咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是531-540 订阅
排序:
A Reinforcement Learning Approach for Minimizing Job Completion Time in Clustered Federated Learning  42
A Reinforcement Learning Approach for Minimizing Job Complet...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Zhou, Ruiting Yu, Jieling Wang, Ruobei Li, Bo Jiang, Jiacheng Wu, Libing Wuhan University School of Cyber Science and Engineering China Southeast University School of Computer Science Engineering China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Federated Learning (FL) enables potentially a large number of clients to collaboratively train a global model with the coordination of a central cloud server without exposing client raw data. However, the FL model con... 详细信息
来源: 评论
An Improved Wildfire Identification Method Based on Yolov7 and Attention Mechanism  3
An Improved Wildfire Identification Method Based on Yolov7 a...
收藏 引用
3rd International Conference on Artificial Intelligence, Virtual Reality, and Visualization, AIVRV 2023
作者: Yang, Qiang Yu, Fan Zhang, Gexiang Jin, Xiaozhao Guo, Dequan Wang, Ping Yao, Guangle Liang, Kai College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China School of Automation Chengdu University of Information Technology Chengdu China School of Network & Communication Engineering Chengdu Technological University Chengdu China
Wildfires, also called forest fires, are a common natural disaster that often occur in forests and are difficult to control. Detecting and suppressing them at an early stage, primarily through monitoring smoke and fir... 详细信息
来源: 评论
Machine-Learning-Based Spam Mail Detector
收藏 引用
SN computer Science 2023年 第6期4卷 858页
作者: Charanarur, Panem Jain, Harsh Rao, G. Srinivasa Samanta, Debabrata Sengar, Sandeep Singh Hewage, Chaminda Thushara Department of Cyber Security and Digital Forensics National Forensic Sciences University Tripura campus Tripura Agartala India School of Cyber Security and Digital Forensics Goa Ponda India Department of Computer Science Government Degree College Sitaphalmandi Hyderabad India Department of Computing and Information Technologies Rochester Institute of Technology Kosovo Germia Campus Prishtina Kosovo 10000 Department of Computer Science Cardiff Metropolitan University Cardiff CF5 2YB United Kingdom
The proliferation of spam emails, a predominant form of online harassment, has elevated the significance of email in daily life. As a consequence, a substantial portion of individuals remain vulnerable to fraudulent a... 详细信息
来源: 评论
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
收藏 引用
computer Modeling in engineering & Sciences 2023年 第10期137卷 813-825页
作者: Shayla Islam Anil Kumar Budati Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah Institute of Computer Science&Digital Innovation ICSDIUCSI UniversityKuala Lumpur56000Malaysia Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Selangor43600Malaysia School of Engineering Computing and InformaticsDar Al-Hekma UniversityJeddah22246Saudi Arabia
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... 详细信息
来源: 评论
Tjong:A transformer‐based Mahjong AI via hierarchical decision‐making and fan backward
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 982-995页
作者: Xiali Li Bo Liu Zhi Wei Zhaoqi Wang Licheng Wu School of Information and Engineering Minzu University of ChinaBeijingChina Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance of MOE Minzu University of ChinaBeijingChina Department of Computer Science New Jersey Institute of TechnologyNewarkNew JerseyUSA
Mahjong,a complex game with hidden information and sparse rewards,poses significant *** Mahjong AIs require substantial hardware resources and extensive datasets to enhance AI *** authors propose a transformer‐based ... 详细信息
来源: 评论
Frequency Attention Module for Speaker Recognition  5
Frequency Attention Module for Speaker Recognition
收藏 引用
5th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2022
作者: Wu, Yujiao Fang, Zulin Dong, Jianping Zhang, Gexiang Chengdu University of Technology College of Computer Science and Cyber Security Chengdu China Chengdu University of Technology School of Nuclear Technology and Automation Engineering Chengdu China
Speaker recognition is a task of identifying user's individuality from their speech utterances. Most of the text-independent speaker recognition models available directly input the spectrogram into the deep neural... 详细信息
来源: 评论
Traceable Attribute-Based Keyword Search Scheme for Distributed Data Storage under Fog Computing-Based Social Internet of Vehicles
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Gu, Ke Qiu, Juan Peng, Xin Li, Xiong Changsha University of Science and Technology School of Computer and Communication Engineering Changsha410114 China University of Electronic Science and Technology of China Institute for Cyber Security School of Computer Science and Engineering Chengdu611731 China
In Social Internet of Vehicles (SIoVs), vehicles frequently need to obtain their required data, thus many secure data acquisition schemes were proposed in cloud computing-based SIoVs. However, the distributed data sto... 详细信息
来源: 评论
An Efficient Intrusion Detection Framework for Industrial Internet of Things security
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 819-834页
作者: Samah Alshathri Ayman El-Sayed Walid El-Shafai Ezz El-Din Hemdan Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Recently,the Internet of Things(IoT)has been used in various applications such as manufacturing,transportation,agriculture,and healthcare that can enhance efficiency and productivity via an intelligent management cons... 详细信息
来源: 评论
Design and Implementation of a BERT Based Weibo Public Opinion Monitoring System  14th
Design and Implementation of a BERT Based Weibo Public Opini...
收藏 引用
14th International Conference on computer engineering and Networks, CENet 2024
作者: Chen, Shun-Chao Zhu, Tao Pang, Zi-An Xu, Chen Department of Computer Information and Cyber Security Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Jiangsu Police Institute Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Province NAN Jing 210031 China
With the rapid development of online We Media, it is not easy to monitor and guide massive public opinion information. The massive forwarding, emotional polarization, and mixed rumors of blog posts are highly likely t... 详细信息
来源: 评论
cybersecurity Revolution via Large Language Models and Explainable AI  17
Cybersecurity Revolution via Large Language Models and Expla...
收藏 引用
17th International Conference on security of Information and Networks, SIN 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Ihsan, Anuam Al-Dmour, Nidal A. College of Arts & Science Applied Science University Manama Bahrain Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of College of Engineering Mutah University Department of Computer Engineering Jordan
Integrating Groundbreaking advancements in AI, like language models, interpretable AI, and machine learning, opens up a world of exciting new possibilities. The Evolving face of cybersecurity and Modern cyber threats ... 详细信息
来源: 评论