咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是611-620 订阅
排序:
FEDA: Private-Preserving Data Aggregation for Smart Grid via Functional Encryption
FEDA: Private-Preserving Data Aggregation for Smart Grid via...
收藏 引用
International Conference on Wavelet Active Media technology and Information Processing (ICWAMTIP)
作者: LI ZHENJIANG LI HONGWEI QIAN XINYUAN School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu China
Privacy-preserving data aggregation (P2DA) is a technique that enables the simultaneous availability of data and the preservation of privacy in smart grid systems. However, existing methods are only capable of fulfill... 详细信息
来源: 评论
Personalized Food Recommendations: A Machine Learning Model for Enhanced Dining Choices  14
Personalized Food Recommendations: A Machine Learning Model ...
收藏 引用
14th IEEE International Conference on Control System, Computing and engineering, ICCSCE 2024
作者: Al-Hubaishi, Mohammed Ali, Musab A. M. Tahir, Nooritawati Md Halic University Department of Computer Engineering Istanbul Turkey University of Technology and Applied Sciences College of Computing and Information Sciences Oman International Information Technology University Department of Computer Engineering and Information Security Kazakhstan Universiti Teknologi MARA Malaysia Universiti Teknologi MARA College of Engineering Malaysia Riyadh Saudi Arabia
This research introduces an innovative approach to enhance dining experiences through a personalized meal suggestion system. Our method leverages decision tree-based machine learning to predict user preferences by ana... 详细信息
来源: 评论
New Perspectives on Data Exfiltration Detection for Advanced Persistent Threats Based on Ensemble Deep Learning Tree  19
New Perspectives on Data Exfiltration Detection for Advanced...
收藏 引用
19th International Conference on Web Information Systems and Technologies, WEBIST 2023
作者: Cai, Xiaojuan Koide, Hiroshi Department of Information Science and Technology Information Science and Electrical Engineering Kyushu University Fukuoka Japan Section of Cyber Security for Information Systems Research Institute for Information Technology Kyushu University Fukuoka Japan
Data exfiltration of Advanced Persistent Threats (APTs) is a critical concern for high-value entities such as governments, large enterprises, and critical infrastructures, as attackers deploy increasingly sophisticate... 详细信息
来源: 评论
cybersecurity of SMART Technologies Using Deep Learning Methods  8
Cybersecurity of SMART Technologies Using Deep Learning Meth...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Milov, Oleksandr Rahimova, Irada Havrylova, Alla Golovashych, Sergii Aksonova, Iryna Pecherytsia, Dmytro National Technical University 'Kharkiv Polytechnic Institute' Department of Cyber Security Kharkiv Ukraine Azerbaijan Technical University Department of 'Computer Technologies' Baku Azerbaijan National Technical University 'Kharkiv Polytechnic Institute' Department of Software Engineering and Intelligent Control Technologies Kharkiv Ukraine
The concept of 'smart', the concept of smart technology, and its main elements are considered. An analysis of the factors influencing the formation and development of the concept of smart technology is provide... 详细信息
来源: 评论
Evaluation of the Value and the Contribution of Virtual Reality Technologies to Skill Training
Evaluation of the Value and the Contribution of Virtual Real...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Abdullah, Muhammad Almansour, Ammar Yaser Shawal, Nukhba Hussain, Muhammad Zunnurain Almansour, Bashar Yaser Hasan, Muhammad Zulkifl University of Central Punjab Department of Computer Sciences Lahore Pakistan Oman College of Management and Technology Department of Administrative and Financial Sciences Barka Oman Bahria University Lahore Campus Department of Computer Sciences Pakistan Muscat University Faculty of Business and Management Muscat Oman Cyber Security Center Universiti Putra Malaysia
In a rapidly evolving professional landscape, Virtual Reality (VR) emerges as a transformative device in talent training and improvement. This paper affords a complete analysis of VR's effect on schooling packages... 详细信息
来源: 评论
