咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是551-560 订阅
排序:
Geneto-Neuro-Fuzzy Solution for Detection of Early Prostate Cancer  10
Geneto-Neuro-Fuzzy Solution for Detection of Early Prostate ...
收藏 引用
10th International Conference on Signal Processing and Communication, ICSC 2025
作者: Oghorodi, Duke Kingsley, Igulu Singh, Thipendra P Atajeromavwo, Edafe J. Nwankwo, Wilson Delta State University of Science & Technology Department of Comp. Sc. Ozoro Nigeria Kenule Beeson Saro-Wiwa Polytechnic Bori Department of Computer Science Bori Nigeria School of Computer Science Engineering & Technology Bennett University Greater Noida India Delta State University of Science & Technology Department of Cyber Security Ozoro Nigeria
This study presents a novel hybrid diagnostic model for early-stage prostate cancer, integrating genetic algorithms, neuro-fuzzy logic, and mobile agent technology. By optimizing the selection of key genetic markers, ... 详细信息
来源: 评论
A divide-and-conquer reconstruction method for defending against adversarial example attacks
收藏 引用
Visual Intelligence 2024年 第1期2卷 1-17页
作者: Liu, Xiyao Hu, Jiaxin Yang, Qingying Jiang, Ming He, Jianbiao Fang, Hui School of Computer Science and Engineering Central South University Hunan Changsha 410083 China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Guilin China Department of Computer Science Loughborough University Loughborough LE113TU United Kingdom
In recent years, defending against adversarial examples has gained significant importance, leading to a growing body of research in this area. Among these studies, pre-processing defense approaches have emerged as a p... 详细信息
来源: 评论
ESP32-based Multi-User Secret Key Generation System  8
ESP32-based Multi-User Secret Key Generation System
收藏 引用
8th International Conference on Signal and Image Processing, ICSIP 2023
作者: Li, Dongyang Peng, Linning Fu, Hua Wang, Fengsheng Tian, Ye He, Shen Southeast University School of Cyber Science and Engineering Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Research Institute of China Mobile Communications Corporation Department of Security Technology Beijing China
This paper proposes a multi-user secret key generation system using off-the-shelf ESP32 modules. We first propose a new differential quantization algorithm and contrast the features of differential quantization with u... 详细信息
来源: 评论
A Highly Robust Secret Key Reconcile System Based on Cyclic Shift Buffer and HARQ Mechanism  8
A Highly Robust Secret Key Reconcile System Based on Cyclic ...
收藏 引用
8th International Conference on Signal and Image Processing, ICSIP 2023
作者: Han, Haojie Peng, Linning Fu, Hua Cheng, Yexia Tian, Ye He, Shen Southeast University School of Cyber Science and Engineering Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Research Institute of China Mobile Communications Corporation Department of Security Technology Beijing China
Secret keys generated from wireless channel can provide high level of security. The error correction code (ECC) based information reconciliation method owns the benefits of high security and efficiency. In this paper,... 详细信息
来源: 评论
Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps:An Ultra-Wide Range Dynamics for Image Encryption
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2161-2188页
作者: De Rosal Ignatius Moses Setiadi T.Sutojo Supriadi Rustad Muhamad Akrom Sudipta Kr Ghosal Minh T.Nguyen Arnold Adimabua Ojugo Research Center for Quantum Computing and Materials Informatics Faculty of Computer ScienceDian Nuswantoro UniversitySemarang50131Indonesia Department of Cyber Forensics and Information Security Behala Government Polytechnic756Upendra Nath Banerjee RoadParnasreeBehalaKolkata700060India Thai Nguyen University of Technology Thai Nguyen UniversityThai Nguyen240000Vietnam Department of Computer Science Federal University of Petroleum ResourcesEffurun330102Nigeria
Data security has become a growing priority due to the increasing frequency of cyber-attacks,necessitating the development of more advanced encryption *** paper introduces Single Qubit Quantum Logistic-Sine XYZ-Rotati... 详细信息
来源: 评论
Classification of Sleep-Related Disorders Using Machine Learning Techniques  25
Classification of Sleep-Related Disorders Using Machine Lear...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Nasir, Ola Alazaidah, Raed Al-Safarini, Maram Y. Alamleh, Amneh Zaid, Ali Abu Mansur, Hasan Elrashidi, Ali Alzoubi, Haneen Bani-Bakr, Alaa Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan American University of Madaba Faculty of Business Department of Accounting Madaba Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Private University Faculty of It Applied Science Department of Computer Science Amman Jordan
Several people suffer from irregular sleep patterns, a problem that negatively affects their daily lives. It presents a multitude of challenges, including daytime distress, disturbances in sleep-wake patterns, feeling... 详细信息
来源: 评论
A Review of Lightweight security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
An Authentication Model Using Brainwave Panic Region Classifications from Electroencephalography  7th
An Authentication Model Using Brainwave Panic Region Classif...
收藏 引用
7th International Conference on Communication, Device and Networking, ICCDN 2024
作者: Abiodun, Opeyemi Anuoluwa Oyinloye, Oghenerukevwe E. Thompson, Aderonke F. Olowoyo, Paul Imoize, Agbotiname Lucky Sur, Samarendra Nath Computer Science Department The Federal Polytechnic Ekiti State Ado-Ekiti360211 Nigeria Computer Science Department Ekiti State University Ekiti State Ado-Ekiti360211 Nigeria Cyber Security Department Federal University of Technology Ondo State Akure350106 Nigeria Federal Teaching Hospital Ekiti State Ido-Ekiti Nigeria Department of Electrical and Electronics Engineering Faculty of Engineering University of Lagos Akoka Lagos 100213 Nigeria Department of Electronics and Communication Engineering Sikkim Manipal Institute of Technology Sikkim Manipal University Sikkim India
Biometric authentication scheme has been widely adopted for authentication purpose due to its uniqueness, universality, and distinctiveness. However, research has shown that these schemes are not necessarily more secu... 详细信息
来源: 评论
Improved On-Device Hyperdimensional-Computing-based Image Segmentation  3
Improved On-Device Hyperdimensional-Computing-based Image Se...
收藏 引用
3rd IEEE International Conference on Intelligent technology and Embedded Systems, ICITES 2023
作者: Zhou, Xinran Lu, Huayue College of Computer and Network Security Chengdu University of Technology Chengdu China Department of Computer Science and Engineering University of Connecticut StorrsCT United States
Today’s artificial intelligence technology has made great progress and in many fields involved in artificial intelligence, such as medical imaging, logistics, manufacturing, and other fields, one of the most basic ta... 详细信息
来源: 评论
Analysis of Lung Cancer for Developing Smart Healthcare with the Help of BGWO Based TSA-XGBoost Model
Analysis of Lung Cancer for Developing Smart Healthcare with...
收藏 引用
2023 International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023
作者: Mahaveerakannan, R. Murali Dhar, M.S. Goswami, Sohan Krishna, P. Gopala Jayanthi, K. Kumar, M. Sathish The Institute of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Spatial Informatics India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Technique Polytechnic Institute Department of Computer Science and Technology West Bengal India Gokaraju Rangaraju Institute of Engineering and Technology Department of Information Technology Telangana Hyderabad India Pollachi Institute of Engineering and Technology Department of Computer Science and Engineering Pollachi Tamil Nadu Coimbatore India Karpagam College of Engineering Department of Cyber Security Tamil Nadu Coimbatore India
Given the circumstances the healthcare system, the Internet of Things (IoT) is crucial. IoT gadgets offer patient data for the framework of healthcare monitoring. IoT is a key component in every aspect of the health c... 详细信息
来源: 评论