咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是781-790 订阅
排序:
Optimizing Resource Allocation Framework for Multi-Cloud Environment
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4119-4136页
作者: Tahir Alyas Taher M.Ghazal Badria Sulaiman Alfurhood Ghassan F.Issa Osama Ali Thawabeh Qaiser Abbas Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebansaan Malaysia(UKM)43600BangiSelangorMalaysia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11564Saudi Arabia Skyline University College University City Sharjah1797SharjahUAE Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351Saudi Arabia
Cloud computingmakes dynamic resource provisioning more *** a functioning service is crucial,and changes are made when particular criteria are *** research explores the decentralized multi-cloud environment for alloca... 详细信息
来源: 评论
A Review on Crop Yield Prediction using Deep Learning
A Review on Crop Yield Prediction using Deep Learning
收藏 引用
International Conference on Inventive Systems and Control (ICISC)
作者: Sheily Verma Panwar Shubham Singh Department of computer Science/ Cyber security CUC-Ulster University Doha Qatar Era Smith Technology Noida India
The integration of cutting-edge technology into agricultural practices has catalyzed a transformative shift in global agriculture. This research study focuses on the revolutionary impact of deep learning approaches on... 详细信息
来源: 评论
AI-Enabled DDoS Detection and Mitigation in the Software Defined Network
AI-Enabled DDoS Detection and Mitigation in the Software Def...
收藏 引用
Electronics and Sustainable Communication Systems (ICESC), 2020 International Conference on
作者: K. Deepthika T. Vanaja S. Keerthika Prajwalasimha S N Department of Computer Science and Engineering (Cyber Security) School of Engineering Dayananda Sagar University Bangalore India Kongu Engineering College Erode India
Traditional networks typically employ a decentralized control plane, while Software Defined Networking (SDN), a dynamic networking space, adopts a centralized control system. SDN has many benefits, including precise c... 详细信息
来源: 评论
An Exploratory Assessment on Text Summarization
An Exploratory Assessment on Text Summarization
收藏 引用
Advancements in Smart, Secure and Intelligent Computing (ASSIC), International Conference on
作者: P. Nishitha T. Sarika E. N. Vijayakumari Asha Vuyyuru M SilpaRaj Jnyana Ranjan Mohanty Department of Assistant Computer science and Information Technology MLR Institute of Technology Hyderabad Department of Computer science and Information Technology MLR Institute of Technology Hyderabad Department of Computer science Engineering MLR Institute of Technology Hyderabad Department of Computer Science and Engineering (AIML) BVRIT HYDERABAD College of Engineering for Women Hyderabad Department of Computer Science and Engineering (Cyber Security) CVR College of Engineering Hyderabad Kalinga Institute of Industrial Technology University India
Text summarization involves creating a short, concise summary that captures the salient points of the source text. We'll demonstrate a synthesis process based on the use of trainable machine learning algorithms wi...
来源: 评论
Traffic Sign Detection Problems using Convolutional Neural Techniques in Image Processing
Traffic Sign Detection Problems using Convolutional Neural T...
收藏 引用
2024 International Conference on Intelligent Systems for cybersecurity, ISCS 2024
作者: Subhamathi, A.S.F. Sathiyapriyan, C. Anuradha, T. Jose Anand, A. Rheem, Abdul Arun, M.R. Karpagam Academy of Higher Education Department of Electrical and Electronics Engineering Tamilnadu Coimbatore641021 India Aarupadai Veedu Institute of Technology Department of Computer Science and Engineering Cyber Security Chennai603104 India Kcg College of Technolog Department of Electrical and Electronics Engineering Tamil Nadu Chennai600097 India Kcg College of Technology Department of Ece Karapakkam Chennai600 097 India Mullana Department of Mathematics and Humanities Haryana Ambala India Department of ECE Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai India
Traffic sign detection is a critical component in advancing intelligent transportation systems and ensuring road safety. Convolutional Neural Networks (CNNs) have emerged as powerful tools in image processing and comp... 详细信息
来源: 评论
A Novel Key Management Framework for Secure and Scalable Decentralized Identity Systems
A Novel Key Management Framework for Secure and Scalable Dec...
