咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是771-780 订阅
排序:
Revolutionizing Global Logistics: Integrating Advanced Supply Chain Management Techniques in the Digital Era
Revolutionizing Global Logistics: Integrating Advanced Suppl...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Ramkumar, M. Siva Arun, M. Gopan, Gokul Giri, Jayant Al-Qawasmi, Khaled Sns College of Technology Dept of Ece India Saveetha University Department of Mechanical Engineering Chennai602105 India YeshwantraoChavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Saveetha University Department of Vlsi Microelectronics TN Chennai602105 India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
In the digital era, global logistics and supply chain management are undergoing a revolutionary transformation, driven by advancements in technology and interconnected systems. This evolution aims to enhance operation... 详细信息
来源: 评论
Effective Classification of Synovial Sarcoma Cancer Using Structure Features and Support Vectors
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 2521-2543页
作者: P.Arunachalam N.Janakiraman Junaid Rashid Jungeun Kim Sovan Samanta Usman Naseem Arun Kumar Sivaraman A.Balasundaram Department of Electronics and Communication Engineering K.L.N.College of EngineeringPottapalayam630612Tamil NaduIndia Department of Computer Science and Engineering Kongju National UniversityCheonan 31080Korea Department of Mathematics Tamralipta MahavidyalayaTamluk721636West Bengal School of Computer Science University of SydneyNSW 2006Australia School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India School of Computer Science and Engineering Centre for Cyber Physical SystemsVellore Institute of TechnologyChennai600127India
In this research work,we proposed a medical image analysis framework with two separate releases whether or not Synovial Sarcoma(SS)is the cell structure for *** this framework the histopathology images are decomposed ... 详细信息
来源: 评论
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
Women in Computing (InCoWoCo), International Conference for
作者: Rahul Roshan G Vishal S Salanke Nagasundari S Department of Computer Science and Engineering Research Center for Information Security Forensics and Cyber Resilience PES University Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
Comprehensive Review of Capsule Networks with a Case Study on Potato Leaf Disease Detection Using CapsNet and Attention Mechanism  8th
Comprehensive Review of Capsule Networks with a Case Stud...
收藏 引用
8th International Symposium on Intelligent Informatics, ISI 2023
作者: Shenbaga Moorthy, Rajalakshmi Arikumar, K.S. Prathiba, Sahaya Beni Pabitha, P. Sri Ramachandra Faculty of Engineering and Technology Sri Ramachandra Institute of Higher Education and Research Chennai600 116 India Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Chennai603 203 India Centre for Cyber Physical Systems School of Computer Science and Engineering Vellore Institute of Technology Chennai600127 India Department of Computer Technology Anna University Madras Institute of Technology Campus Chennai600044 India
Accurate solutions are needed for a variety of computer vision applications, including medical imaging, object detection, and recognition. Such complicated challenges are beyond the capabilities of artificial intellig... 详细信息
来源: 评论
Discrete ripplet-II transform feature extraction and metaheuristic-optimized feature selection for enhanced glaucoma detection in fundus images using least square-support vector machine
收藏 引用
Multimedia Tools and Applications 2024年 1-33页
作者: Sharma, Santosh Kumar Muduli, Debendra Rath, Adyasha Dash, Sujata Panda, Ganapati Shankar, Achyut Dobhal, Dinesh Chandra Department of Computer Science and Engineering C.V. Raman Global University Odisha India Department of Information Technology School of Engineering and Technology Nagaland University Dimapur India Department of Cyber Systems Engineering WMG University of Warwick CoventryCV74AL United Kingdom University Centre for Research & amp Development Chandigarh University Punjab Mohali140413 India School of Computer Science Engineering Lovely Professional University Punjab Phagwara144411 India Center of Research Impact and Outcome Chitkara University Punjab Rajpura India Department of Computer Science & amp Engineering Graphic Era Deemed to be University Uttarakhand Dehradun248002 India
Recently, significant progress has been made in developing computer-aided diagnosis (CAD) systems for identifying glaucoma abnormalities using fundus images. Despite their drawbacks, methods for extracting features su... 详细信息
来源: 评论
Across Images and Graphs for Question Answering  40
Across Images and Graphs for Question Answering
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Wen, Zhenyu Qian, Jiaxu Qian, Bin Yuan, Qin Qin, Jianbin Xuan, Qi Yuan, Ye Institute of Cyberspace Security Zhejiang University of Technology Hangzhou China Binjiang Cyberspace Security Institute of ZJUT Hangzhou China University of Science and Technology of China Department of Electronic Engineering and Information Science China School of Computing Newcastle University Newcastle Upon Tyne United Kingdom School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Computer Shenzhen University Shenzhen China
Cross-source query serves as a proxy for scene understanding to support many web applications such as rec-ommendation systems, e-commerce, and e-learning applications. In this paper, we propose SVQA that semantically ... 详细信息
来源: 评论
Efficient Deep CNN Model for COVID-19 Classification
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4373-4391页
作者: Walid El-Shafai Amira A.Mahmoud El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Mohammed Abd-Elnaby Fathi E.Abd El-Samie Department Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Coronavirus(COVID-19)infection was initially acknowledged as a global pandemic in Wuhan in *** Health Organization(WHO)stated that the COVID-19 is an epidemic that causes a 3.4%death *** X-Ray(CXR)and computerized Tom... 详细信息
来源: 评论
Adaptive System-Level Fault Diagnosis of Bijective Connection Networks
收藏 引用
IEEE Transactions on Reliability 2025年 第2期74卷 2916-2926页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan School of Mathematics and Statistics Fujian Normal University College of Computer and Cyber Security Fuzhou 350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan 701 Taiwan
As the multiprocessor systems are becoming largescale, fault-diagnosis is crucial to ensure the reliability of multiprocessor systems. In order to improve the self-diagnosis capability of a multiprocessor system, a pe... 详细信息
来源: 评论
Trust delegation-based secure mobile cloud computing framework
Trust delegation-based secure mobile cloud computing framewo...
收藏 引用
2023 IEEE International Conference on Emerging Trends in engineering, Sciences and technology, ICES and T 2023
作者: Hasan, Muhammad Zulkifl Hussain, Muhammad Zunnurain Sarwar, Nadeem Ullah, Zaka Alam, Intakhab Irshad, Asma University of Central Punjab Faculty of Computer Science and Information Technology Lahore Pakistan Bahria University Lahore Campus Department of Computer Science Pakistan Air University Aerospace and Aviation Campus Department of Computer Science and Cyber Security Kamra Pakistan University of Sialkot Department of Information Technology Sialkot Pakistan University of the Punjab School of Biochemistry and Biotechnology Lahore Pakistan
Nowadays, practically everyone has a smartphone with them. These smart devices store several types of personal information, such as images, files, credit card pins, etc., and are used for communication purposes. Consi... 详细信息
来源: 评论
Expert Phishing Detection System
Expert Phishing Detection System
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications technology, IAICT 2024
作者: Alsarhan, Ayoub Al-Aiash, Issa Al-Fraihat, Dimah Aljaidi, Mohammad Abu Laila, Dena Abd Al Hakem Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论