咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是561-570 订阅
排序:
Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid Chaotic Maps, and Hashing  9
Noise-Crypt: Image Encryption with Non-linear Noise, Hybrid ...
收藏 引用
9th International Conference on engineering and Emerging technology, ICEET 2023
作者: Asghar, Laiba Ahmed, Fawad Khan, Muhammad Shahbaz Arshad, Arshad Ahmad, Jawad Pakistan Navy Engineering College National University of Sciences and Technology Department of Cyber Security Karachi Pakistan School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh United Kingdom
To secure the digital images over insecure transmission channels, a new image encryption algorithm Noise-Crypt is proposed in this paper. Noise-Crypt integrates nonlinear random noise, hybrid chaotic maps, and SHA-256... 详细信息
来源: 评论
Blockchain technology in IoT systems: current trends, methodology, problems, applications, and future directions
收藏 引用
Journal of Reliable Intelligent Environments 2021年 第2期7卷 115-143页
作者: Alfa, Abraham Ayegba Alhassan, John Kolo Olaniyi, Olayemi Mikail Olalere, Morufu Department of Computer Science Kogi State College of Education Ankpa Nigeria Department of Computer Science Federal University of Technology Minna Nigeria Department of Computer Engineering Federal University of Technology Minna Nigeria Department of Cyber Security Science Federal University of Technology Minna Nigeria
The growth of Internet of Things (IoT) took center stage universally due their capability to advance the course of human lives. Consequent upon this, several challenges were thrown up such as security of huge data sto... 详细信息
来源: 评论
S3A: State-Attention Inducing Adversarial Attacks on Black-box Proximal Policy Optimisation Models
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Yichuan Zhao, Chen Liu, Zhiquan Hei, Xinhong Ma, Jianfeng Xi’an University of Technology College of Computer Science and Engineering Xi’an710048 China Jinan University College of Cyber Security Guangzhou510632 China Xidian University School of Cyber Engineering Xi’an710071 China
In the current era when the Internet of Things (IoT) is booming and various smart devices are closely interconnected to build a complex network system, the demand for efficient control and resource management strategi... 详细信息
来源: 评论
Detection Technique of Software-Induced Rowhammer Attacks
收藏 引用
computers, Materials & Continua 2021年 第4期67卷 349-367页
作者: Minkyung Lee Jin Kwak ISAA Lab. Department of Computer EngineeringAjou UniversitySuwon16499Korea Department of Cyber Security Ajou UniversitySuwon16499Korea
Side-channel attacks have recently progressed into software-induced *** particular,a rowhammer attack,which exploits the characteristics of dynamic random access memory(DRAM),can quickly and continuously access the ce... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2838-2852页
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network
An Adaptive Threat Defence Mechanism Through Self Defending ...
收藏 引用
Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS), International Conference on
作者: Datta Sai Manikanta Narayana Sai Bharadwaj Nookala Shraddha Chopra Udhayakumar Shanmugam Department of Computer Science and Engineering (Cyber Security) School of Computing Chennai
IEEE 802.11 generally known as the Wi-Fi network, is our backbone of the present communication system delivering the best effort service to the end users. Access control in wireless network is an intrinsic security pr...
来源: 评论
Bl-IEA: A Bit-Level Image Encryption Algorithm using Transformation and Chaotic Skew Tent Map based Substitution for Fingerprint Images
Bl-IEA: A Bit-Level Image Encryption Algorithm using Transfo...
收藏 引用
Electrical, Electronics, Information and Communication Technologies (ICEEICT), International Conference on
作者: Aditya G Kulkarni Prajwalasimha S N Naveen Kulkarni Deepthika Karuppusamy Raveena Dharmappa Yash Bagga Department of Computer Science and Engineering (Cyber Security) School of Engineering (SoE) Dayananda Sagar University Bangalore India
In order to fortify pre-stored biometric data of fingerprint samples in the biometric authentication system, a hybrid approach based on Pseudo Hadamard transformation and Skew Tent chaotic substitution is proposed. In... 详细信息
来源: 评论
Taking LM as the Brain: A Novel Approach Integrating Language Model and Generative Agent for Intelligent Decision Systems
收藏 引用
International Journal of Network security 2024年 第3期26卷 386-393页
作者: Yang, Jingkang Cai, Xiaodong Liu, Yining Chen, Mingyao Chang, Chin-Chen School of Information and Communication Guilin University of Electronic Technology Guilin541004 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Research and Development Department Guilin Topintelligent Communication Technology Company Limited Guilin541004 China Department of Information Engineering and Computer Science Feng Chia University Taichung 407102 Taiwan
The Large Language Model (LLM) has demonstrated significant capabilities in intelligent robotics and Autonomous Driving(AD). Compared to traditional end-to-end models, decision reasoning in the form of language exhibi... 详细信息
来源: 评论
Utilize Multichannel Attention Amplification Fusion for Skin Disease Diagnosis  5
Utilize Multichannel Attention Amplification Fusion for Skin...
收藏 引用
5th International Conference on computer Information Science and Artificial Intelligence, CISAI 2022
作者: Tang, Jiawei Zheng, Fengbo Liang, Gongbo Jiang, Lifen College of Computer and Information Engineering Tianjin Normal University Tianjin China Department of Computing & Cyber Security Texas A&M University-San Antonio TX78224 United States
Patients with early-stage skin cancer have a 99% survival rate, but once it spreads, the chances of survival are poor. Deep learning has greatly improved the quality of computer-aided diagnosis of skin diseases. Howev... 详细信息
来源: 评论
Blockchain-Powered Authentication and Supply Chain Integration to Combat Counterfeit Drugs
Blockchain-Powered Authentication and Supply Chain Integrati...
收藏 引用
International Conference on Circuits, Communication, Control and Computing
作者: Anu S M Mohana Kumar S Shankarmma M Chaithra Meghana K Sanvi H R Department of CSE Cyber Security Ramaiah Institute of Technology Bangalore India Department of Computer Science Ramaiah Institute of Technology Bangalore Bangalore India Dept.of Computer Science (Cyber Security) Bangalore India Dept.of Computer Science (Cyber Security) Ramaiah Institute of Technology Bangalore India Dept.of CS (AI and ML) Ramaiah Institute of Technology Bangalore India
Counterfeit drugs pose a significant threat to public health and undermine the integrity of pharmaceutical supply chains globally. This research explores a novel application of blockchain technology to authenticate ph... 详细信息
来源: 评论