咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是51-60 订阅
排序:
Survey on digital twins for Internet of Vehicles:Fundamentals,challenges,and opportunities
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 237-247页
作者: Jiajie Guo Muhammad Bilal Yuying Qiu Cheng Qian Xiaolong Xu Kim-Kwang Raymond Choo School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Engineering Hankuk University of Foreign StudiesGyeonggi-do17035South Korea Jiangsu Hydraulic Research Institute Nanjing210044China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
As autonomous vehicles and the other supporting infrastructures(e.g.,smart cities and intelligent transportation systems)become more commonplace,the Internet of Vehicles(IoV)is getting increasingly *** have been attem... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Deepfake Video Detection: Analysis for Deep Learning models using Transfer Learning  25
Deepfake Video Detection: Analysis for Deep Learning models ...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Altamimi, Shahad Salameh, Walid Princess Sumaya University for Technology Cyber Security Department Amman Jordan Princess Sumaya University for Technology Computer Science Department Amman Jordan
The unchecked spread of deepfake videos jeopardizes public trust, national security, and media credibility. The capacity to recognize falsified videos is critical for protecting privacy and combatting misinformation. ... 详细信息
来源: 评论
Marine Life Ecosystem Analysis Based on Climate Change Detection Using Deep Learning Algorithms
收藏 引用
Remote Sensing in Earth Systems Sciences 2025年 第2期8卷 545-554页
作者: Rebecca, B. Sandhya, A. Pokkuluri, Kiran Sree Kanishka, Gunipati Shaik, Khasimbee Krishna, B. Murali Department of Computer Science and Engineering Marri Laxman Reddy Institute of Technology and Management Telangana Dundigal 500043 India Department of CSE SRM Institute of Science and Technology Chennai Ramapuram India Department of Computer Science and Engineering Shri Vishnu Engineering College for Women Andhra Pradesh Bhimavaram India Computer Science and Engineering (Cyber Security) Madanapalle Institute of Technology & Science Madanapalle India Department of Computer Science and Engineering Aditya University Andhra Pradesh Surampalem India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
The surrounding environmental and climatic conditions have a significant impact on the utilisation of ecosystem services for recreational purposes. Climate change poses a threat to future natural leisure opportunities... 详细信息
来源: 评论
Electromagnetic Radiation Effects in Human and Animal Health  14
Electromagnetic Radiation Effects in Human and Animal Health
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Singh, Jagjot Kumar, Sanu Johnson, Derick Mathew Savita Department of Computer Science Engineering Spl. Digital Forensics and Cyber Security India
Electromagnetic (EM) radiations are the waves of electromagnetic and magnetic field which are generated from electromagnetic devices. These radiations are dangerous to humans as well as animal health. Talking medicall... 详细信息
来源: 评论
Blockchain-Empowered Asynchronous Federated Reinforcement Learning for IoT-Based Traffic Trajectory Prediction
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17095-17109页
作者: Wang, Bin Tian, Zhao Tang, Fengxiao Pan, Heng She, Wei Liu, Wei Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450002 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou450002 China Central South University School of Computer Science and Engineering Changsha410083 China Zhongyuan University of Technology School of Cyber Space Security Zhengzhou450007 China Zhengzhou University School of Cyber Science and Engineering Zhengzhou University The Zhengzhou Key Laboratory of Blockchain and Data Intelligence Zhengzhou450002 China
Vehicle trajectory prediction plays a crucial role in IoT-based intelligent transportation systems, which can effectively address key issues such as driving safety and multi-vehicle collaboration. However, the sensiti... 详细信息
来源: 评论
Internet of Things Intrusion Detection System Based on Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2119-2135页
作者: Jie Yin Yuxuan Shi Wen Deng Chang Yin Tiannan Wang Yuchen Song Tianyao Li Yicheng Li Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina
In recent years, the Internet of Things (IoT) technology has developedby leaps and bounds. However, the large and heterogeneous networkstructure of IoT brings high management costs. In particular, the low costof IoT d... 详细信息
来源: 评论
Deformable Dual Graph Aggregation Transformer Convolutional Networks with Spider Wasp Optimizer for Ovarian Tumor Classification Using Magnetic Resonance Imaging
收藏 引用
Biomedical Materials and Devices 2025年 1-19页
作者: Shanmugaveni, V. Jotheeswari, M. Abarnaswara, R. VijayaKumar, M. Manojanani, A. Department of Computer Science and Engineering (Cyber Security) Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering PSNA College of Engineering and Technology Tamil Nadu Dindigul India Department of Artificial Intelligence & Data Science Dr. Mahalingam College of Engineering and Technology Tamil Nadu Pollachi India Department of Computer Science and Engineering RVS Technical Campus Tamil Nadu Coimbatore India
The diagnosis of Ovarian Tumor (OT) remains a significant challenge as there is presently no practical non-invasive technique to determine true benign or malignant lesions before treatment. This study proposes a uniqu... 详细信息
来源: 评论
Extraction of Actionable Threat Intelligence from Dark Web Data  5
Extraction of Actionable Threat Intelligence from Dark Web D...
收藏 引用
5th International Conference on Control, Communication and Computing, ICCC 2023
作者: Varghese, Varsha Mahalakshmi, S. Senthilkumar, K.B. ER&DCI Institute of Technology Cyber Forensics and Information Security Department of Computer Science & Engineering Thiruvananthapuram India Cyber Security Group Centre for Development of Advanced Computing Thiruvananthapuram India
Darknet has emerged as an excellent platform for cybercriminals to conduct various illicit activities such as operating a fully functional crypto-currency-based marketplace or maintaining a highly anonymous communicat... 详细信息
来源: 评论