咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是761-770 订阅
排序:
BadTTS: Identifying Vulnerabilities in Neural Text-to-Speech Models
BadTTS: Identifying Vulnerabilities in Neural Text-to-Speech...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Rui Zhang Hongwei Li Wenbo Jiang Ran Zhang Jiaming He School of Computer Science and Engineering University of Electronic Science and Technology of China College of Computer Science and Cyber Security (Oxford Brookes College) Chengdu University of Technology China
With the widespread use of deep learning systems in many applications, adversaries have strong incentives to perform attacks against these systems for their adversarial purposes. Reports have indicated that backdoor a... 详细信息
来源: 评论
Multi-objective optimization of task assignment in distributed mobile edge computing
收藏 引用
Journal of Reliable Intelligent Environments 2022年 第1期8卷 21-33页
作者: Almasri, Sanaa Jarrah, Moath Al-Duwairi, Basheer Department of Computer Engineering Jordan University of Science and Technology P.O. Box 3030 Irbid22110 Jordan Department of Computer Networks and Security Jordan University of Science and Technology P.O. Box 3030 Irbid22110 Jordan
Traditional computing models and centralized cloud computing are not capable of meeting today’s application requirements, especially when deploying technologies, such as the Internet of things (IoT), 5G, and wearable... 详细信息
来源: 评论
WGAN-AFL: Seed Generation Augmented Fuzzer with Wasserstein-GAN
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Liqun Li, Chunan Qiu, Yongxin Wei, Chaoren Yang, Jian Guo, Hongcheng Ma, Jinxin Li, Zhoujun School of Cyber Science and Technology Beihang University China School of Computer Science and Engineering China Information Technology Security Evaluation Center China
The importance of addressing security vulnerabilities is indisputable, with software becoming crucial in sectors such as national defense and finance. Consequently, The security issues caused by software vulnerabiliti... 详细信息
来源: 评论
Orbit Weighting Scheme in the Context of Vector Space Information Retrieval
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1347-1379页
作者: Ahmad Ababneh Yousef Sanjalawe Salam Fraihat Salam Al-E’mari Hamzah Alqudah Department of Computer Science Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Department of Cybersecurity Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityP.O.Box 346Ajman13306United Arab Emirates Information Security Department Faculty of Information TechnologyUniversity of PetraAmman11196Jordan Department of Data Science and Artificial Intelligence Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... 详细信息
来源: 评论
Deployment of Scalable Cloud Based Image Processing Application Using Fuzzy Coupled Learning Technique  1
Deployment of Scalable Cloud Based Image Processing Applicat...
收藏 引用
1st International Conference on Computational Science and technology, ICCST 2022
作者: Mathivanan, B. Nandhashree, K.R. Radhakrishnan, C. Ananthi, S. Suganthi, P. Asokan, R. Sri Ramakrishna Engineering College Department of Cse Coimbatore India Srm Valliammai Engineering College Department of Cyber Security India Kongunadu College of Engineering and Technology Department of Cse Trichy India
Because image processing typically uses a lot of memory and computational time, a sophisticated platform is needed. As a result, it's critical to adopt cost-effective solutions to replace outdated ones. We chose t... 详细信息
来源: 评论
IoT-Enhanced Gesture Recognition System for Healthcare Applications
IoT-Enhanced Gesture Recognition System for Healthcare Appli...
收藏 引用
2024 International Telecommunications Conference, ITC-Egypt 2024
作者: Krithika, L.B. Nallakaruppan, M.K. Baza, Mohamed Badr, Mahmoud Deora, Yuvraj Singh School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India College of Charleston Deparment of Computer Science CharlestonSC United States Polytechnic Institute Department of Networks and Computer Security UticaNY12201 United States
In response to the prevalent language barriers in medical settings, this paper proposes an innovative solution leveraging gesture recognition technology. Through the integration of deep learning models and Internet of... 详细信息
来源: 评论
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward security  1st
Efficient Wildcard Searchable Symmetric Encryption with For...
收藏 引用
1st International Conference on Artificial Intelligence security and Privacy, AIS and P 2023
作者: Zhang, Xi Su, Ye Wei, Zhongkai Shen, Wenting Qin, Jing College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Provincial Key Laboratory of Network and Information Security Hebei Normal University Shijiazhuang050024 China School of Information Science and Engineering Shandong Normal University Jinan250358 China School of Mathematics Shandong University Jinan250100 China College of Computer Science and Technology Qingdao University Qingdao266071 China
Wildcard Searchable Symmetric Encryption can achieve flexibility and pattern matching while protecting data privacy. There is a promising future for combining secure wildcard search with emerging technologies such as ... 详细信息
来源: 评论
Convolutional Neural Network Architecture Training Parameters Impact on Multi-Frequency Propagation Channel Model in the VHF and UHF Bands  16
Convolutional Neural Network Architecture Training Parameter...
收藏 引用
16th IEEE AFRICON, AFRICON 2023
作者: Adebowale, Quadri Ramon Udensi, Ferguson O. Tunde, Adubi Faruk, Nasir Yusuf Olayinka, Imam-Fulani Sowande, Olugbenga A. Onidare, Samuel O. Oloyede, Abdulkarim A. Olawoyin, L.A. Garba, Salisu University of Ilorin Department of Telecommunication Science Ilorin Nigeria Ohio University Department of Electrical Engineering and Computer Science Athens United States Colorado State University Department of Electrical and Computer Engineering Fort Collins United States Sule Lamido University Department of Information Technology Kafin Hausa Nigeria Sule Lamido University Department of Software Engineering Kafin Hausa Nigeria Sule Lamido University Department of Cyber Security Kafin Hausa Nigeria
A path loss estimation model that is both computationally efficient, and precise is required for link budgeting, system performance optimization, base station selection, and coverage analysis. The limitations of empir... 详细信息
来源: 评论
Fuzzy with Metaheuristics Based Routing for Clustered Wireless Sensor Networks
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 367-380页
作者: Ashit Kumar Dutta Yasser Albagory Majed Alsanea Abdul Rahaman Wahab Sait Hazim Saleh AlRawashdeh Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityAd DiriyahRiyadh13713Kingdom of Saudi Arabia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Kingdom of Saudi Arabia Department of Computing University Name:Arabeast CollegesRiyadh11583Kingdom of Saudi Arabia Department of Archives and Communication King Faisal UniversityAl AhsaHofuf31982Kingdom of Saudi Arabia Department of Cyber Security Onaizah Private CollegesUnaizah51911Kingdom of Saudi Arabia
Wireless sensor network(WSN)plays a vital part in real time tracking and data collection *** incorporates a set of numerous sensor nodes(SNs)commonly utilized to observe the target *** SNs operate using an inbuilt bat... 详细信息
来源: 评论
Joint optimization for secure ambient backscatter communication in NOMA-enabled IoT networks
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 264-269页
作者: Wali Ullah Khan Furqan Jameel Asim Ihsan Omer Waqar Manzoor Ahmed Interdisciplinary Centre for Security Reliability and Trust(SnT)/SigComUniversity of LuxembourgLuxembourg Department of Communications and Networking Aalto University02150EspooFinland Department of Communication and Information Engineering Shanghai Jiao Tong UniversityShanghai200240China Department of Engineering Thompson Rivers University(TRU)British Columbia(BC)Canada College of Computer Science and Technology Qingdao UniversityQingdao266071China
Non-Orthogonal Multiple Access(NOMA)has emerged as a novel air interface technology for massive connectivity in Sixth-Generation(6G)*** recent integration of NOMA in Backscatter Communication(BC)has triggered signific... 详细信息
来源: 评论