咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是581-590 订阅
排序:
IDEA-PTLMS: Designing Secure Image Encoding and Decoding Algorithms using Pixel Transposition and Logistic Map based Substitutions
IDEA-PTLMS: Designing Secure Image Encoding and Decoding Alg...
收藏 引用
Electrical, Electronics, Information and Communication Technologies (ICEEICT), International Conference on
作者: Prajwal N Halvi Prajwalasimha S N Durbadal Chattaraj Naveen Kulkarni Deepthika Karuppusamy Department of Computer Science and Engineering (Cyber Security) School of Engineering (SoE) Dayananda Sagar University Bangalore India
In this paper, a hybrid approach based on Pseudo Hadamard transformation and Logistic Substitution is proposed. Inter pixel redundancy and strong correlation between the adjacent pixels in an image is condensed by imp... 详细信息
来源: 评论
Slotted ALOHA with Code Combining for IoT Networks  3
Slotted ALOHA with Code Combining for IoT Networks
收藏 引用
3rd IEEE International Mediterranean Conference on Communications and Networking, MeditCom 2023
作者: Tyrovolas, Dimitrios Chrysologou, Athanasios Chondrogiannis, Georgios Tegos, Sotiris Mekikis, Prodromos-Vasileios Diamantoulakis, Panagiotis Ioannidis, Sotiris Liaskos, Christos Chatzidiamantis, Nestor Karagiannidis, George Aristotle University of Thessaloniki Dept. of Electrical and Computer Engineering Thessaloniki Greece Technical University of Chania Dept. of Electrical and Computer Engineering Chania Greece University of Ioannina Computer Science Engineering Department Ioannina Greece Cyber Security Systems and Applied Ai Research Center Lebanon
Internet of Things (IoT) networks are expected to be a key enabler technology for smart cities, due to their ability to offer real-time monitoring. In this work, we propose a novel medium access control (MAC) protocol... 详细信息
来源: 评论
Prediction of Software Bug Fixing Time Using Intuitionistic Fuzzy Similarity Measure on Bug Informative Terms
Prediction of Software Bug Fixing Time Using Intuitionistic ...
收藏 引用
Information technology (OCIT), OITS International Conference on
作者: Rama Ranjan Panda Naresh Kumar Nagwani Department of Computer Science and Engineering Center for Cyber Security ITER SOA Deemed to be University Bhubaneswar India Department of Computer Science and Engineering National Institute of Technology Raipur Raipur India
Nowadays, industries are more concerned with the timely delivery of quality software. The release of software totally depends upon the time required to fix the software bugs. The project team has to estimate the avera... 详细信息
来源: 评论
ML-assisted security for Anomaly Detection in Industrial IoT (IIoT) Applications  2
ML-assisted Security for Anomaly Detection in Industrial IoT...
收藏 引用
2nd International Conference on Smart Technologies for Smart Nation, SmartTechCon 2023
作者: Konatham, Bharath Reedy Simra, Tabassum Ghimire, Ashutosh Amsaad, Fathi Ibrahem, Mohamed I. Jhanjhi, N.Z. Department of Computer Science and Engineering Wright State University DaytonOH United States Department of Cyber Security Engineering George Mason University FairfaxVA United States School of Computer Science SCS Taylor’s University Subang Jaya47500 Malaysia
The industrial Internet of Things (IIoT) uses intelligent sensors and actuators, etc., to facilitate the application of IoT in different industries. This paper presents a comparative analysis using several machine lea... 详细信息
来源: 评论
Conformal Graph-level Out-of-distribution Detection with Adaptive Data Augmentation  25
Conformal Graph-level Out-of-distribution Detection with Ada...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Lin, Xixun Cao, Yanan Sun, Nan Zou, Lixin Zhou, Chuan Zhang, Peng Zhang, Shuai Zhang, Ge Wu, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cyber Science and Engineering Wuhan University Wuhan China Academy of Mathematics and Systems Science CAS School of Cyber Security University of Chinese Academy of Sciences Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Academy of Mathematics and Systems Science CAS Beijing China School of Computer Science and Technology Donghua University Shanghai China Department of Computing Macquarie University Sydney Australia
Graph-level out-of-distribution (OOD) detection, which attempts to identify OOD graphs originated from an unknown distribution, is a vital building block for safety-critical applications in Web and society. Current ap... 详细信息
来源: 评论
Adversarial Robustness in DeepFake Detection: Enhancing Model Resilience with Defensive Strategies
Adversarial Robustness in DeepFake Detection: Enhancing Mode...
收藏 引用
Intelligent cybernetics technology & Applications (ICICyTA), International Conference on
作者: Pallavi N Pallavi T P Sushma Bylaiah Goutam R Department of Computer Science and Engineering M S Ramaiah Institute of Technology Karnataka India Department of Computer Science and Engineering (Cyber Security) M S Ramaiah Institute of Technology Karnataka India Department of Computer Science and Engineering Atria Institute of Technology Karnataka India
Detection of DeepFakes presents formidable challenges primarily due to adversarial attacks that can dramatically reduce model accuracy. Current detection models are reasonably effective in real scenarios; however, the... 详细信息
来源: 评论
Transparency order versus confusion coefficient:a case study of NIST lightweight cryptography S‑Boxes
收藏 引用
cybersecurity 2021年 第1期4卷 541-560页
作者: Huizhong Li Guang Yang Jingdian Ming Yongbin Zhou Chengbin Jin Institute of Information Engineering Chinese Academy of SciencesBeijing 100093China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China School of Cyber Security Nanjing University of Science and TechnologyNanjing 210094China Department of Software Engineering and Software Evaluation Beijing Institute of Computer Technology and ApplicationBeijing 100039China
Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the security assurance level of cryptographic *** most cases,non-linear components(e.g.S-Boxes)of cryptographic algorithms will be ch... 详细信息
来源: 评论
Decentralization of Identities Using Blockchain  10
Decentralization of Identities Using Blockchain
收藏 引用
10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer engineering, UPCON 2023
作者: Srivastava, Shreshth Grover, Veena Nallakaruppan, M.K. Krishwanth, B. Saravanan, K. Customer Engineering Qualcomm Hyderabad India School of Management Studies Noida Institute of Engineering and Technology Delhi NCR Noida India School of Computer Science Engineering and Information Systems Vit University Vellore India Cyber Security Engineer Datafoundry Private Limited India Kpr Institute of Engineering and Technology Department of Mechatronics Engineering Coimbatore India
Digital Identity Management has become an essential component of federal business units today. It involves the gathering and storing of an individual's personal information entrusted to identity providers. With an... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
A Logical Evaluation of Error Free Data Communication Scheme based on High Speed Visible Light Communication (VLC) Methodology  3
A Logical Evaluation of Error Free Data Communication Scheme...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Bharathi, P. Shyamala Pradeep, D. Judgi, T. Arulananth, T.S. Giri, Jayant Odeh, Mahmoud Department of Ece Chennai India M.Kumarasamy College of Engineering Department of Cse Tamilnadu Karur639113 India Sathyabama Institiute of Science and Technology Department of Ece Chennai India Mlr Institute of Technology Department of Ece Telangana Hyderabad500043 India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Visible Light Communication (VLC) is an emerging technology that offers a viable alternative to traditional RF-based communication systems. This paper presents a high-speed, error-free data communication scheme based ... 详细信息
来源: 评论