咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是741-750 订阅
排序:
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense  28
Every Time Can Be Different: A Data Dynamic Protection Metho...
收藏 引用
28th IEEE Symposium on computers and Communications, ISCC 2023
作者: Tang, Zhimin Ma, Duohe Sun, Xiaoyan Chen, Kai Wang, Liming Jiang, Junye Institute of Information Engineering Chinese Academy of Sciences Beijing China California State University Department of Computer Science Sacramento United States School of Cyber Security University of Chinese Academy of Sciences Beijing China
Traditional defense methods are hard to change the inherent vulnerabilities of static data storage, single data access, and deterministic data content, leading to frequent data leakage incidents. Moving target defense... 详细信息
来源: 评论
Diversified Grid Optimization Model to Handle Fast Charging Provision of Electric Vehicles Using Artificial Intelligence (AI) Technique
Diversified Grid Optimization Model to Handle Fast Charging ...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Karthik, G. Kumar, R.Sampath Manimegalai, L. Rajkumar, G.Vinoth Adkane, R.V. Odeh, Mahmoud Department of Computer Science and Engineering Salem India Kpr institute of Engineering and Technology Department of Mechatronics Engineering Coimbatore India R.M.K. College of Engineering and Technology Department of Electronics and Communication Chennai India J.P College of Engineering Department of Electronics and Communication Engineering Tenkasi India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Zarqa University Faculty of Information Technology Department of Cyber Secuity Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
The transportation industry is taking a giant leap forward towards a dependable, carbon-neutral future thanks to electric vehicles (EVs). The growing number of electric vehicles on the road is putting a strain on powe... 详细信息
来源: 评论
A Novel Two-Stage Feature Selection Framework for Efficiently Diagnosing Alzheimer's Disease  7
A Novel Two-Stage Feature Selection Framework for Efficientl...
收藏 引用
7th International Conference on Data Science and Information technology, DSIT 2024
作者: Lu, Pinya Gao, Wenzhao Pan, Jie Yang, Hongqin Ding, Xuemei Fujian Normal University College of Computer and Cyber Security Fuzhou China Ulster University School of Computing Engineering & Intelligent Systems NI Derry-Londonderry United Kingdom Xiamen Jingyi Zhikang Technology Company Xiamen China Fujian Normal University College of Photonic and Electronic Engineering Fuzhou China
Research focus on the trade-off between diagnostic accuracy for Alzheimer's disease (AD) and time management for diagnosis is very limited. This study proposes a novel two-stage feature selection framework integra... 详细信息
来源: 评论
Hermes - Smart College Application using Android
Hermes - Smart College Application using Android
收藏 引用
Advancements in Smart, Secure and Intelligent Computing (ASSIC), International Conference on
作者: U.M. Fernandes Dimlo M SilpaRaj Ch. Srilakshmi DBK Kamesh Allam Balaram Department of CSE Sreyas Institute of Engineering and Technology Department of Computer Science and Engineering (Cyber Security) CVR College of Engineering Department of IT VNR Vignana Jyothi Institute of Enginnering and Technology Hyderabad Department of CSE Malla Reddy Engineering College for Women Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
Android apps emerged with modern technology. It's time to ditch websites for apps. We are thrilled to debut the Smart-College app, which will act like a condensed college website. The teaching staff and parents of...
来源: 评论
Utilizing Smartwatches and Deep Learning Models for Enhanced Avalanche Victim Identification, Localization, and Efficient Recovery Strategies: An In-depth Study  23
Utilizing Smartwatches and Deep Learning Models for Enhanced...
收藏 引用
Proceedings of the 5th International Conference on Information Management & Machine Intelligence
作者: Khyati Jha Mansi Pasbola Hari Mohan Rai Saule Amanzholova Department of Computer Science Dronacharya Group of Institutions India Faculty of Computer Technologies and Cyber Security International University of Information Technology Kazakhstan
This article explores the transformative impact of modern technology on avalanche response and safety, addressing the longstanding challenges associated with avalanches in mountainous regions. Historically, avalanches... 详细信息
来源: 评论
Deepfake Video Detection: Analysis for Deep Learning models using Transfer Learning
Deepfake Video Detection: Analysis for Deep Learning models ...
收藏 引用
Information technology (ACIT)
作者: Shahad Altamimi Walid Salameh Cyber Security Department Princess Sumaya University for Technology Amman Jordan Computer Science Department Princess Sumaya University for Technology Amman Jordan
The unchecked spread of deepfake videos jeopardizes public trust, national security, and media credibility. The capacity to recognize falsified videos is critical for protecting privacy and combatting misinformation. ... 详细信息
来源: 评论
Experimental Evaluation of an Improved Air Quality Prediction Approach Based on AI Powered Deep Learning Mechanism
Experimental Evaluation of an Improved Air Quality Predictio...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Ranjithkumar, J. Malarvizhi, C. Porkodi, M. Vidhyasree, V. Neeraj, S. Al-Mousa, M.R. Jeppiaar Engineering College Department of Ece Chennai India Rajalakshmi Institute of Technology Department of Ece Chennai India Sona College of Technology Department of Eee Salem India Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India College of Information Technology Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Everyone knows that pollution is becoming worse and worse, and that this is contributing to a sharp increase in global mortality rates;nevertheless, 'Air-Pollution' is particularly harmful to humans. Air pollu... 详细信息
来源: 评论
A Secure and Lightweight Chaos Based Image Encryption Scheme
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 279-294页
作者: Fadia Ali Khan Jameel Ahmed Fehaid Alqahtani Suliman A.Alsuhibany Fawad Ahmed Jawad Ahmad Department of Electrical Engineering Riphah International UniversityIslamabad44000Pakistan Department of Computer Science King Fahad Naval AcademyAl Jubail35512Saudi Arabia Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Cyber Security Pakistan Navy Engineering CollegeNUSTKarachi 75350Pakistan School of Computing Edinburgh Napier UniversityEdinburghEH105DTUnited Kingdom
In this paper,we present an image encryption scheme based on the multi-stage chaos-based image encryption *** method works on the principle of confusion and *** proposed scheme containing both confusion and diffusion ... 详细信息
来源: 评论
Total Harmonics Distortion Prediction at the Point of Common Coupling of industrial load with the grid using Artificial Neural Network
收藏 引用
Energy and AI 2023年 第4期14卷 294-303页
作者: Emenike Ugwuagbo Adeola Balogun Biplob Ray Adnan Anwar Chikodili Ugwuishiwu Centre for Space Transport and Propulsion (CSTP)Epe1 LASU Epe driveLagos106101Nigeria Department of Electrical&Electronics Engineering University of LagosAkoka101017LagosNigeria Centre for Intelligent Systems(CIS) School of Engineering and TechnologyCQ UniversityNorman Gardens4701RockhamptonAustralia Strategic Centre for Cyber Security Research Institute(CSRI) School of Information TechnologyDeakin UniversityGeelong3216MelbourneAustralia Department of Computer Science University of NigeriaNsukka410001EnuguNigeria
Power quality challenges have generated a lot of disputes between utilities,customers,network operators,and equipment manufacturers around the world as regards the share of responsibility for power quality solutions,t... 详细信息
来源: 评论
A security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论