咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是871-880 订阅
排序:
Application of Machine Learning Techniques for Heavy Rainfall Prediction using Satellite Data  5
Application of Machine Learning Techniques for Heavy Rainfal...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Balram, Gujjari Poornachandrarao, N. Ganesh, D. Nagesh, Banavath Basi, Reddy.A Kumar, M.Sunil Anurag University Ghatkesar Rd Venkatapur Telangana Hyderabad500088 India Geethanjali College of Engineering and Technology Hyderabad Telangana Cheeryal India Andhra Pradesh Tirupati India Marri Laxman Reddy Institute of Technology and Management Department of Cyber Security Hyderabad Telangana Dundigal500043 India
This study presents a large-scale lunar dataset with the goal of utilizing machine learning techniques to forecast periods of intense rain. The dataset includes features from the lunar surface such as slope, height an... 详细信息
来源: 评论
Detection of Abnormal Crowd Behavior Based on Graph Convolutional Neural Network  12
Detection of Abnormal Crowd Behavior Based on Graph Convolut...
收藏 引用
12th International Conference on Information technology in Medicine and Education, ITME 2022
作者: Zhou, Xiang Xiao, Ruliang Fuzhou Institute of Technology Department of Computing and Information Science Fujian Fuzhou China Fujian Normal University College of Computer and Cyber Security Fujian Fuzhou China
With the increasing demand for public safety precautions, the accuracy and timeliness of abnormal crowd behavior detection is gradually improving. Therefore, with the development of the technology for the abnormal cro... 详细信息
来源: 评论
An Extensive Analysis of cybersecurity in the Era of Advanced Threats  2
An Extensive Analysis of Cybersecurity in the Era of Advance...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Krishnaveni, S. Geetha, B.T. Rashmitha Duvvada, Sree Sathe, Manoj Amrita Soni, Mukesh Adithya Institute of Technology Department of Management Studies Kovilpalayam Coimbatore India Saveetha School of Engineering Simats Department of Ece Tamil Nadu India University of Wisconsin Madison Department of Cse United States Computer Science Pes Modern Institute of Business Studies Pune India Sharda School of Engineering & Technology Sharda University Center for Cyber Security and Cryptology Computer Science & Engineering Uttar Pradesh Greater Noida India Dr. D. Y. Patil Vidyapeeth Dr. D. Y. Patil School of Science & Technology Tathawade Pune India
The scientific and business communities have taken an interest in the Internet of Things (IoT) because of its tremendous impact on human life. The IoTs have emerged as a state-of-the-art framework for creating intelli... 详细信息
来源: 评论
GRDNet: A Lightweight Railway Foreign Object Intrusion Detection Algorithm  7
GRDNet: A Lightweight Railway Foreign Object Intrusion Detec...
收藏 引用
7th International Conference on Advanced Algorithms and Control engineering, ICAACE 2024
作者: Wang, Zhaonan Wei, Lin Meng, Caixia Shi, Lei Gao, Yufei Wang, Qingxian School Of Cyber Science And Engineering Zhengzhou University Zhengzhou China School Of Computer And Artificial Intelligence Zhengzhou University Zhengzhou China Zhengzhou Police College Department Of Image And Network Investigation Technology Zhengzhou China
Railway intrusion detection using convolutional neural networks has significant results, but it requires a large amount of data and arithmetic power to train and deploy neural network models, and it is still a challen... 详细信息
来源: 评论
Industry 4.0 Technologies for Smart Manufacturing: A Systematic Review of Machine Learning Methods for Predictive Maintenance
Industry 4.0 Technologies for Smart Manufacturing: A Systema...
收藏 引用
2023 International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023
作者: Sharma, Madhurima Sharma, Manu Sharma, Mohnish Yadav, Kuldeep Singh Shukla, Shailja Rabindranath Tagore University Department of Computer Science Engineering Bhopal India Rajiv Gandhi Proudyogiki Vishwavidyalaya Department of Cyber Forensics Bhopal India Indian Institute of Information Technology Department of Mechanical Engineering Jabalpur India Indian Institute of Technology Msp Lab Department of Electrical Engineering Delhi India
The automotive sector, which has a significant impact on economic and social growth, has been a driving force behind the development of Industry 4.0 and its associated technologies such as Smart Production, Smart Manu... 详细信息
来源: 评论
Combined Effort Estimation Framework for Heterogeneous Projects Using Machine Learning: A Comparative Analysis
Combined Effort Estimation Framework for Heterogeneous Proje...
收藏 引用
Next Generation Communication & Information Processing (INCIP), International Conference on
作者: Amrita Sharma Neha Chaudhary Anand Sharma Department of Computer Science Indus University Ahmedabad India Computer Science & Engineering Manipal University Jaipur India Cyber Resilience Eventus Security Ahmedabad India
The essential role of software development effort estimation is to predict the required work to develop software. The three main types of cost estimation approaches are algorithmic models, non-algorithmic models, and ... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: Akash K V Esther Daniel S. Seetha S. Durga Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Department of Information Science & Engineering CMR Institute of Technology India TIFAC CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
The Future of Recruitment: Using Deep Learning to Build Intelligent Interview Bots
The Future of Recruitment: Using Deep Learning to Build Inte...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Shahnawaz Ahmad Shahadat Hussain Mohammed Wasid Ogala Justin Onyarin Mohd Arif Javed Ahmad School of Computer Science Engineering and Technology Bennett University Greater Noida India Cyber Security Department University of Delta PMB Agbor Delta State Nigeria Department of Computer Science Engineering and Technology Galgotias University Greater Noida India Department of Computer Science Engineering and Technology Sharda University Greater Noida India
The hiring process for IT positions is often complex and time-consuming, posing significant challenges for businesses seeking to maintain consistency and efficiency. Interview scheduling is complicated by manual effor... 详细信息
来源: 评论
Unveiling the Nexus: Exploring the Societal Implications of AI-Driven cybersecurity and Data Analysis
Unveiling the Nexus: Exploring the Societal Implications of ...
收藏 引用
International Conference on System Modeling & Advancement in Research Trends (SMART)
作者: Mohd Arif Shahnawaz Ahmad Mohd Nazim Javed Ahmad Ogala Justin Onyarin Department of Computer Science Engineering and Technology Galgotias University Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Science Noida Institute of Engineering and Technology Greater Noida India Cyber Security Department University of Delta PMB Agbor Delta State Nigeria
AI when integrated with cybersecurity and data analysis forms a new field that will have great impact on the society. The present research focuses on the social consequences of integrating AI for cybersecurity and big... 详细信息
来源: 评论
Quantum K-Means Model based on Optimization Framework
Quantum K-Means Model based on Optimization Framework
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Shao, Zexiang Zhang, Shibin Kumar, Sachin School of Cyberspace Security Chengdu University of Information Technology Chengdu610225 China Sichuan Key Laboratory of Advanced Cryptography and System Security Chengdu610225 China Ajay Kumar Garg Engineering College Department of Computer Science and Engineering India
The Quantum K-means clustering algorithm offers the advantage of quantum parallel computing, but suffers from issues related to cluster center initialization and sensitivity to noisy data due to its similarity with th... 详细信息
来源: 评论