咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是691-700 订阅
排序:
A Scalable Algorithm for Fair Influence Maximization with Unbiased Estimator
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第7期37卷 3881-3895页
作者: Rui, Xiaobin Wang, Zhixiao Peng, Hao Chen, Wei Yu, Philip S. China University of Mining and Technology School of Computer Science Jiangsu Xuzhou221116 China Mine Digitization Engineering Research Center of the Ministry of Education Jiangsu Xuzhou221116 China Beihang University School of Cyber Science and Technology Beijing100191 China Theory Center of Microsoft Research Asia Beijing100080 China University of Illinois at Chicago Department of Computer Science ChicagoIL60607 United States
This paper studies the fair influence maximization problem with efficient algorithms. In particular, given a graph G, a community structure C consisting of disjoint communities, and a budget k, the problem asks to sel... 详细信息
来源: 评论
Stranger Trust Architecture: An Advancement to Zero Trust Architecture  2nd
Stranger Trust Architecture: An Advancement to Zero Trust Ar...
收藏 引用
2nd International Conference on cybersecurity and Evolutionary Data engineering, ICCEDE 2022
作者: Choudhary, Arjun Chahar, Arun Sharma, Aditi Tripathi, Ashish Center for Cyber Security Security and Criminal Justice Sardar Patel University of Police Jodhpur India School of Engineering and Digital Sciences Nazarbayev University Asthana Kazakhstan Department of Information Technology G. L. Bajaj Institute of Technology and Management Greater Noida India
security in ever changing environment is the need of the hour and no business or establishment can survive without a proper and suitable security mechanism. There have been several mechanisms for attending the needs o... 详细信息
来源: 评论
Transfer Learning-Based Lithium-Ion Battery State of Health Estimation With Electrochemical Impedance Spectroscopy
收藏 引用
IEEE Transactions on Transportation Electrification 2025年 第3期11卷 7910-7920页
作者: Lin, Mingqiang Hu, Dingcai Meng, Jinhao Wu, Ji Fujian Institute of Research on the Structure of Matter Chinese Academy of Sciences Quanzhou Institute of Equipment Manufacturing Jinjiang362200 China Fujian Normal University College of Computer and Cyber Security Fuzhou350007 China University of Chinese Academy of Sciences Fujian College Fuzhou350002 China Xi’an Jiaotong University School of Electrical Engineering Shaanxi Xi’an710049 China Hefei University of Technology School of Automotive and Transportation Engineering Anhui Hefei230009 China
Lithium-ion batteries are utilized as energy storage units in mobile devices, electric vehicles, and other fields. To ensure the safety and reliability of batteries, the prediction of the batteries’ state of health (... 详细信息
来源: 评论
Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders(E-HAE)
收藏 引用
computer Systems Science & engineering 2023年 第9期46卷 3261-3284页
作者: Lelisa Adeba Jilcha Deuk-Hun Kim Julian Jang-Jaccard Jin Kwak ISAA Lab. Department of AI Convergence NetworkAjou UniversitySuwon16499Korea ISAA Lab. Institute for Information and CommunicationAjou UniversitySuwon16499Korea Department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand Department of Cyber Security Ajou UniversitySuwon16499Korea
Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or *** growing use of Internet of Things(IoT)technology in the contemp... 详细信息
来源: 评论
Bullyproof Sentinel: Fortifying Online Spaces Against Bullying using Machine Learning  7
Bullyproof Sentinel: Fortifying Online Spaces Against Bullyi...
