咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是671-680 订阅
排序:
Video quality enhancement using different enhancement and dehazing techniques
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第12期14卷 16607-16635页
作者: Ayoub, Abeer Naeem, Ensherah A. El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. El-Rabaie, El-Sayed M. Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Electrical Department Faculty of Technology and Education Suez University Suez43527 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Video in an outdoor environment suffers from the haze problem due to smoke, dust, and other particles in the atmosphere. The quality of video under these atmospheric conditions is clearly/dramatically degraded, leadin... 详细信息
来源: 评论
Predictive Modeling of Chronic Kidney Disease Progression Using Longitudinal Clinical Data and Deep Learning Techniques  2
Predictive Modeling of Chronic Kidney Disease Progression Us...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Rastegari, Farzaneh Odeh, Mahmoud Baroughi, Reyhaneh Mehdizadeh Bustan, Arad University of Connecticut Computer Science and Engineering Department Storrs United States School of Information Technology Zarqa University Cyber Security Department Zarqa Jordan College of Business Administration University of Business and Technolog Jeddah21448 Saudi Arabia Electrical and Computer Engineering Polytechnic University of Turin Turin Italy University of Maine Orono United States
Chronic Kidney Disease (CKD) is a prevalent condition with significant morbidity and mortality. Early and accurate detection is critical for effective treatment and management. This paper presents a comparative analys... 详细信息
来源: 评论
Algorithmic Innovations in Machine Learning for Drug Discovery and Pharmaceutical Innovations  2
Algorithmic Innovations in Machine Learning for Drug Discove...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Sangeetha, M. Harin Fernandez, F. Mary Ganesh Ramachandran, A. Saravanan, S.K. Bhanumathi, M. University of Technology and Applied Sciences Department of Computer Engineering Nizwa Oman Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science Chennai India Saveetha School of Engineering Simats BigData and Network Security Department of Computers Science and Engineering Tamil Nadu Chennai India Department of Computer Science and Engineering Chennai India
Algorithmic advancements in machine learning have transformed drug discovery and pharmaceutical innovation. This study examines how machine learning might speed medication development and pharmaceutical innovation. Da... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A novel coalition game on management of electronic health records in blockchain technology
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2025年 第4期16卷 653-666页
作者: Hamidoǧlu, Ali Altiti, Mustafa Jana, Chiranjibe Weber, Gerhard-Wilhelm Department of Mathematical and Statistical Sciences University of Alberta EdmontonABT6G 2J5 Canada Cyber Security Department Bahçeşehir University Çrağan İstanbul34353 Turkey Saveetha School of Engineering Tamil Nadu Chennai602105 India Faculty of Engineering Management Poznan University of Technology Poznan Poland Institute of Applied Mathematics Middle East Technical University Ankara Turkey
The collection and integration of health data through electronic health records (EHRs) has improved the overall quality of healthcare. By centralizing all healthcare institutions’ operations in a single record and ma... 详细信息
来源: 评论
An Efficient Key Establishment and Distribution Scheme for Wireless Body Area Networks
An Efficient Key Establishment and Distribution Scheme for W...
收藏 引用
Science, engineering and Business for Sustainable Development Goals (SEB-SDG), International Conference on
作者: Yusuf Taofeek Waziri Onomza Victor Morufu Olalere Muhammad Bashir Abdullahi Cyber Security Science Department Federal University of Technology Minna Nigeria Computer Science Department Federal University of Technology Minna Nigeria
Secure communication in wireless body area network (WBAN) depends on efficient key management system. However, to ensure robustness, key management schemes must not only be lightweight but also support the establishme... 详细信息
来源: 评论
Green5G: Enhancing Capacity and Coverage in Device-to-Device Communication
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 1933-1950页
作者: Abdul Rehman Javed Rabia Abid Bakhtawar Aslam Hafiza Ammara Khalid Mohammad Zubair Khan Omar H.Alhazmi Muhammad Rizwan Department of Cyber Security Air UniversityIslamabadPakistan Department of Computer Science Kinnaird College for WomenLahore54000Pakistan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinahSaudi Arabia
With the popularity of green computing and the huge usage of networks,there is an acute need for expansion of the 5G network.5G is used where energy efficiency is the highest priority,and it can play a pinnacle role i... 详细信息
来源: 评论
HSFL: Efficient and Privacy-Preserving Offloading for Split and Federated Learning in IoT Services
HSFL: Efficient and Privacy-Preserving Offloading for Split ...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Deng, Ruijun Du, Xin Lu, Zhihui Duan, Qiang Huang, Shih-Chia Wu, Jie Fudan University School of Computer Science Shanghai China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring Shanghai China Shanghai Blockchain Engineering Research Center Shanghai China Pennsylvania State University Information Sciences and Technology Department AbingtonPA United States National Taipei University of Technology Department of Electronic Engineering Taiwan
Distributed machine learning methods like Federated Learning (FL) and Split Learning (SL) meet the growing demands of processing large-scale datasets under privacy restrictions. Recently, FL and SL are combined in hyb... 详细信息
来源: 评论
Enhancing Convergence Efficiency in Federated Learning Models  25
Enhancing Convergence Efficiency in Federated Learning Model...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Samara, Ghassan Elhilo, Ala'Mazen Aljaidi, Mohammad Alamleh, Amneh Al-Mousa, Mohammad Rasmi Batyha, Radwan Alazaidah, Raed Bani-Bakr, Alaa Elrashidi, Ali Zarqa University Faculty of It Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Department of Cybersecurity Zarqa Jordan Applied Science Private University Faculty of Information Technology Amman Jordan Zarqa University Faculty of It Department of Cyber Security Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
This study evaluates federated learning models' performance compared to centralized models using the MNIST and CIFAR-10 datasets. Four models were tested: two Federated Learning models and two centralized models. ... 详细信息
来源: 评论
An Approach for Searching the Top K Nearest Areas Based on R-tree
An Approach for Searching the Top K Nearest Areas Based on R...
收藏 引用
2023 International Conference on Networks, Communications and Intelligent Computing, NCIC 2023
作者: Lin, Wenhao Lin, Yifeng Yang, Yuer College of Information Science and Technology Jinan University Guangzhou China College of Cyber Security Jinan University Guangzhou China The University of Hong Kong Department of Computer Science Hong Kong Hong Kong
The K-nearest neighbor (KNN) fundamental MBR searching is a widely used technique in navigation software. It helps locate regions, such as nearby buildings, that cannot be treated as individual entities. When searchin... 详细信息
来源: 评论