai Department Zarqa Jordan Zarqa University Cyber Security Department Zarqa Jordan King Fahd University of Petroleum & Minerals Interdisciplinary Research Center for Intelligent Secure Systems Computer Engineering Department Dhahran Saudi Arabia University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Research on classifying chest CT scans as normal or abnormal using machine learning and deep learning has garnered significant attention. To address this, various feature selection (FS) methods are employed to reduce ... 详细信息
来源: 评论
Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates  24
Forward and Backward Private Searchable Symmetric Encryption...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Yin, Zhiming Li, Xiong Choo, Kim-Kwang Raymond Liu, Yuzhen Liang, Wei School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249-0631 United States
In dynamic searchable symmetric encryption, clients can search and update encrypted data stored on the server (assumed to be semi-honest). In such schemes, forward privacy guarantees that prior queries are not related... 详细信息
来源: 评论
An Efficient Classifier: Kernel SVM-LDA  1
An Efficient Classifier: Kernel SVM-LDA
收藏 引用
1st International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2022
作者: Tehrani, Fahimeh Jamshidian Nasihatkon, Behrooz Al-Qawasmi, Khaled Al-Mousa, Mohammad Rasmi Boostani, Reza School of Computer Engineering Khajeh Nasir University of Technology Tehran Iran Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan Shiraz University Shiraz Faculty of Electrical and Computer Engineering Iran
This study aims at designing an efficient combinatorial classifier, which fuses linear discriminant analysis (LDA) and kernel support vector machine (SVM) classifiers. The proposed method is called kernel SVM-LDA whic... 详细信息
来源: 评论
An Explainable Deep Learning-based Approach for Multivariate Time Series Anomaly Detection in IoT  20
An Explainable Deep Learning-based Approach for Multivariate...
收藏 引用
20th International Conference on Frontiers of Information technology, FIT 2023
作者: Toor, Aafan Ahmad Lin, Jia-Chun Gran, Ernst Gunnar Lee, Ming-Chang Department of Information Security and Communication Technology Gjovik Norway Electrical Engineering and Mathematical Sciences Department of Computer Science Bergen Norway
Detecting anomalies from Internet of Things (IoT) data is important for a smooth flow of events. Timely detection of anomalies and raising alarms can help avoid any potential health and safety hazards in an IoT enviro... 详细信息
来源: 评论
A Comprehensive Evaluation of Face Mask Identification System using Modified Deep Learning Methodology  10
A Comprehensive Evaluation of Face Mask Identification Syste...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Lakshman, Bijee Vanitha, R. Vasuki, R. Uparkar, Satyajit S. Arun, S. Thiagarajan, R. Women's Christian College PG Department of Data Science College Road Chennai India Jerusalem College of Engineering Department of Cyber Security Chennai India Dhanalakshmi Srinivasan University Department of Cse School of Engineering and Technology Trichy India Shri Ramdeobaba College of Engineering and Management Department of Computer Application Nagpur India Jerusalem College of Engineering Department of ECE Chennai India Prathyusha Engineering College Department of It Chennai India
Recent years have seen an explosion in the prevalence, infectiousness, and potential harm posed to humanity by the corona virus family of viruses. When one person breathes out the virus, it lands on surfaces and other... 详细信息
来源: 评论
On the security of Smart Home Systems:A Survey
收藏 引用
Journal of computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
A Model Stealing Attack Against Multi-Exit Networks
A Model Stealing Attack Against Multi-Exit Networks
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Pan Lv, Peizhuo Chen, Kai Zhang, Shengzhi Cai, Yuling Xiang, Fan SKLOIS Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Department of Computer Science Metropolitan College Boston University USA
Compared to traditional neural networks with a single output channel, a multi-exit network has multiple exits that allow for early outputs from the model's intermediate layers, thus significantly improving computa... 详细信息
来源: 评论
Exploring LLM-Based Multi-Agent Situation Awareness for Zero-Trust Space-Air-Ground Integrated Network
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2230-2247页
作者: Cao, Xinye Nan, Guoshun Guo, Hongcan Mu, Hanqing Wang, Long Lin, Yihan Zhou, Qinchuan Li, Jiayi Qin, Baohua Cui, Qimei Tao, Xiaofeng Fang, He Du, Haitao Quek, Tony Q.S. Beijing University of Posts and Telecommunications National Engineering Research Center for Mobile Network Technologies China Fujian Normal University College of Computer and Cyber Security Fuzhou350007 China Professorate senior engineer at China Mobile Research Institute China Singapore University of Technology and Design 487372 Singapore Yonsei University Yonsei Frontier Lab Korea Republic of
Space-air-ground integrated network (SAGIN), which integrates satellite systems, aerial networks, and terrestrial communications, offers ubiquitous coverage for a multitude of applications. Nevertheless, the highly dy... 详细信息
来源: 评论
Predicting Mental States: Machine Learning Techniques for Personalized Mental Health Support  15
Predicting Mental States: Machine Learning Techniques for Pe...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Hepzibah, Grace Babu, Nirmal Varghese Division of Computer Science Engineering Karunya Institute of Technology and Science Karunya Nagar Tamil Nadu Coimbatore641114 India Division of Data Science and Cyber Security Karunya Institute of Technology and Science Karunya Nagar Tamil Nadu Coimbatore641114 India
As we know that individuals around the globe work difficult to keep up with this hustling world. In any case, due to this each person is managing with diverse wellbeing issues, one of the foremost known issue is sadne... 详细信息
来源: 评论