咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4691-4700 订阅
排序:
Data-Driven Analysis of Price Change, User Behavior and Wealth Accumulation in Bitcoin Transactions
Data-Driven Analysis of Price Change, User Behavior and Weal...
收藏 引用
2019 Advances in Science and engineering technology International Conferences, ASET 2019
作者: Pavithran, Deepa Al-Karaki, Jamal N. Thomas, Rajesh Shibu, Charles Gawanmeh, Amjad Abu Dhabi Polytechnic MBZ City Abu Dhabi United Arab Emirates Abu Dhabi Men's College Higher Colleges of Technology Abu Dhabi United Arab Emirates KU Center for Cyber-Physical Systems Department of Electrical and Computer Engineering Khalifa University Abu Dhabi United Arab Emirates
Bitcoin scheme powered by the blockchain technology is a global payment system that posed great challenges and opportunities for economists, entrepreneurs and consumers. As Bitcoin is still considered to be mysterious... 详细信息
来源: 评论
Backscatter-Aided Hybrid Data Offloading for Wireless Powered Edge Sensor Networks
Backscatter-Aided Hybrid Data Offloading for Wireless Powere...
收藏 引用
IEEE Global Communications Conference
作者: Yuze Zou Jing Xu Shimin Gong Yuanxiong Guo Dusit Niyato Wenqing Cheng School of Computer Science and Engineering Nanyang Technological University Singapore School of Electronic Information and Communications Huazhong University of Science and Technology China School of Intelligent Systems Engineering Sun Yat-sen University China Department of Information Systems and Cyber Security University of Texas San Antonio USA
In this paper, we consider a backscatter-aided hybrid data offloading scheme for a batteryless wireless sensor network. All sensor devices on the edge are coordinated by a hybrid access point (HAP), while also provide... 详细信息
来源: 评论
Study of CdZnTeSe Gamma-Ray Detector under Various Bias Voltages
收藏 引用
Materials Sciences and Applications 2020年 第8期11卷 553-559页
作者: Mebougna L. Drabo Stephen U. Egarievwe Utpal N. Roy Benicia A. Harrison Carmella A. Goree Emmanuel K. Savage Ralph B. James Department of Mechanical & Civil Engineering and Construction Management Alabama A&M University Huntsville AL USA Nuclear Engineering and Radiological Science Center Alabama A&M University Huntsville AL USA Department of Electrical Engineering and Computer Science Alabama A&M University Huntsville AL USA Department of Nonproliferation and National Security Brookhaven National Laboratory Upton NY USA Science and Technology Directorate Savannah River National Laboratory Aiken SC USA Biological and Environmental Sciences Department Alabama A&M University Huntsville AL USA Department of Physics Chemistry and Mathematics Alabama A&M University Huntsville AL USA
Cadmium zinc telluride selenide (CdZnTeSe) is a new semiconductor material for gamma-ray detection and spectroscopy applications at room temperature. It has very high crystal quality compared to similar materials such... 详细信息
来源: 评论
Facial expression classification using machine learning approach: A review  3rd
Facial expression classification using machine learning appr...
收藏 引用
3rd International Conference on computer and Communication Technologies, IC3T 2016
作者: Baskar, A. Gireesh Kumar, T. Department of Computer Science and Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Amrita University Coimbatore India TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Amrita University Coimbatore India
Automatic Facial Expression analysis has enthralled increasing attention in the research community in excess of two decades and its expedient in many application like, face animation, customer satisfaction studies, hu... 详细信息
来源: 评论
Corrigendum to “A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography” CAEE, Volume 102, September 2022, 108205
收藏 引用
computers and Electrical engineering 2022年 103卷
作者: Manjari Singh Rathore M. Poongodi Praneet Saurabh Umesh Kumar Lilhore Sami Bourouis Wajdi Alhakami Jude Osamor Mounir Hamdi Oriental Institute of Technology Bhopal Madhya Pradesh India Division of Information and Computing Technology College of Science and Engineering Hamad Bin Khalifa University Doha Qatar Mody University of Science and Technology Lakshmangarh Rajasthan India KIET Group of Institutions Delhi-NCR Ghaziabad Uttar Pradesh India Department of Information Technology College of Computers and Information Technology Taif University P.O. Box 11099 Taif 21944 Saudi Arabia Department of Cyber Security and Networks Glasgow Caledonian University Cowcaddens Road Glasgow Scotland G4 0BA United Kingdom
来源: 评论
Transportation,germs,culture:a dynamic graph model of COVID-19 outbreak
收藏 引用
Quantitative Biology 2020年 第3期8卷 238-244页
