咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是481-490 订阅
排序:
Compact Physical and Electrical Patch Antenna Engineered for 5G Mobile Devices and Multiband Systems
收藏 引用
Progress in Electromagnetics Research B 2025年 111卷 71-81页
作者: Jemaludin, Nazrin Haziq Al-Gburi, Ahmed Jamal Abdullah Abdulhameed, Muhannad K. Hashim, Sarah R. Mohammed, Dunya Zeki Saeidi, Tale Gupta, Anupma Zakaria, Zahriladha Nurhayati, Nurhayati Elabd, Rania Hamdy Jalan Hang Tuah Jaya Durian Tunggal Melaka76100 Malaysia Computer Scince Department University of Kerbala Karbala Iraq Air Conditioning Engineering Department Faculty of Engineering Warith Al-Anbiyaa University Iraq Department of Cyber Security Al-Zahraa University for Women Karbala Iraq Department of Electronic and Communications Engineering Gilgamesh University Baghdad Iraq Co. Donegal LetterkennyF92 FC93 Ireland Department of Electronics and Communication Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Thandalam Tamilnadu Chennai602105 India Department of Electrical Engineering Universitas Negeri Surabaya Surabaya60231 Indonesia Department Electronic and Communication Higher Institute of Engineering and Technology in New Damietta Damietta Egypt
This article presents a compact multi-band microstrip patch antenna designed for 5G, Ku, and K-band applications. The antenna operates at 3.5 GHz and 15.6 GHz, supporting 5G communications (3.3–3.6 GHz) and satellite... 详细信息
来源: 评论
Multi-residual generative adversarial networks for QR code Deblurring
Multi-residual generative adversarial networks for QR code D...
收藏 引用
2022 International Conference on Electronic Information technology, EIT 2022
作者: Wang, Mingyue Chen, Kecheng Lin, Fanqiang College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Motion blur and ambient noise are the main reasons that affect quick response (QR) code recognition. In this paper, we propose a novel deep learning approach to deblur the QR codes and realize the effective recognitio... 详细信息
来源: 评论
Blockchain-based, Decentralized Evidence Archive System using IPFS
Blockchain-based, Decentralized Evidence Archive System usin...
收藏 引用
2022 International Conference on Sustainable Computing and Data Communication Systems, ICSCDS 2022
作者: Dave, Maharshi Banoth, Rajkumar Marwadi University Department of Cyber Security Gujarat Rajkot India Marwadi University Department of Computer Engineering Gujarat Rajkot India
In spite of growth in technology, Indian Judiciary system somehow lacks digitalization. In the court trials cases, every argument by the lawyers, evidence presentation, witness/suspect cross examination everything wil... 详细信息
来源: 评论
Enhanced Brain Stroke Prediction: An Ensemble of Random Forest, Logistic Regression and XGBoost  2
Enhanced Brain Stroke Prediction: An Ensemble of Random Fore...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational Science, ICERCS 2024
作者: Sundaram, Karthic Lanitha, B. Kamaraj, K. Ramamoorthy, Arun Kumar KPR Institute of Engineering and Technology Department of Information Technology Coimbatore India Karpagam Academy of Higher Education Department of Artificial Intelligence and Data Science Coimbatore India University of South Wales Digital Forensics and Cyber Security Treforest United Kingdom
Stroke, a leading cause of disability and mortality globally, necessitates early prediction and intervention to mitigate its devastating effects. Recognizing the challenges faced by stroke survivors, the focus shifts ... 详细信息
来源: 评论
Enhancing Skin Cancer Diagnosis with Deep Learning:A Hybrid CNN-RNN Approach
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1497-1519页
作者: Syeda Shamaila Zareen Guangmin Sun Mahwish Kundi Syed Furqan Qadri Salman Qadri Faculty of Information Technology Beijing University of TechnologyBeijing100124China Computer Science International Engineering Collage Maynooth UniversityKildareW23 F2H6Irland Research Center for Data Hub and Security Zhejiang LabHangzhou311121China Computer Science Department MNS University of AgricultureMultan59220Pakistan
Skin cancer diagnosis is difficult due to lesion presentation variability. Conventionalmethods struggle to manuallyextract features and capture lesions spatial and temporal variations. This study introduces a deep lea... 详细信息
来源: 评论
VQR: vulnerability analysis in quadratic residues-based authentication protocols
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第6期14卷 7559-7574页
作者: Ghahramani, Meysam HaddadPajouh, Hamed Javidan, Reza Kumari, Saru Computer Engineering and IT Department Shiraz University of Technology Shiraz Iran Cyber Science Lab School of Computer Science University of Guelph 50 Stone Rd E GuelphON Canada Department of Mathematics Ch. Charan Singh University Uttar Pradesh Meerut India
Ensuring security and respect for users’ privacy, especially in electronic health-care systems, is an important task that is achievable by authentication protocols. The security of many protocols is based on public-k... 详细信息
来源: 评论
Detection of DDoS attacks in SDN using Machine Learning
Detection of DDoS attacks in SDN using Machine Learning
收藏 引用
2022 International Conference on Electronics and Renewable Systems, ICEARS 2022
作者: Ashodia, Namita Makadiya, Kishan Marwadi University Department of Cyber Security Gujarat Rajkot India Marwadi University Department of Computer Engineering Gujarat Rajkot India
With the growth in network industry, traditional network is being replaced with Software Defined Network. SDN is growing technology, which provides the control of network communication flexible. SDN decouples into thr... 详细信息
来源: 评论
AGIR: Automating cyber Threat Intelligence Reporting with Natural Language Generation
AGIR: Automating Cyber Threat Intelligence Reporting with Na...
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Perrina, Filippo Marchiori, Francesco Conti, Mauro Verde, Nino Vincenzo University of Padova Department of Mathematics Padua Italy Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft Netherlands Leonardo Cyber&Security Leonardo S.p.A. Rome Italy
cyber Threat Intelligence (CTI) reporting is pivotal in contemporary risk management strategies. As the volume of CTI reports continues to surge, the demand for automated tools to streamline report generation becomes ... 详细信息
来源: 评论
Blockchain-Based Framework for Stock Market Operations: IPOs, Trading, and Dividend Distribution  15
Blockchain-Based Framework for Stock Market Operations: IPOs...
收藏 引用
15th IEEE International Conference on Cloud Computing technology and Science, CloudCom 2024
作者: Sharshar, Muhammad Elzeky, Kareem Othman, Menna Khaled, SeifAldin Moubarak, Hosam Gomaa, Walid Department of Computer Science United Arab Emirates Mbzuai Department of Natural Language Processing United Arab Emirates Egypt-Japan University of Science and Technology Cyber-Physical Lab Department of Computer Engineering Egypt Egypt-Japan University of Science and Technology Accounting Department Egypt
This study examines blockchain technology's potential to enhance the stock market by offering a decentralized alternative to the traditional system. The study explores the challenges of the current traditional sto... 详细信息
来源: 评论
ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via Contrastive Learning  4
ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via C...
收藏 引用
4th Asia Service Sciences and Software engineering Conference, ASSE 2023
作者: Wu, Jiajing Liu, Jieli Chen, Jinze Chen, Ting Li, Jingwei Song, Shuwei He, Jiahao School of Software Engineering Sun Yat-sen University China School of Computer Science and Engineering Sun Yat-sen University China School of Cyber Security University of Electronic Science and Technology of China China
In recent years, blockchain technology has witnessed rapid development and received considerable attention. However, its decentralized and pseudonymous nature has also attracted many criminal activities. Among them, P... 详细信息
来源: 评论