咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是541-550 订阅
排序:
A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor
收藏 引用
Journal of computer Science & technology 2021年 第5期36卷 1022-1036页
作者: Lu-Tan Zhao Rui Hou Kai Wang Yu-Lan Su Pei-Nan Li Dan Meng State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100093China Department of Computer Science and Technology Harbin Institute of TechnologyHarbin 150001China
In a modern processor,branch prediction is crucial in effectively exploiting the instruction-level parallelism for high-performance ***,recently exposed vulnerabilities reveal the urgency to improve the security of br... 详细信息
来源: 评论
A Review of Privacy-Preserving Authentication Schemes for Future Internet of Vehicles  12
A Review of Privacy-Preserving Authentication Schemes for Fu...
收藏 引用
12th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2023
作者: Chavali, Sruthi Cheema, Hashim Delgado, Ruth Nolan, Emily Ibrahem, Mohamed I. Fouda, Mostafa M. George Mason University Department of Cyber Security Engineering VA Fairfax United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States Faculty of Engineering at Shoubra Benha University Department of Electrical Engineering Cairo11672 Egypt
The Vehicle to Grid (V2G) network relationship is complex and contradictory in nature. For the grid to authenticate electric vehicles (EVs) and allow them to enter safely, they need a certain set of information that i... 详细信息
来源: 评论
Statistical Approach of Big Data Analytics in Health care
Statistical Approach of Big Data Analytics in Health care
收藏 引用
Advancements in Smart, Secure and Intelligent Computing (ASSIC), International Conference on
作者: Deepak P B. Sanjai Prasada Rao M SilpaRaj DBK Kamesh Balaram Allam Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Department of Computer Science and Engineering (Cyber Security) CVR College of Engineering Hyderabad Department of CSE Malla Reddy Engineering College for Women Maisammaguda
Scientific statistics systems, virtual scientific records, wearables, smart devices, and handhelds have altered healthcare. Academics and practitioners can extract and visualise clinical vast data in creative ways usi...
来源: 评论
Influence of Access Points’ Height and High Signal Relation in WLAN Fingerprinting-Based Indoor Positioning Systems’ Accuracy  1
收藏 引用
26th International Conference on Distributed computer and Communication Networks: Control, Computation, Communications, DCCN 2023
作者: Nicholaus, Mrindoko R. Ruambo, Francis A. Masanga, Elijah E. Muthanna, Mohammed Saleh Ali Lashchev, Andrei Computer Science and Engineering Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of Information Systems and Technology Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Research and Development Department Aifrruis Laboratories Mbeya Tanzania United Republic of Institute of Computer Technologies and Information Security Southern Federal University Taganrog347922 Russia
Wireless Local Area Network (WLAN) Fingerprinting-based Indoor Positioning Systems (IPS) offer several key advantages over other indoor positioning technologies, including cost-effectiveness with high accuracy and pas... 详细信息
来源: 评论
Empowering cyber Defense by Unveiling AI-Powered Expert Systems and Software engineering  2
Empowering Cyber Defense by Unveiling AI-Powered Expert Syst...
收藏 引用
2nd International Conference on Foundation and Large Language Models, FLLM 2024
作者: Tawalbeh, Lo'Ai Franklin, John Ramirez, Christian Garcia, Jonathan Tawalbeh, Abdelrahman Muheidat, Fadi Jordan University of Science and Technology Department of Computer Engineering Irbid22110 Jordan Texas A&M University Department of Computing and Cyber Security San AntonioTX78224 United States Johnson High School San AntonioTX78259 United States School of Computer Science and Engineering California State University San BernardinoCA92407 United States
People all over the world are subject to cyber-attacks. The abundance of information on the internet gives hackers the tools to exploit vulnerabilities in computer systems, from home desktops to the most considerable ... 详细信息
来源: 评论
A Unified Deep Learning Approach for Integrating Retinal Image Diagnosis and Surgical Tool Classification  1
A Unified Deep Learning Approach for Integrating Retinal Ima...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Jesica, J. Anitha, J. Sujitha Juliet, D. Belfin, R.V. Karunya Institute of Technology and Sciences Dept. of Data Science and Cyber Security Coimbatore India Karunya Institute of Technology and Sciences Dept. of Computer Science and Engineering Coimbatore India University of North Carolina Dept. of Neurology Chapel Hill United States
Early and accurate diagnosis by using retinal image processing is critical for enabling optimized patient care. Existing techniques for the diagnosis in medical image processing often face limitations. This research s... 详细信息
来源: 评论
Secure and Transparent Smart Agriculture: Integrating Blockchain technology with IoT for Enhanced Data Integrity and Efficiency in Agricultural System
Secure and Transparent Smart Agriculture: Integrating Blockc...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Muruganantham U Chandini P Palanivel N Gubbala Lakshmi Balaji G Sri Kamesh M Sivasanker S Department of CSE (Internet of Things and Cyber Security Including Blockchain Technology) Manakula Vinayagar Institute of Technology Puducherry India Department of Computer Science and Engineering RAAK College of Engineering and Technology Puducherry India
A viable strategy for improving the integrity of information, safety, and operational effectiveness in contemporary agricultural systems is the combination of blockchain-based technology and the Internet of Things. To... 详细信息
来源: 评论
Advantages of Redis in-memory database to efficiently search for healthcare medical supplies using geospatial data  16
Advantages of Redis in-memory database to efficiently search...
收藏 引用
16th IEEE International Conference on Application of Information and Communication Technologies, AICT 2022
作者: Muradova, Gulara Hematyar, Mehran Jamalova, Jala Azerbaijan Technical University Department of Computer Technologies and Cyber Security Baku Azerbaijan Azerbaijan State Oil and Industry University Department of Computer Engineering Baku Azerbaijan
According to diagnostic criteria, a patient can find clinics he needs depending on the symptoms of disease. The paper shows an effective solution that allows rapid access to information about clinic using Redis in mem... 详细信息
来源: 评论
FedProphet: Memory-Efficient Federated Adversarial Training via Theoretic-Robustness and Low-Inconsistency Cascade Learning
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Minxue Wang, Yitu Zhang, Jingyang DiValentin, Louis Ding, Aolin Hass, Amin Chen, Yiran Li, Hai Helen Department of Electrical and Computer Engineering Duke University United States Cyber Security Lab Accenture
Federated Learning (FL) provides a strong privacy guarantee by enabling local training across edge devices without training data sharing, and Federated Adversarial Training (FAT) further enhances the robustness agains... 详细信息
来源: 评论
Secure Access Control Schemes for Cloud-Based Networks  15
Secure Access Control Schemes for Cloud-Based Networks
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Sreeramulu, Madhusudhan Dasari Gopal, Santhosh Kumar Mohammed, Abdul Sajid Sathish Kumar, D. American Express Dept of Cyber Security United States Technology Lead CharlotteNC United States University of the Cumberlands Dept of School of Computer and Information Sciences KY United States Sri Eshwar College of Engineering Department of ECE Tamil Nadu Coimbatore641202 India
This abstract provides a state-of-the-art review of secure access control schemes for cloud networks. The rise of cloud computing and the security of the cloud have increased the need for robust access control for sec... 详细信息
来源: 评论