收藏 引用
7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2023
作者: Dilshani, M.M.T. Vinoshan, T. Wijesinghe, W.A.S.D. Jathushan, V. Senarathne, Amila Gunasinghe, Amali Sri Lanka Institute of Information Technology Faculty of Computing Cyber Security Specialization Malabe Sri Lanka Sliit Cisco Academy Sri Lanka Institute of Information Technology Industry Engagement Unit Department of Computer Systems Engineering Manager Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
In the current social media landscape, cyberbullying and online harassment remain pressing issues. Therefore, we planned a cyberbullying detection system for social media platforms. It can protect online communities f... 详细信息
来源: 评论
Application of Neural Networks for Network Traffic Monitoring and Analysis  8
Application of Neural Networks for Network Traffic Monitorin...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Kushnerov, Oleksandr Murr, Pierre Herasymov, Serhii Milevskyi, Stanislav Melnyk, Marharyta Golovashych, Sergii Sumy State University Department of Economic Cybernetics Sumy Ukraine International University of Science and Technology in Kuwait Computer Engineering Department Kuwait Kuwait 'Kharkiv polytechnic institute' Cybersecurity department National Technical University Kharkiv Ukraine Set University Department of Cyber Security and information protection Kyiv Ukraine National Technical University 'Kharkiv polytechnic institute' Department of Software Engineering and Management Intelligent Technologies Kharkiv Ukraine
Monitoring and analyzing network traffic are critically important tasks in the context of increasing cyber threats. Traditional data processing methods often struggle to handle the large volumes and complexity of mode... 详细信息
来源: 评论
CPIMAC: MEC-assisted Message Dissemination Based on Traffic Prediction at Intersections  10
CPIMAC: MEC-assisted Message Dissemination Based on Traffic ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Liu, Bingyi Shao, Xun Zhao, Haoxiang Wang, Enshu Liu, Zhi Wuhan University of Technology Sanya Science and Education Innovation Park Sanya China Toyohashi University of Technology Department of Electrical and Electronic Information Engineering Aichi Japan Wuhan University School of Cyber Science and Engineering Wuhan China The University of Electro-Communications Department of Computer and Network Engineering Tokyo Japan
The Internet of Vehicles (IoV) is gaining increasing attention for its ability to improve traffic safety and efficiency by providing situational awareness and detecting potential hazards beyond the visual range. Time ... 详细信息
来源: 评论
An Innovative Way to Increase the Speed and Efficiency of Reverse Mapping of Elliptic Curve Points  6
An Innovative Way to Increase the Speed and Efficiency of Re...
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Ray, Ryan Saptarshi Das, Debendranath Sengupta, Aritro Kumar, Pankaj Sahani, Arun Kumar Govt. College of Engineering and Ceramic Technology Information Technology Kolkata India Indian Statistical Institute Cryptology and Security Research Unit Kolkata India Lingaya's Vidyapeeth Department of Computer Science and Engineering Haryana Faridabad India
Elliptic curve cryptography is a widely recognized method of using a public key cryptosystem for encrypting and decrypting data. The message must be transformed to points on an Elliptic Curve using a mapping algorithm... 详细信息
来源: 评论
Privacy-Preserving Edge-Aided Eigenvalue Decomposition in Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19901-19914页
作者: Zhao, Xiaotong Zhang, Hanlin Lin, Jie Liang, Fan Kong, Fanyu Xu, Hansong Hua, Kun Qingdao University College of Computer Science and Technology Qingdao266071 China Xian Jiaotong University School of Electronic and Information Engineering Xian710049 China Sam Houston State University Department of Computer Science HuntsvilleTX77340 United States Shandong University School of Software Jinan250101 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China California Polytechnic State University Department of Electrical Engineering San Luis ObispoCA93407 United States
Eigenvalue decomposition (EVD) is a fundamental yet time-consuming operation with extensive applications in IoT. When the matrix dimension reaches millions, resource-limited IoT devices struggle to perform such comput... 详细信息
来源: 评论
Novel Ransomware Hiding Model Using HEVC Steganography Approach
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1209-1228页
作者: Iman Almomani Aala AlKhayer Walid El-Shafai Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School for Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Ransomware is considered one of the most threatening *** solutions have focused mainly on discriminating ransomware by analyzing the apps themselves,but they have overlooked possible ways of hiding ransomware apps and... 详细信息
来源: 评论