咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是651-660 订阅
排序:
Intelligent Model to Predict Early Liver Disease using Machine Learning Technique
Intelligent Model to Predict Early Liver Disease using Machi...
收藏 引用
2022 International Conference on Business Analytics for technology and security, ICBATS 2022
作者: Ghazal, Taher M. Rehman, Aziz Ur Saleem, Muhammad Ahmad, Munir Ahmad, Shabir Mehmood, Faisal Faculty of Information Science and Technology Ukm Network and Communication Technology Lab Center for Cyber Security Malaysia School of Computer Science NCBAandE Lahore Pakistan Gachon University Department of Computer Engineering Korea Republic of Gachon University Department of It Convergence Engineering Korea Republic of
Liver Disease (LD) is the main cause of death worldwide, affecting a large number of people. A variety of factors affect the liver, resulting in this disease. The diagnosis of this condition is both expensive and time... 详细信息
来源: 评论
Detection of Network Attacks using Machine Learning and Deep Learning Models
Detection of Network Attacks using Machine Learning and Deep...
收藏 引用
2022 International Conference on Machine Learning and Data engineering, ICMLDE 2022
作者: Dhanya, K.A. Vajipayajula, Sulakshan Srinivasan, Kartik Tibrewal, Anjali Kumar, T. Senthil Kumar, T. Gireesh TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India STSM Architect IBM Security IBM India Sr. Architect IBM Security IBM India Pvt Ltd India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
Anomaly-based network intrusion detection systems are highly significant in detecting network attacks. Robust machine learning and deep learning models for identifying network intrusion and attack types are proposed i... 详细信息
来源: 评论
Optimizing Cloud-Based IoT Architectures with an Energy-Sensitive Load Balancing Algorithm for Enhanced Resource Utilization and Network Efficiency  4
Optimizing Cloud-Based IoT Architectures with an Energy-Sens...
收藏 引用
4th International Conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Kumar, Ravi Raghavendar, K. Chary, Kalvog Prakasha Naresh, K. Reddy, G. Venkata Rami Kumar, D. Sravan Sreenidhi University Department of Cse Hyderabad India Teegala Krishna Reddy Engineering College Department of Cse Hyderabad India Cvr College of Engineering Department of CSE Cyber Security Hyderabad India Tkr College of Engineering & Technology Department of Cse Hyderabad India Vardhaman College of Engineering Department of Cse Hyderabad India Narshima Reddy Engineering College Maisammaguda Hyderabad India
Cloud computing, which provides virtualized computing resources online, has become increasingly popular. Effective load balancing (LB) is essential for distributing dynamic workloads among cloud systems and ensuring e... 详细信息
来源: 评论
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks  33
Design of Lightweight Cryptography based Deep Learning Model...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Fadhil, Saif Aamer Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Integrated Work Package KBR SouthbankVIC Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
Depending on a device's encryption mechanism, a wide variety of tangible details could be exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to deep learning's sensitivity t... 详细信息
来源: 评论
Power Load Forecasting Model Based on LSTM and Prophet algorithm  3
Power Load Forecasting Model Based on LSTM and Prophet algor...
收藏 引用
3rd International Conference on Consumer Electronics and computer engineering, ICCECE 2023
作者: Zhang, Zhiling Wang, Xu Wang, Jing Yuan, Xueyu College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China Institute of Economics and Finance Polessky State University Pinsk Brest Belarus School of Information Engineering Shaoguan University Shaoguan China
Power system load forecasting in different periods is of great practical significance to improve the economic and social benefits of the power system, while the complex and variable meteorological conditions, social e... 详细信息
来源: 评论
Internet Public Safety Event Grading and Hybrid Storage Based on Multi-feature Fusion for Social Media Texts  28th
Internet Public Safety Event Grading and Hybrid Storage Bas...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Hu, Die Xie, Yulai Feng, Dan Zhao, Shixun Fu, Pengyu Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
With the rapid development of mobile Internet technology, various public events appear on social media platforms and attract a lot of attention. Since netizens can express their opinions freely on the Internet, some e... 详细信息
来源: 评论
Detection of Crucial Power Side Channel Data Leakage in Neural Networks  33
Detection of Crucial Power Side Channel Data Leakage in Neur...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Satar, Nurhizam Safie Mohd Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Fadhil, Saif Aamer Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Integrated Work Package KBR SouthbankVIC Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
Neural network (NN) accelerators are now extensively utilized in a range of applications that need a high degree of security, such as driverless cars, NLP, and image recognition. Due to privacy issues and the high cos... 详细信息
来源: 评论
Innovative Method for Detecting Liver Cancer using Auto Encoder and Single Feed Forward Neural Network  2
Innovative Method for Detecting Liver Cancer using Auto Enco...
收藏 引用
2nd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2023
作者: Sowparnika, B. Yamini, Kalva Walid, Md. Abul Ala Prasad, Jhakeshwar Aparna, N. Chauhan, Amit Nandha Engineering College Department of Biomedical Engineering Tamilnadu Erode India Sriher University Cyber Security in Computer Science and Engineering Sri Ramachandra Faculty of Engineering Tamilnadu Chennai India Department of Computer Science and Engineering Bangladesh Shri Shankaracharya College of Pharmaceutical Sciences Chhattisgarh Junwani Bhilai India Dhaanish Ahmed Institute of Technology Department of Bio Medical Engineering Tamilnadu Coimbatore India Department of Life Sciences Karnataka Bengaluru India
Liver cancer ranks sixth among all cancers in frequency of incidence. A CT scan is the gold standard for diagnosis. These days, CT scan images of the liver and its tumor can be segmented using deep learning and Neural... 详细信息
来源: 评论
Privacy and security of Content: A Study of User-resilience and Pre-checks on Social Media  5
Privacy and Security of Content: A Study of User-resilience ...
收藏 引用
5th International Conference on Information technology for Education and Development, ITED 2022
作者: Nwankwo, Chukwuemeka Uwadia, Francis Nwankwo, Wilson Adigwe, Wifred Chinedu, Paschal Ojei, Emmanuel Edo State University Department of Computer Science Uzairue Nigeria Delta State University of Science and Technology Department of Cyber Security Ozoro Nigeria Edo State University Department of Computer Engineering Uzairue Nigeria Department of Software Engineering Delta State University of Science and Technology Ozoro Nigeria
In recent times, cybercrimes, kidnapping, and ritual killings are being enabled through the use and abuse of social media technologies and students are becoming cheap targets. Consequently, this study seeks to investi... 详细信息
来源: 评论
A Comprehensive Analysis on Time Synchronization Protocols in Wireless Sensor Networks  4
A Comprehensive Analysis on Time Synchronization Protocols i...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Senthilkumar, R. Venkateshkumar, S. Sachithanantham, N.C. Rajkumar, D. Revathi, M. Suganthapriya, S. Dr. SNSRajalakshmi College of Arts & Science Department of Computer Science Coimbatore641049 India Dr. SNSRajalakshmi College of Arts & Science Department of Computer Science with Cyber Security Coimbatore641049 India Dr. SNSRajalakshmi College of Arts & Science Department of Information Technology Coimbatore641049 India Coimbatore641049 India
While fundamental communication in wireless networks relies on time synchronization, it also enables motion, location, and proximity sensing. Four features-time spent sending and receiving, accessing and distributing-... 详细信息
来源: 评论