咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是701-710 订阅
排序:
Lightweight Authenticated Key Agreement Protocol for Smart Power Grid Systems Using PUF
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 3568-3580页
作者: Zahoor, Amina Mahmood, Khalid Saleem, Muhammad Asad Badar, Hafiz Muhammad Sanaullah Le, Tuan-Vinh Das, Ashok Kumar Department of Computer Science Sahiwal57000 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Emerson University Multan Department of Emerging Computing Technologies Multan61000 Pakistan Fu Jen Catholic University Bachelor's Program of Artificial Intelligence and Information Security New Taipei City24206 Taiwan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India
The Smart Power Grid (SPG) is pivotal in orchestrating and managing demand response in contemporary smart cities, leveraging the prowess of Information and Communication Technologies (ICTs). Within the immersive SPG e... 详细信息
来源: 评论
TELEX: Two-Level Learned Index for Rich Queries on Enclave-based Blockchain Systems
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第7期37卷 4299-4313页
作者: Wu, Haotian Tang, Yuzhe Shen, Zhaoyan Tao, Jun Lin, Chenhao Peng, Zhe The Hong Kong Polytechnic University Department of Industrial and Systems Engineering Hong Kong Syracuse University Department of Electrical Engineering and Computer Science United States Shandong University School of Computer Science and Technology China Southeast University School of Cyber Science and Engineering China Xi'an Jiaotong University Faculty of Electronic and Information Engineering China The Hong Kong Polytechnic University Shenzhen Research Institute Hong Kong
Blockchain has become a popular paradigm for secure and immutable data storage. Despite its numerous applications across various fields, concerns regarding the user privacy and result integrity during data queries per... 详细信息
来源: 评论
Machine Learning-Enhanced Analysis of Genomic Data for Precision Medicine
Machine Learning-Enhanced Analysis of Genomic Data for Preci...
收藏 引用
2024 OPJU International technology Conference on Smart Computing for Innovation and Advancement in Industry 4.0, OTCON 2024
作者: Sasikala, R. Deepthi, K. Jaya Balakrishnan, T. Suresh Krishnan, Prabhakar Ebenezar, U. Samson Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy620009 India Mohan Babu University Department of Aiml Ap Tirupati India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-Campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
Precision medicine employs genetic data, which is enhanced with machine learning algorithms, to determine the most relevant treatment method per patient's genotype. We have zoned in on the area of a machine learni... 详细信息
来源: 评论
DapperFL: Domain Adaptive Federated Learning with Model Fusion Pruning for Edge Devices  38
DapperFL: Domain Adaptive Federated Learning with Model Fusi...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Jia, Yongzhe Zhang, Xuyun Hu, Hongsheng Choo, Kim-Kwang Raymond Qi, Lianyong Xu, Xiaolong Beheshti, Amin Dou, Wanchun State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China School of Computing Macquarie University Australia School of Information and Physical Sciences University of Newcastle Australia Department of Information Systems and Cyber Security University of Texas San Antonio United States College of Computer Science and Technology China University of Petroleum [East China China School of Computer and Software Nanjing University of Information Science and Technology China
Federated learning (FL) has emerged as a prominent machine learning paradigm in edge computing environments, enabling edge devices to collaboratively optimize a global model without sharing their private data. However...
来源: 评论
INCL: An Effective Deep Learning Model to Identify Road Potholes by Using Image Based Neural Classification Logic
INCL: An Effective Deep Learning Model to Identify Road Poth...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Shasikala, Y. Kantha, M.Rajitha Dinesh, M. Nagamani, K. Bonde, A. Afanehsuha AdityaUniversity Departmentof Computer Applications Surampalem India Qis College of Engineering and Technology Department of S&h Pondur Road Vengamukkapalem Ongole Prakasam AndhraPradesh Prakasam District India Dept of Vlsi Microelectronics Chennai India Qis College of Engineering and Technology Department of Mba Pondur Road Vengamukkapalem Ongole Prakasam India AndhraPradesh Prakasam District India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan Universiry of Business and Technology Jeddah21448 Saudi Arabia
This paper presents a deep learning-based approach for detecting road potholes using image-based neural classification logic. The methodology involves collecting road images from publicly available datasets, particula... 详细信息
来源: 评论
Shared Resource Entanglement Attacks against Serverless Computing
Shared Resource Entanglement Attacks against Serverless Comp...