Performance Analysis of Intelligent Reflecting Surface Assisted Wireless Communication System
收藏 引用
computer Modeling in engineering & Sciences 2023年 第10期137卷 775-787页
作者: Weiqiang Tan Quanquan Zhou Weijie Tan Longcheng Yang Chunguo Li School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China Key Laboratory of Advanced Manufacturing Technology Ministry of EducationGuizhou UniversityGuiyang550025China Sichuan Key Laboratory of Indoor Space Layout Optimization and Security Guarantee Chengdu Normal UniversityChengdu611130China School of Information Science and Engineering Southeast UniversityNanjing210096China
In this paper,we investigate the end-to-end performance of intelligent reflecting surface(IRS)-assisted wireless communication *** consider a system in which an IRS is deployed on a uniform planar array(UPA)configurat... 详细信息
来源: 评论
Accurate Distinction of Weak and Strong AC Grids for Emerging Hierarchical-Infeed LCC-UHVDC Systems
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第2期10卷 772-777页
作者: Hao Xiao Xianzhong Duan Yi Zhang Department of Electrical and Computer Engineering University of ManitobaWinnipeg R3T 2N2ManitobaCanada State Key Laboratory of Advanced Electromagnetic Engineering and Technology Hubei Electric Power Security and High Efficiency Key LaboratorySchool of Electrical and Electronic EngineeringHuazhong University of Science and TechnologyWuhan 430074HubeiChina RTDS Technologies Inc. Winnipeg R3T 2E1ManitobaCanada
Distinction of weak and strong AC grids for emerging hierarchical-infeed LCC-UHVDC systems is important for planning and operation departments. However, accuracy of earlier distinction methods is limited as they were ... 详细信息
来源: 评论
Machine learning-optimized titanium-based broadband absorber with high-efficiency performance across visible and infrared wavelengths
收藏 引用
Optical and Quantum Electronics 2025年 第2期57卷 1-24页
作者: Wekalao, Jacob Muheki, Jonas Mandela, Ngaira Kabarokole, Pelluce Makoye, Paschal Department of Optics and Optical Engineering University of Science and Technology of China Hefei230026 China Department of Biological and Medical Physics 4302 University Dr HoustonTX77004 United States School of Digital Forensics and Cyber Security National Forensic Sciences University Gujarat Gandhinagar382007 India Department of Materials Science and Engineering University of Houston HoustonTX77204-4004 United States
This study introduces an advanced broadband absorber design featuring titanium-based square ring resonators on silicon dioxide substrates, optimized for superior absorption performance across visible and infrared wave... 详细信息
来源: 评论
Divide, Conquer, and Coalesce: Meta Parallel Graph Neural Network for IoT Intrusion Detection at Scale  24
Divide, Conquer, and Coalesce: Meta Parallel Graph Neural Ne...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Ding, Hua Chen, Lixing Li, Shenghong Bai, Yang Zhou, Pan Qu, Zhe School of Cyber Science and Engineering Shanghai Jiao Tong University Shanghai China Institute of Cyber Science and Engineering Shanghai Jiao Tong University Shanghai China Department of Automation Shanghai Jiao Tong University Shanghai China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China School of Computer Science and Engineering Central South University Hunan Changsha China
This paper proposes Meta Parallel Graph Neural Network (MPGNN) to establish a scalable Network Intrusion Detection System (NIDS) for large-scale Internet of Things (IoT) networks. MPGNN leverages a meta-learning frame... 详细信息
来源: 评论
Safety helmet detection algorithm in complex scenarios based on YOLOX
Safety helmet detection algorithm in complex scenarios based...
收藏 引用
2022 International Conference on Artificial Intelligence, Information Processing and Cloud Computing, AIIPCC 2022
作者: Xiang, Dongsheng Zhu, Baisong Wu, Xu Ou, Yangfei CHENGDU UNIVERSITY of TECHNOLOGY College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China College of Mechanical and Electrical Engineering Chengdu University of Technology Chengdu China
Aiming at the problems that the existing helmet wearing detection algorithms have many application scenarios and rich detection targets. An improved helmet detection method EPP-YOLOX based on YOLOX is proposed. Firstl... 详细信息
来源: 评论