咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是681-690 订阅
排序:
Optimizing Spatial Pattern Analysis in Serial Remote Sensing Images through Empirical Mode Decomposition and Ant Colony Optimization
收藏 引用
Journal of Harbin Institute of technology(New Series) 2024年 第4期31卷 52-60页
作者: J Srinivasan S Uma Saleem Raja Abdul Samad Jayabrabu Ramakrishnan Department of Computer Applications Madanapalle Institute of Technology&Science(MITS)Madanapalle 517325Andhra PradeshIndia Department of Information Technology Panimalar Engineering CollegeChennai 600123India Information Technology Department College of Computing and Information SciencesUniversity of Technology and Applied Sciences-Shinas 324Sultanate of Oman Department of Information Technology and Security College of Computer Science and Information TechnologyJazan UniversityJazan 45142Kingdom of Saudi Arabia
Serial remote sensing images offer a valuable means of tracking the evolutionary changes and growth of a specific geographical area over *** the original images may provide limited insights,they harbor considerable po... 详细信息
来源: 评论
Machine Learning is All You Need: A Simple Token-Based Approach for Effective Code Clone Detection  24
Machine Learning is All You Need: A Simple Token-Based Appro...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Feng, Siyue Suo, Wenqi Wu, Yueming Zou, Deqing Liu, Yang Jin, Hai Huazhong University of Science and Technology China Nanyang Technological University Singapore Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Jinyinhu Laboratory Wuhan430074 China School of Cyber Science and Engineering Hust Wuhan430074 China School of Computer Science and Technology Hust Wuhan430074 China
As software engineering advances and the code demand rises, the prevalence of code clones has increased. This phenomenon poses risks like vulnerability propagation, underscoring the growing importance of code clone de... 详细信息
来源: 评论
Enhancing Deepfake Detection:Proactive Forensics Techniques Using Digital Watermarking
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 73-102页
作者: Zhimao Lai Saad Arif Cong Feng Guangjun Liao Chuntao Wang School of Automation Guangdong University and TechnologyGuangzhou510006China School of Immigration Administration(Guangzhou) China People’s Police UniversityGuangzhou510663China Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl Ahsa31982Saudi Arabia Cyber Police Division Guangzhou Public Security BureauGuangzhou510030China School of Forensic Science and Technology Guangdong Police CollegeGuangzhou510320China College of Mathematics and Informatics South China Agricultural UniversityGuangzhou510642China
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly *** paper ... 详细信息
来源: 评论
Intelligent System for Crime and Insecurity Management  2
Intelligent System for Crime and Insecurity Management
收藏 引用
2nd International Conference on Multidisciplinary engineering and Applied Science, ICMEAS 2023
作者: Nwankwo, Wilson Ukaoha, Kingsley C. Irikefe, Eti Friday Peter, Ovilli Oghorodi, Duke Jeroh, Esemena Eterighoi, Okpu Okpomo Atajeromavwo, Edafe John Adebowale, Oyewale Mojeed Ogheneochuko, Ubrurhe Delta State University of Science and Technology Department of Cyber Security Ozoro Nigeria Pan Atlantic University Department of Computer Science Lekki Nigeria Delta State University of Science and Technology Department of Information Systems and Technology Ozoro Nigeria Delta State University of Science and Technology Dept. of Information Technology Ozoro Nigeria Delta State University of Science and Technology Department of Computer Science Ozoro Nigeria Delta State University of Science and Technology Department of Library and Information Science Ozoro Nigeria Delta State University of Science and Technology Dept. of Cyber Security Ozoro Nigeria Delta State University of Science and Technology Department of Software Engining Ozoro Nigeria
As the global law enforcement workforce faces unprecedented challenges such as declining numbers and shifting demographics, the need for innovative solutions to manage crime and insecurity is becoming increasingly cri... 详细信息
来源: 评论
Predictive Modeling of Poultry Growth Optimization in IoT-Connected Farms Using SVM for Sustainable Farming Practices  10