收藏 引用
IEEE Conference on Communications and Network security (CNS)
作者: Yuwen Cui Mingkui Wei Zhuo Lu Yao Liu Department of Computer University of South Florida Department of Cyber Security Engineering George Mason University Department of Electrical Engineering University of South Florida
Serverless computing has emerged as a popular paradigm for building and deploying applications in the cloud. At the heart of this paradigm lies the concept of serverless functions, which have gained significant popula... 详细信息
来源: 评论
A Framework for Securing Saudi Arabian Hospital Industry: Vision-2030 Perspective
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2773-2786页
作者: Hosam Alhakami Abdullah Baz Mohammad Al-shareef Rajeev Kumar Alka Agrawal Raees Ahmad Khan Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955SaudiArabia Department of Computer Engineering College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Security Forces Hospital Makkah21955Saudi Arabia Department of Computer Science and Engineering Babu Banarasi Das UniversityLucknow226028Uttar PradeshIndia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia
Recent transformation of Saudi Arabian healthcare sector into a reven-ue producing one has signaled several advancements in healthcare in the *** healthcare management into Smart hospital systems is one of *** hospita... 详细信息
来源: 评论
Heart Attack Prediction by Integrating Independent Component Analysis with Machine Learning Classifiers  17
Heart Attack Prediction by Integrating Independent Component...
收藏 引用
17th International Conference on Developments in eSystems engineering, DeSE 2024
作者: Nawar, Abbas Khalifa Jebur, Sabah Abdulazeez Jawad, Hasan Abdulrazzaq Jahefer, Mothefer Majeed Alkhazraji, Lafta Hussain, Abir Jaafar Dept of Computer Techniques Engineering Imam Alkadhim University College Baghdad Iraq Dept of Cyber Security Imam Alkadhim University College Baghdad Iraq Department of Medical Instrumentation Engineering Techniques Imam Ja'afar Al-Sadiq University Iraq Department of Electrical Engineering University of Sharjah Sharjah United Arab Emirates
Detecting heart attack conditions at an early stage is crucial for healthcare, making innovative solutions that contribute to prevention and overall health improvement imperative. Machine learning, as a subset of Arti... 详细信息
来源: 评论
Energy Harvesting and Smart Wireless Home Automation System using Internet of Things based Applications  3
Energy Harvesting and Smart Wireless Home Automation System ...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Veeramuthu, A. Dinesh, M. Jayamani, K. Saravanan, L. Giri, Jayant Al Sherideh, Ala'a Sathyabama Institute of Science and Technology Department of Information Technology Chennai India Saveetha School of Engineering Department of Vlsi Microelectronics Chennai India Rajalakshmi Institute of Technology Chennai India Peri Institute of Technology Department of Ece Mannivakkam Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Division of Research and Development Lovely Professional University Phagwara India Zarqa University College of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
A comprehensive approach to energy-efficient smart home automation leveraging IoT technologies. The Altair Smart Core IoT platform integrates with Arduino, enabling remote control and management of household devices. ... 详细信息
来源: 评论
Applied Aspects of Polyharmonic Functions for security and Reliability of Data Transmission  8
Applied Aspects of Polyharmonic Functions for Security and R...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Laptiev, Oleksandr Sobchuk, Andrii Ryzhov, Anton Perehuda, Oleh Tsygansvska, Iryna Kopytko, Serhii Taras Shevchenko National University of Kyiv Faculty of information technology Department of Cyber Security and Information Protection Kyiv Ukraine State University of Information and Communication Technologies Department of Information and Cyber Security Kyiv Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Department of General Mathematics Kyiv Ukraine Taras Shevchenko National University of Kyiv Faculty of Mechanics and Mathematics Department of Algebra and Computer Mathematics Kyiv Ukraine Lviv Polytechnic National University Department of Information Systems and Networks Lviv Ukraine
At present, when armed conflicts have intensified, and especially against the background of Russia's armed aggression against Ukraine, a new era of development of high-precision means of protection and weapons has... 详细信息
来源: 评论