咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是71-80 订阅
排序:
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1901-1924页
作者: Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling School of Information and Cybersecurity People’s Public Security University of ChinaBeijing100038China Cyber Investigation Technology Research and Development Center The Third Research Institute of the Ministry of Public SecurityShanghai201204China Department of Cybersecurity Defense Beijing Police CollegeBeijing102202China School of Computer Science Henan Institute of EngineeringZhengzhou451191China
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal *** deep learning-based text classifiers offer promise,they often exhibit suboptimal performa... 详细信息
来源: 评论
cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify cyber Hazards
Cyber Threat Intelligence (CTI): An Analysis on the Use of A...
收藏 引用
International Conference on Recent Developments in cyber security, ReDCySec 2023
作者: Kant, Neelima Amrita Department of Computer Science and Engineering School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida201306 India Department of Computer Science and Engineering School of Engineering and Technology Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida201306 India
Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for cybersecurity specialists to keep track of every action taking place on the netw... 详细信息
来源: 评论
An Intelligent Approach to Spectrum Sharing Process for Coexistence Between Cellular and Wi-Fi Technologies  6
An Intelligent Approach to Spectrum Sharing Process for Coex...
收藏 引用
6th International Conference on Electrical engineering and Information and Communication technology, ICEEICT 2024
作者: Nasim, Gazi Md Hossen, Monir Hossain, Moinul Khulna University of Engineering & Technology Department of Electronics and Communication Engineering Khulna Bangladesh George Mason University Department of Cyber Security Engineering United States
It is anticipated that New-Radio Unlicensed (NR-U) technology will offload its traffic to unlicensed spectrum, such as the 5 GHz band. Nevertheless, NR-U transmissions must coexist with the current Wi-Fi networks in t... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
2023 International Conference on engineering technology and Technopreneurship, ICE2T 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Faculty of Information Science and Technology Bangi 43600 Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论
A Literature Review on Predictive Classification of Major Depressive Disorder Using Advanced Data Analytics Techniques  5th
A Literature Review on Predictive Classification of Major De...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Mahender, Udutala Arivalagan, S. Sathiyasuntharam, V. Sudhakar, P. Annamalai University Tamilnadu Chidambaram India Department of Computer Science and Technology Annamalai University Tamilnadu Chidambaram India Department of Cyber Security CMR Engineering College Hyderabad India Department of Computer Science and Engineering Annamalai University Tamilnadu Chidambaram India
Major Depressive Disorder (MDD) is a significant global mental health concern predicted to become the leading mental health condition by 2030. It is characterised by persistent sadness, hopelessness, and a lack of int... 详细信息
来源: 评论
Detecting Deepfake Videos using Face Recognition and Neural Networks  1
Detecting Deepfake Videos using Face Recognition and Neural ...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Murugan, Muthu Aravind Mathu, T. Priya, S Jeba Karunya Institute of Technology and Sciences Computer Science and Engineering Coimbatore India Karunya Institute of Technology and Sciences Data Science and Cyber Security Coimbatore India
Deepfake videos created using advanced artificial intelligence techniques, pose a significant threat to digital media credibility. This project introduces a holistic strategy for identifying these videos, incorporatin... 详细信息
来源: 评论
Advancing Multiclass Emotion Recognition with CNN-RNN Architecture and Illuminating Module for Real-time Precision using Facial Expressions
Advancing Multiclass Emotion Recognition with CNN-RNN Archit...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and engineering Science, AMATHE 2024
作者: Prince, Simrith C. Babu, Nirmal Varghese Computer Science And Engineering Karunya Institute Of Technology And Sciences Coimbatore India Data Science And Cyber Security Karunya Institute Of Technology And Sciences Coimbatore India
Emotions, intrinsic to the human experience, serve as the catalyst for a groundbreaking technological innovation in multiclass emotion recognition through facial expressions. This study introduces a revolutionary syst... 详细信息
来源: 评论
Identifying The Coconut Leaf Disease Using Deep Transfer Learning Approach  4
Identifying The Coconut Leaf Disease Using Deep Transfer Lea...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Tuhin, Hemayet Hossain Kayum, Md Abdul Rahmatul Kabir Rasel Sarker, Md. Tanvir Siddiquee, Shah Md Pandey, Bishwajeet Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Intelligent System and Cyber Security Astana IT University Kazakhstan
Coconut is one of the main economic crops in Bangladesh. It is a tree whose every part is useful in one way or another in public life. The leaves, flowers, fruits, stems, and roots of this tree are used as raw materia... 详细信息
来源: 评论
Multiclass Brain Tumor Detection using Convolutional Neural Network and Conventional Machine Learning  2
Multiclass Brain Tumor Detection using Convolutional Neural ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational Science, ICERCS 2024
作者: Vidhya, K. Vamsi Krishna, B. Haritha, M. Rajasekaran, Arun Sekar Roopa Chandrika, R. Velusamy, Jayaraj Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security School of Computer Science and Technology Coimbatore India QIS College of Engineering and Technology Department of AIMLDS Andhra Pradesh India QIS College of Engineering and Technology Department of Mechanical Engineering Andhra Pradesh India SR University Department of Electronics and Communication Engineering Telangana India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore India Nehru Institute of Engineering and Technology Department of Electronics and Communication Engineering Coimbatore India
Brain tumor (BT) affect the brain and reduce the lifespan of humans. Therefore, diagnosis and treatment of illnesses in its early stage is required. The objective of this paper is to evaluate the effectiveness of the ... 详细信息
来源: 评论
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 4785-4794页
作者: Muhammad, Zia Amjad, Faisal Iqbal, Zafar Javed, Abdul Rehman Gadekallu, Thippa Reddy Department of Computer Science North Dakota State University Fargo United States Department of Cyber Security PAF Complex E-9 Air University Islamabad Pakistan Islamabad Pakistan School of Information Technology and Engineering Vellore Institute of Technology Vellore India Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Today digital technologies are evolving to accommodate small businesses and young entrepreneurs by reducing their time-to-market while encouraging rapid innovation in mobile, Extended Reality (XR), Internet of Things ... 详细信息
来源: 评论