收藏 引用
security of Information and Networks (SIN), International Conference on
作者: Mert Yıldız Şerif Bahtiyar SPFLab Department of Computer Engineering Cyber Security and Privacy Research Lab Istanbul Technical University Istanbul Türkiye
The rise of decentralized identity systems has posed significant challenges in the secure and scalable management of keys, especially in large-scale national identity programs. In this paper, we propose a new secure a... 详细信息
来源: 评论
Towards Stricter Black-box Integrity Verification of Deep Neural Network Models  24
Towards Stricter Black-box Integrity Verification of Deep Ne...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Chaoxiang Bai, Xiaofan Ma, Xiaojing Zhu, Bin B. Hu, Pingyi Fu, Jiayun Jin, Hai Zhang, Dongmei Huazhong University of Science and Technology Hubei Wuhan China Shanghai Jiao Tong University Shanghai China Microsoft Corporation Beijing China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China
Cloud-based machine learning services offer significant advantages but also introduce the risk of tampering with cloud-deployed deep neural network (DNN) models. Black-box integrity verification (BIV) allows model own... 详细信息
来源: 评论
An Intelligent Approach to Spectrum Sharing Process for Coexistence Between Cellular and Wi-Fi Technologies
An Intelligent Approach to Spectrum Sharing Process for Coex...
收藏 引用
International Conference on Electrical engineering and Information & Communication technology (ICEEICT)
作者: Gazi Md Nasim Monir Hossen Moinul Hossain Department of Electronics and Communication Engineering Khulna University of Engineering & Technology Khulna Bangladesh Department of Cyber Security Engineering George Mason University USA
It is anticipated that New-Radio Unlicensed (NR-U) technology will offload its traffic to unlicensed spectrum, such as the 5 GHz band. Nevertheless, NR-U transmissions must coexist with the current Wi-Fi networks in t... 详细信息
来源: 评论
MineLoRa: Markov Transition Fields and Adaptive Neural Networks for LoRa Device Radio Frequency Fingerprint Identification
MineLoRa: Markov Transition Fields and Adaptive Neural Netwo...
收藏 引用
2024 International Conference on Artificial Intelligence of Things and Systems, AIoTSys 2024
作者: Zhu, Biaokai Jia, Yupeng Wang, Zhonghao Wen, Jiawei Liu, Xinle Zhao, Shijia Xu, Qiongyue Song, Jie Li, Ping Liu, Sanman Li, Feng Zhao, Jumin Shanxi Police College Taiyuan University of Technology Taiyuan China Shanxi Police College Cyber Security Department Taiyuan China Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College Luzhou China School of Computer Science and Technology Anhui University Hefei China Taiyuan University of Technology Taiyuan China College of Information and Computer Taiyuan University of Technology Jinzhong China
With the development of LPWAN technology, LoRa, one of the typical representatives, is widely used in various communication scenarios. At the same time, it is also faced with problems such as difficulty in identifying... 详细信息
来源: 评论
Optimizing Hyperparameters in Deep Learning Algorithms for Self-Driving Vehicles in Traffic Sign Recognition
Optimizing Hyperparameters in Deep Learning Algorithms for S...
收藏 引用
Science, technology, engineering and Management (ICSTEM), International Conference on
作者: T. Kumaravel V. Shanmugaveni P. Natesan V. Kavya Shruthi M. Kowsalya M S. Malarkodi Department of Computer Science and Engineering Kongu Engineering College Erode Tamil Nadu India Department of CSE(Cyber Security) Dr.Mahalingam College of Engineering and Technology Pollachi Tamil Nadu India
Traffic sign detection is a pivotal aspect of intellect transportation systems, which play a crucial role in enhancing road safety along with traffic management. The utilization of the YOLOv5 framework provides a holi... 详细信息
来源: 评论