作者: Xiaofei Yang Tun Xu Peng Jia Han Xia Li Guo Lei Zhang Kai Ye School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China Hugobiotech Co. Ltd.Beijing 102600China The School of Life Science and Technology Xi'an Jiaotong UniversityXi'an 710049China China-Australia Joint Research Center for Infectious Diseases School of Public HealthXi'an Jiaotong University Health Science CenterXi'an 710061China Melbourne Sexual Health Centre Alfred HealthMelbourneVIC 3004Australia Central Clinical School Faculty of MedicineNursing and Health SciencesMonash UniversityMelbourneVIC 3004Australia Department of Epidemiology and Biostatistics College of Public HealthZhengzhou UniversityZhengzhou 450001China Genome Institute the First Affiliated Hospital of Xi'an Jiaotong UniversityXi'an 710061China
Backgrounds Various models have been applied to predict the trend of the epidemic since the outbreak of ***:In this study,we designed a dynamic graph model,not for precisely predicting the number of infected cases,but... 详细信息
来源: 评论
SELWasm: A Code Protection Mechanism for WebAssembly
SELWasm: A Code Protection Mechanism for WebAssembly
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Jian Sun DingYuan Cao XiMing Liu ZiYi Zhao WenWen Wang XiaoLi Gong Jin Zhang College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Department of Computer Science University of Georgia Athens GA USA Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
WebAssembly is a novel front-end programming technology that has been wildly supported by most web browsers. The high-level language can be compiled into WebAssembly binary code, and executed by the browser at almost ... 详细信息
来源: 评论
Flank wear detection with signal variational mode decomposition and support vector machine algorithm
收藏 引用
AIP Conference Proceedings 2024年 第1期3069卷
作者: Achmad Zaki Rahman Khairul Jauhari Mahfudz Al Huda Muizuddin Azka Nimas Ayu Untariyati Juliansyah Rusnaldy Achmad Widodo Department of Mechanical Engineering Diponegoro University Tembalang Semarang 50275 Indonesia Laboratory for Machine Tool Production and Automation National Research and Innovation Agency (BRIN) Puspiptek South of Tangerang 15314 Indonesia Research Center for Structural Strength Technology Research Organization for Energy and Manufacture National Research and Innovation Agency (BRIN) Puspiptek South of Tangerang 15314 Indonesia Research Center for Process and Manufacturing Industry Technology Research Organization for Energy and Manufacture National Research and Innovation Agency (BRIN) Puspiptek South of Tangerang 15314 Indonesia Research Center for Artificial Intelligence and Cyber Security Research Organization for Electronics and Informatics National Research and Innovation Agency (BRIN) Puspiptek South of Tangerang 15314 Indonesia
Milling is one type of cutting process that is most often used in the manufacturing industry. Flank wear is a wear phenomenon on the cutter that usually occurs in milling. This wear can affect the accuracy of the prod...
来源: 评论
Non-orthogonal multiple access for visible light communications with ambient light and user mobility
arXiv
收藏 引用
arXiv 2019年
作者: Mitra, Rangeet Sofotasios, Paschalis C. Bhatia, Vimal Muhaidat, Sami Indian Institute of Information Technology SriCity517646 India Center for Cyber-Physical Systems Department of Electrical Engineering and Computer Science Khalifa University of Science and Technology PO Box 127788 Abu Dhabi United Arab Emirates Department of Electrical Engineering Tampere University Tampere33101 Finland Department of Electrical Engineering Indian Institute of Technology Indore Indore453441 India Center for Cyber-Physical Systems Department of Electrical Engineering and Computer Science Khalifa University of Science and Technology PO Box 127788 Abu Dhabi United Arab Emirates
The ever-increasing demand for high data-rate applications and the proliferation of connected devices pose several theoretical and technological challenges for the fifth generation (5G) networks and beyond. Among othe... 详细信息
来源: 评论
A review of uncertainty quantification in deep learning: Techniques, applications and challenges
arXiv
收藏 引用
arXiv 2020年
作者: Abdar, Moloud Pourpanah, Farhad Hussain, Sadiq Rezazadegan, Dana Liu, Li Ghavamzadeh, Mohammad Fieguth, Paul Cao, Xiaochun Khosravi, Abbas Rajendra Acharya, U. Makarenkov, Vladimir Nahavandi, Saeid Deakin University Australia College of Mathematics and Statistics Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Shenzhen518060 China Dibrugarh University Dibrugarh India Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland Google research United States Department of Systems Design Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Electronics and Computer Engineering Ngee Ann Polytechnic Clementi Singapore Department of Computer Science University of Quebec in Montreal MontrealQC Canada
—Uncertainty quantification (UQ) plays a pivotal role in the reduction of uncertainties during both optimization and decision making, applied to solve a variety of real-world applications in science and engineering. ... 详细信息
来源: 评论