咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是501-510 订阅
排序:
Fractional Fourier Transform-Based OFDM System with low complexity equalizer for Underwater Acoustic Communications  25
Fractional Fourier Transform-Based OFDM System with low comp...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Attar, Hani Ababneh, Jafar Rachini, Ali Bahy, Ramy M. Hafez, Mohamed Solyman, Ahmed Zarqa University Faculty of Engineering Zarqa Jordan Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Department of Computer Science and Information Technology Jounieh Lebanon Technical Research Center Cairo Egypt Feqs INTI-IU-University Faculty of Engineering Nilai Malaysia Glasgow Caledonian University School of Computing Engineering and Built Environment Glasgow United Kingdom
Underwater communication systems have garnered significant interest due to the limitations of the wireless spectrum and the growing need for sustained, covert communication capabilities. However, existing systems face... 详细信息
来源: 评论
Petroleum Drilling Monitoring and Optimization: Ranking the Rate of Penetration Using Machine Learning Algorithms
Petroleum Drilling Monitoring and Optimization: Ranking the ...
收藏 引用
作者: Acheme, Ijegwa David Nwankwo, Wilson Olayinka, Akinola S. Makinde, Ayodeji S. Nwankwo, Chukwuemeka P. Department of Computer Science Edo State University Uzairue Nigeria Department of Physics Edo State University Uzairue Nigeria Department of Cyber Security Delta State University of Science and Technology Ozoro Nigeria
Oil prospection and exploration is a major economic venture requiring enormous expertise and technologies in developing countries. In this study, we set out to examine an important issue that affects the efficiency of... 详细信息
来源: 评论
Educational FinTech: Promoting Stakeholder Confidence Through Automatic Incidence Resolution
Educational FinTech: Promoting Stakeholder Confidence Throug...
收藏 引用
作者: Nwankwo, Wilson Chinedu, Paschal U. Daniel, Aliu Shaba, Saliu Mohammed Muyideen, Momoh Omuya Nwankwo, Chukwuemeka P. Adigwe, Wilfred Oghoriodo, Duke Uwadia, Francis Department of Computer Science Edo State University Uzairue Uzairue Nigeria Department of Computer Engineering Edo State University Uzairue Uzairue Nigeria Federal College of Freshwater Fisheries Technology New Bussa Nigeria Faculty of Air Engineering Air Force Institute of Technology Kaduna Kaduna Nigeria Department of Computer Science Delta University of Science and Technology Ozoro Nigeria Department of Cyber Security Delta University of Science and Technology Ozoro Nigeria
Though FinTech solutions have the potentials to increase efficiency and convenience with education-related payments and remittances in developing countries, it is noted that tens of thousands of stakeholders are still... 详细信息
来源: 评论
Gate-Attention and Dual-End Enhancement Mechanism for Multi-Label Text Classification
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 1779-1793页
作者: Jieren Cheng Xiaolong Chen Wenghang Xu Shuai Hua Zhu Tang Victor S.Sheng School of Computer Science and Technology Hainan UniversityHaikou570228China Hainan Blockchain Technology Engineering Research Center Hainan UniversityHaikou570228China School of Cyberspace Security Hainan UniversityHaikou570228China Department of Computer Science Texas Tech UniversityLubbock79409USA
In the realm of Multi-Label Text Classification(MLTC),the dual challenges of extracting rich semantic features from text and discerning inter-label relationships have spurred innovative *** studies in semantic feature... 详细信息
来源: 评论
PRESS: Defending Privacy in Retrieval-Augmented Generation via Embedding Space Shifting
PRESS: Defending Privacy in Retrieval-Augmented Generation v...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: He, Jiaming Liu, Cheng Hou, Guanyu Jiang, Wenbo Li, Jiachen School of Computer Science and Engineering University of Electronic Science and Technology of China China College of Computer Science and Cyber Security Oxford Brookes College Chengdu University of Technology China School of Data Science The Chinese University of Hong Kong Shenzhen China School of Computer Science and Artificial Intelligence Wuhan University of Technology China
Retrieval-augmented generation (RAG) expands the capabilities of large language models (LLMs) in various applications by integrating relevant information retrieved from external data sources. However, the RAG systems ...
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi'an Jiaotong University Xi'an China Air Traffic Control and Navigation College Air Force Engineering University Xi'an China Information and Navigation College Air Force Engineering University Xi'an China School of Electrical and Electronic Engineering Nanyang Technological University Singapore School of Computer Science and Technology Xidian University Xi'an China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
JANE: Joint Angle Networks Assisting 3D Human Pose Estimation
JANE: Joint Angle Networks Assisting 3D Human Pose Estimatio...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Jinhuan Zhao, Yuzhen Song, Xujie Chen, Wenzhou Xuan, Qi Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology HangZhou China Department of Computer Science and Technology Hangzhou Dianzi University HangZhou China
3D human pose estimation (HPE) is crucial due to its extensive applications. While current 3D HPE methods focus on human skeleton topology for accuracy, they often overlook joint angle information, which is vital in 2... 详细信息
来源: 评论
Fake Currency Note Recognition using Extreme Learning Machine  2
Fake Currency Note Recognition using Extreme Learning Machin...
收藏 引用
2nd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2023
作者: Kumar, Rajeev Lamba, Anil Kumar Mohammed, Sayed Asokan, Anju Aswal, Upendra Singh Kolavennu, Subbarao Gopal Narayan Singh University Faculty of Information Technology Bihar Jamuhar India Psna College of Engineering and Technology Ece Tamilnadu Dindigul India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India School of Computer Science and Engineering Geeta University Delhi India Sri Eshwar College of Engineering Kinathukadavu Department of Computer and Communication Engineering Tamilnadu Coimbatore India Sphoorthy Engineering College Cse Cyber Security Department Telangana Hyderabad India
Color printing technology has made it simpler for forgers to make and copy large numbers of fake currency. The production of legible banknotes was once the sole purview of print shops, but today even a novice printer ... 详细信息
来源: 评论
Intelligent wearable vision systems for the visually impaired in Saudi Arabia
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8571-8591页
作者: Talaat, Fatma M. El-Shafai, Walid Soliman, Naglaa F. Algarni, Abeer D. El-Samie, Fathi E. Abd Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Faculty of Computer Science and Engineering New Mansoura University Gamasa35712 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Navigating the world with visual impairments presents unique challenges, often limiting independence and safety. This research introduces SafeStride, a novel algorithm designed to empower visually impaired individuals... 详细信息
来源: 评论
An Effective Lung Cancer Diagnosis Model Using Pre-Trained CNNs
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 1129-1155页
作者: Majdi Rawashdeh Muath A.Obaidat Meryem Abouali Dhia Eddine Salhi Kutub Thakur Department of Business Information Technology Princess Sumaya University for TechnologyAmman11941Jordan Department of Computer Engineering Al Yamamah UniversityRiyadh11512Saudi Arabia Department of Computer Science John Jay College and the Graduate CenterThe City University of New YorkNew YorkNY 10019USA Department of Computer Science John Jay College at the City University of NewYorkNewYorkNY 10019USA LIMOSE Laboratory Department of Computer ScienceM’hamed Bougara UniversityBoumerdes35000Algeria Department of Professional Security Studies New Jersey City UniversityJersey CityNJ 07305USA
Cancer is a formidable andmultifaceted disease driven by genetic aberrations and metabolic *** 19% of cancer-related deaths worldwide are attributable to lung and colon cancer,which is also the top cause of death *** ... 详细信息
来源: 评论