Predictive Modeling of Poultry Growth Optimization in IoT-Co...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Kiruthika, R. Sahoo, Santosh Kumar Vathani, B. Santha Reddy, G. Rakesh Rajanarayanan, S. Prakash, S. Sri Sairam Institute of Technology Department of Chemistry Tamil Nadu Chennai India Vit University Department of Engineering and Technology Madhya Pradesh Bhopal India Mahalashmi Women's College of Arts and Science Department of Management Studies Tamil Nadu Chennai India Sphoorthy Engineering College Department of CSE-Cyber Security Telangana Hyderabad India Vinayaka Mission's Kirupananda Variyar Engineering College Department of Computer Science and Engineering Tamil Nadu Salem India Adhiparasakthi Engineering College Department of Electronics and Communication Engineering Tamil Nadu Melmaruvathur India
Modern agriculture uses the Internet of Things (IoT) to improve production and sustainability. This research predicts poultry growth on IoT-connected farms to enhance sustainable farming. Predictive models are created... 详细信息
来源: 评论
Polynomial-Time Assignment-Based Cell Association with Generic Utility Functions
收藏 引用
China Communications 2022年 第9期19卷 214-228页
作者: Lusheng Wang Chao Fang Hai Lin Min Peng Caihong Kai Key Laboratory of Knowledge Engineering with Big Data Ministry of Education.School of Computer Science and Information EngineeringHefei University of TechnologyHefei 230601China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education.School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Cell association is a significant research issue in future mobile communication systems due to the unacceptably large computational time of traditional *** article proposes a polynomial-time cell association scheme wh... 详细信息
来源: 评论
GreenTrust: Trust Assessment Using Ensemble Learning in Internet of Microgrid Things
收藏 引用
IEEE Internet of Things Journal 2024年
作者: Ali, Wajahat Din, Ikram Ud Almogren, Ahmad Rodrigues, Joel J. P. C. University of Haripur Department of Information Technology Pakistan King Saud University College of Computer and Information Sciences Cyber Security Department of Computer Science Riyadh11633 Saudi Arabia
With the rise in industries and population, electricity demand is increasing daily. Microgrids play a crucial role in providing green energy by utilizing renewable energy resources. Microgrids not only help meet the g... 详细信息
来源: 评论
Evaluation and Optimization of computer Multimedia Assisted Network Teaching Information Ecosystem  24
Evaluation and Optimization of Computer Multimedia Assisted ...
收藏 引用
24th International Arab Conference on Information technology, ACIT 2023
作者: Tarish, Hiba A. Hassan, Rosilah Jaber, Mustafa Musa Raheema, Alaa Q. University of Technology Civil Engineering Department Baghdad Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Selangor Bangi Malaysia Iraqi Commission ForComputers and Informatic Baghdad Iraq
At present, the continuous progress in contemporary multimedia innovation on optimization of computer-assisted network teaching with the evaluation of digital learning assets improves students in their cognitive struc... 详细信息
来源: 评论
GAI-Enhanced Intrusion Detection using Began-GRU Framework to Address Data Imbalance
GAI-Enhanced Intrusion Detection using Began-GRU Framework t...
收藏 引用
Automation, Computing and Renewable Systems (ICACRS), International Conference on
作者: Shivanthana S Ciza Thomas Cyber Security Karunya Institute of Technology and Sciences Coimbatore India Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India
With the developing communication technologies, the networks become more complicated and data is raised, which expands the surface of threats and increases the security risks. However, due to evolution of modern netwo... 详细信息
来源: 评论
Optimized Data Storage Algorithm of IoT Based on Cloud Computing in Distributed System
Optimized Data Storage Algorithm of IoT Based on Cloud Compu...
收藏 引用
2024 OPJU International technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Deepthi, K.Jaya Balakrishnan, T.Suresh Krishnan, Prabhakar Ebenezar, U.Samson Nageshwari Mohan Babu University Department of Aiml AP Tirupati India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy620009 India
IoT and cloud technology are vital for large systems. An improved data storage technique for IoT applications and cloud distribution is described in this research. Scalability, reliability, latency, and resource usage... 详细信息
来源: 评论