咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是731-740 订阅
排序:
Analysis of Credit Card Fraudulent Transactions Using Machine Learning and Artificial Intelligence
Analysis of Credit Card Fraudulent Transactions Using Machin...
收藏 引用
Intelligent cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Sriprada Ramesh Simna T M Mohana Department of Chemical Engineering RV College of Engineering® Bengaluru India Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India
The reliance on credit cards for everyday purchases has become ubiquitous in modern society. This poses security threats as cybercriminals are constantly adopting new techniques to commit fraudulent activities. The ne... 详细信息
来源: 评论
An Intelligent security-Enabled Home Automation System using Internet of Things Environment  3
An Intelligent Security-Enabled Home Automation System using...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Karthikeyan, P. Dinesh, M. Akila, A. Veeramuthu, A. Giri, Jayant Al Sherideh, Ala'a Prathyusha Engineering College Department of Eee Tiruvallur Chennai India Saveetha School of Engineering Department of Vlsi Microelectronics Chennai India R.M.K. College of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Puduvoyal India Sathyabama Institute of Science and Technology Department of Information Technology Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Zarqa University College of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
IoT technologies to bolster residential security, safety, and sustainability. By leveraging facial recognition for door access, enhancing fire safety monitoring, and integrating energy harvesting, it aims to create mo... 详细信息
来源: 评论
A Machine Learning Approach for Identifying Mental Health Disorders and Depression in Psychoactive Drug Users
A Machine Learning Approach for Identifying Mental Health Di...
收藏 引用
International Conference on Trends in Electronics and Informatics (ICEI)
作者: Cherukuri Srivardhan Esther Daniel S. Jebapriya T. Mathu Division of Computer Science and Engineering Karunya Institute of Technology & Sciences Coimbatore Division of Data Science and Cyber Security Karunya Institute of Technology & Sciences Coimbatore
Mental illnesses are among the most prevalent problems worldwide regardless of age. The current investigation examines ML (Machine Learning) methods to predict Depression and CMD (Common Mental Disorders) for people w... 详细信息
来源: 评论
MCM- F: dance hand gestures recognition with vision based features
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-21页
作者: Devi, Mampi Saharia, Sarat Kumar Bhattacharyya, Dhruba Roy, Alak Charanarur, Panem Department of Cyber Security and Digital Forensic National Forensic Sciences University Tripura Campus Agartala India Department of Computer Science and Engineering Tezpur University Tezpur India Department of Information Technology Tripura University Agartala India
To digitize and preserve the cultural heritage in the form of Indian classical dance become apparent area of research. Sattriya classical dance of North-East India (Assam) is one of the eight Indian classical dance fo...
来源: 评论
Efficient Private Circuits with Precomputation
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023年 第2期2023卷 286-309页
作者: Wang, Weijia Ji, Fanjie Zhang, Juelin Yu, Yu School of Cyber Science and Technology Shandong University Qingdao China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China Quan Cheng Shandong Laboratory Jinan China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Shanghai Qi Zhi Institute Shanghai China Shanghai Key Laboratory of Privacy-Preserving Computation Shanghai China
At CHES 2022, Wang et al. described a new paradigm for masked implementations using private circuits, where most intermediates can be precomputed before the input shares are accessed, significantly accelerating the on... 详细信息
来源: 评论
Enhancing Wireless Communication with Compact SIW Resonator-based UWB Fork Monopole Antenna  25
Enhancing Wireless Communication with Compact SIW Resonator-...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Samir, Ahmed Bendoukha, Samir Attar, Hani Ababneh, Jafar Al-Hihi, Mohammad Hafez, Mohamed Mti University Faculty of Engineering Department of Electrical Engineering Cairo Egypt Taibah University College of Engineering at Yanbu Department of Electrical Engineering Saudi Arabia Zarqa University Faculty of Engineering Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Erlangen Germany Feqs INTI-IU-University Faculty of Engineering Nilai Malaysia
The rapid expansion of wireless communication across networks and devices, driven by advancements in the Internet of Things (IoT), highlights the need for compact, lightweight, cost-effective, and efficient antennas t... 详细信息
来源: 评论
Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset  26
Improving Multilayer-Perceptron(MLP)-based Network Anomaly D...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Yin, Yuhua Jang-Jaccard, Julian Sabrina, Fariza Kwak, Jin Massey University Cybersecurity Lab School of Mathematical and Computational Sciences New Zealand Central Queensland University School of Engineering and Technology Australia Ajou University Department of Cyber Security Korea Republic of
The network intrusion threats are increasingly severe with the application of computer supported coorperative work. Machine learning algorithms have been widely used in intrusion detection systems, including Multi-lay... 详细信息
来源: 评论
IoT-Enabled Respiratory Pattern Monitoring in Critical Care: A Real-Time Recurrent Neural Network Approach  10
IoT-Enabled Respiratory Pattern Monitoring in Critical Care:...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Rajarajan, S. Kalaivani, R. Kaliammal, N. Saravanan, S.T. Ilampiray, P. Srinivasan, C. Sri Sai Ram Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Mit College of Arts and Science For Women Musiri Tamil Nadu Trichy India Department of Electronics and Communication Engineering Namakkal Tamil Nadu Rasipuram India Sphoorthy Engineering College Department of CSE-Cyber Security Telangana Hyderabad India R.M.K. Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
Critical in intensive care units (ICUs), monitoring respiratory patterns is essential for diagnosing respiratory distress early and treating patients with severe illnesses properly. Conventional monitoring techniques ... 详细信息
来源: 评论
DataJudge: Cross-Chain Data Consistency Verification Based on Extended Merkle Hash Tree  24th
DataJudge: Cross-Chain Data Consistency Verification Based o...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Zeng, Junyu Cao, Jie Dai, Shengjiang Xiang, Qiao Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Department of Electrical and Computer Engineering Queen’s University Kingston Canada School of Informatics Xiamen University Xiamen China
Consortium blockchains, with their decentralized characteristics, have found widespread applications across various industries. However, this also forms isolated data islands. These data islands have become obstacles ... 详细信息
来源: 评论
ChainSafari: A General and Efficient Blockchain Verifiable Query Scheme with Real-Time Synchronization  24th
ChainSafari: A General and Efficient Blockchain Verifiable ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Dai, Shengjiang Zeng, Junyu Cao, Jie He, Ran Xiang, Qiao School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Department of Electrical and Computer Engineering Queen’s University Kingston Canada School of Informatics Xiamen University Xiamen China
With the rapid advancement of blockchain technology, its utilization has become widespread across various domains, resulting in the accumulation of significant volumes of valuable data. This trend has created an incre... 详细信息
来源: 评论