咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是621-630 订阅
排序:
An Automated approach to detect & diagnosis the type of Cosmetic Skin & its Disease using Machine Learning  3
An Automated approach to detect & diagnosis the type of Cosm...
收藏 引用
3rd IEEE Global Conference for Advancement in technology, GCAT 2022
作者: Borade, Shwetambari Kalbande, Dhananjay Jakaria, Hemangi Patil, Linesh Information Technology Cyber Security Thadomal Shahani Engineering College Shah & Anchor Kutchhi Engineering College Mumbai India Department of Computer Engineering Mumbai India Shah & Anchor Kutchhi Engineering College Department of Information Technology Mumbai India Shah & Anchor Kutchhi Engineering College Department of Computer Engineering Mumbai India
Dermatological illnesses are the most serious problem in the twenty-first century, owing to a lack of awareness and the high cost of diagnosis. To address the issue, we believe that automated methods-based application... 详细信息
来源: 评论
Advancing Android Malware Detection with BioSentinel Neural Network using Hybrid Deep Learning Techniques
Advancing Android Malware Detection with BioSentinel Neural ...
收藏 引用
International Conference on Computing for Sustainable Global Development (INDIACom)
作者: D Sandhya Rani K Gnaneshwar K Sampurnima Pattem Soma Sekhar G Bala Krishna Shirisha Kakarla Department of Computer Science Engineering CVR College of Engineering Ibrahimpatnam Rangareddy India Department of Computer Science Engineering-Cyber Security Sreenidhi Institute of Science and Technology Hyderabad India Department of Computer Science Engineering Vardhaman College of Engineering Hyderabad India
The paper introduces the BioSentinel Neural Network (BSNN), a novel hybrid deep learning model designed to enhance malware detection, particularly focusing on zero-day threats. The BSNN model integrates diverse neural...
来源: 评论
Information-Centric IoT-Based Smart Farming with Dynamic Data Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3865-3880页
作者: Souvik Pal Hannah VijayKumar D.Akila N.Z.Jhanjhi Omar A.Darwish Fathi Amsaad Department of Computer Science and Engineering Sister Nivedita UniversityKolkataIndia Post Doctoral Researcher Sambalpur UniversitySambalpurIndia Department of Computer Science Anna Adarsh College for WomenChennaiIndia Department of Information Technology Vels Institute of ScienceTechnology and Advanced StudiesChennaiIndia School of Computer Science and Engineering SCETaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubang Jaya47500SelangorMalaysia Department of Information Security and Applied Computing Eastern Michigan UniversityUSA School of Information Security and Applied Computing Eastern Michigan UniversityUSA
Smart farming has become a strategic approach of sustainable agriculture management and monitoring with the infrastructure to exploit modern technologies,including big data,the cloud,and the Internet of Things(IoT).Ma... 详细信息
来源: 评论
Optimization of Ethanol Production Using State-Space Modeling and Optimal Control technology  13
Optimization of Ethanol Production Using State-Space Modelin...
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Markina, Lyudmila Palchevskyi, Bogdan Hrudetskyi, Roman Smoliankin, Oleh Melnychuk, Yuliia Khrystynets, Nataliya Lutsk National Technical University Department of Automation and Computer-Integrated Technologies Lutsk Ukraine Lutsk National Technical University Department of Digital Educational Technologies Lutsk Ukraine Lutsk National Technical University Department of Computer Engineering and Cyber Security Lutsk Ukraine
in present paper we develop the automatic optimal control of the production process of dough mixture preparation, that can be used in the production of alcohol and fuel ethanol from grain raw materials. Known methods ... 详细信息
来源: 评论
Text Summarization Generation Based on Improved Transformer Model
Text Summarization Generation Based on Improved Transformer ...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on cyber Science and technology Congress, DASC/PiCom/CBDCom/cyberSciTech 2023
作者: Lin, Jingsong Guo, Xiaodong Dong, Chen Lyu, Chenxi Xu, Li Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou350116 China College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China University of South Florida Department of Computer Science and Engineering TampaFL33620 United States
In the era of big data, the number of internet users is increasing yearly, and each user receives a massive amount of information every day. The low-value density of massive text data makes it difficult to utilize its... 详细信息
来源: 评论
Intelligent Malware Detection Using Sentence Transformer and Hybrid Deep Learning Architecture  10
Intelligent Malware Detection Using Sentence Transformer and...
收藏 引用
10th International Conference on Signal Processing and Communication, ICSC 2025
作者: Kumar, Sanjeev Sapru, Yudhishthira Sapru, Sugandha Janet, B. Centre for Development of Advanced Computing Cyber Security Technology Division Mohali India Indian Computer Emergency Response Team CERT-In Delhi India Pggc Panjab University Department of Mathematics Chandigarh India National Institute of Technology Department of Computer Application Tiruchirappalli India
The complex evasion techniques adopted by the malware creator make signature-based malware detection approaches unable to detect unknown malware attacks. This study proposes a new malware detection and classification ... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Optical Ciphering Scheme for Cancellable Speaker Identification System
收藏 引用
computer Systems Science & engineering 2023年 第4期45卷 563-578页
作者: Walid El-Shafai Marwa A.Elsayed Mohsen A.Rashwan Moawad I.Dessouky Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi EAbd El-Samie Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Communications Faculty of EngineeringCairo UniversityCairoEgypt Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Most current security and authentication systems are based on personal *** security problem is a major issue in the field of biometric *** is due to the use in databases of the original *** biometrics will forever be ... 详细信息
来源: 评论
An Autoencoder-Like Nonnegative Matrix Co-Factorization for Improved Student Cognitive Modeling  38
An Autoencoder-Like Nonnegative Matrix Co-Factorization for ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yu, Shenbao Pan, Yinghui Zeng, Yifeng Doshi, Prashant Liu, Guoquan Poh, Kim-Leng Lin, Mingwei College of Computer and Cyber Security Fujian Normal University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer and Information Sciences Northumbria University United Kingdom Intelligent Thought and Action Lab School of Computing University of Georgia United States Financial Technology Research Institute Fudan University China College of Design and Engineering National University of Singapore Singapore
Student cognitive modeling (SCM) is a fundamental task in intelligent education, with applications ranging from personalized learning to educational resource allocation. By exploiting students' response logs, SCM ...
来源: 评论
GAN-Loc: Empowering Indoor Localization for Unknown Areas via Generative Fingerprint Map  21
GAN-Loc: Empowering Indoor Localization for Unknown Areas vi...
收藏 引用
21st Annual IEEE International Conference on Sensing, Communication, and Networking, SECON 2024
作者: Yoon, JinYi You, Yeawon Kang, Dayeon Kim, Jeewoon Lee, HyungJune Department of Computer Science Virginia Tech BlacksburgVA United States Department of Cyber Security Ewha Womans University Seoul Korea Republic of Manning College of Information & Computer Sciences University of Massachusetts AmherstMA United States Department of Computer Science University of California IrvineCA United States Department of Computer Science and Engineering Ewha Womans University Seoul Korea Republic of
As indoor localization becomes a necessity to provide intelligent location-based services for in-building users, fingerprint-based positioning has been widely adopted in numerous Wi-Fi-equipped devices. However, its r... 详细信息
来源: 评论