咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是891-900 订阅
排序:
Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework
Secure Communication for MUM-T: A Blockchain and Lightweight...
收藏 引用
security of Information and Networks (SIN), International Conference on
作者: Halimcan Yaşar Şerif Bahtiyar Department of Computer Engineering Cyber Security and Privacy Research Lab SPFLab Istanbul Technical University Maslak Istanbul Türkiye
Manned-Unmanned Teaming (MUM-T) systems integrate manned aircraft and unmanned aerial vehicles (UAVs) to enhance mission effectiveness, allowing a single pilot to coordinate multiple UAVs for tasks like reconnaissance... 详细信息
来源: 评论
Neural Sequence Modelling for Spam Classification via Bidirectional LSTM and Hierarchical Neural Networks: A Deep Learning Approach
Neural Sequence Modelling for Spam Classification via Bidire...
收藏 引用
Smart Technologies, Communication and Robotics (STCR)
作者: Yakin Ginson E. Bijolin Edwin V. Ebenezer S. Stewart Kirubakaran M. Roshni Thanka M. Manicka Raja Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
Spam messages are a major problem in digital communication. They are a breach of privacy, facilitate financial fraud and result in unnecessary clutter in one’s inbox. Most traditional methods for spam filtering are b... 详细信息
来源: 评论
Prediction of Consumer Price Index (CPI) in Urban India using Statistical Methods
Prediction of Consumer Price Index (CPI) in Urban India usin...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Shravya Dasu Mohana Department of Computer Science & Engineering RV College of Engineering® Bengaluru India Department of Computer Science & Engineering (Cyber Security) RV College of Engineering® Bengaluru India
The Consumer Price Index (CPI) is an important economic indicator used to measure inflation and price changes in a basket of goods and services consumed in households. It is a crucial tool for policymakers, businesses...
来源: 评论
Remote Sensing Target Recognition Model Based on Small Sample Image Generation  4
Remote Sensing Target Recognition Model Based on Small Sampl...
收藏 引用
4th International Symposium on computer engineering and Intelligent Communications, ISCEIC 2023
作者: Chen, Lei Sun, Liting Space Engineering University School of Space Information Beijing China Beijing Institute of Computer Technology and Application General Department of Network and Information Security Beijing China
In recent years, remote sensing object recognition methods based on deep learning have received extensive attention. Deep learning methods need to use a large number of labeled data to carry out network training. Howe... 详细信息
来源: 评论
Predictive Distributed Learning based on Stability and Complexity Measures
Predictive Distributed Learning based on Stability and Compl...
收藏 引用
2024 International Conference on Science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Igodan, Efosa Charles Obe, Olumide O. Thompson, A.-F. Owolafe, Otasowie Usiosefe, Linda Osarumen Katyo, Peter University of Benin Faculty of Physical Sciences Dept. of Computer Science Benin City Nigeria University of Technology School of Computing Federal Dept. of Computer Science Akure Nigeria University of Technology School of Computing Dept. of Cyber Security Akure Nigeria Nigerian Custom Service Risk and Management Unit ICT - Modernization Department Abuja Nigeria
Due to the inherent properties of high dimensional datasets, the majority of feature selection methods already in use do not scale well and eventually become inapplicable. As a result of this limitation, the performan... 详细信息
来源: 评论
Novel Gender and Age Prediction from Real Time Facial Images using Linear Regression Algorithm  8
Novel Gender and Age Prediction from Real Time Facial Images...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace technology, ICECA 2024
作者: Nalini, N. Shahila, D. Ferlin Deva Rosi, A. Tamilselvi, M. Giri, Jayant Sherideh, Ala'a Al Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Ece Chennai India Saveetha University Saveetha School of Engineering Department of Ece Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Zarqa University College of Information Technology Department of Cyber Security zarqa Jordan University of Business and Technology Jeddah Saudi Arabia
The proposed novel algorithm utilizes linear regression in real-time facial image analysis for predicting both gender and age. By leveraging features extracted from facial data, the model aims to provide accurate and ... 详细信息
来源: 评论
Deep Learning Based Cold Chain Distribution Model with Blockchain for Supply Chain Management  4
Deep Learning Based Cold Chain Distribution Model with Block...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Ramkumar, M. Siva Arun, M. Gopan, Gokul Giri, Jayant Al-Qawasmi, Khaled Sns College of Technology Dept of Ece India Saveetha University Department of Mechanical Engineering Chennai602105 India YeshwantraoChavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Saveetha University Department of Vlsi Microelectronics TN Chennai602105 India Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Transportation and storage regulations are very stringent in the pharmaceutical cold chain, a subset of the logistics sector. The primary function of an integrated product supply chain manager is distribution. The pha... 详细信息
来源: 评论
Experimental Evaluation of IoT Powered Automated Wheel Chair Controlling Mechanism Based on Artificial Intelligence Principle
Experimental Evaluation of IoT Powered Automated Wheel Chair...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Loganathan, Arulmurugan Anjaiah, K. Laxmi Bai, P. Jhansi Rani Edlabadkar, Ajinkya P. Al-Qawasmi, Khaled Thiyaneswaran, B. Bannari Amman Institute of Technology Department of Electronics and Communication Engineering Sathyamangalam India Qis College of Engineering and Technology Department of S&h Pondur Road Vengamukkapalem Ongole Andhra Pradesh Prakasam District523272 India Qis College of Engineering and Technology Department of Mba Pondur Road Vengamukkapalem Ongole Prakasam Andhra Pradesh Prakasam District523272 India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India College of Information Technology Zarqa University Department of Cyber Security Zarqa Jordan Uiversity of Business and Technology Jeddah21448 Saudi Arabia Sona College of Technology Department of Ece Salem India
This paper presents the experimental evaluation of an IoT-powered automated wheelchair control mechanism based on artificial intelligence (AI) principles. The system integrates smart features such as voice control, ob... 详细信息
来源: 评论
Discovering High Utility Episodes in Sequences
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第3期4卷 473-486页
作者: Gan, Wensheng Lin, Jerry Chun-Wei Chao, Han-Chieh Yu, Philip S. Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China Western Norway University of Applied Sciences Department of Computing Mathematics and Physics Bergen5063 Norway National Dong Hwa University Department of Electrical Engineering Hualien974 Taiwan University of Illinois at Chicago Department of Computer Science ChicagoIL60607 United States
Sequence data are more commonly seen than other types of data (e.g., transaction data) in real-world applications. For the mining task from sequence data, several problems have been formulated, such as sequential patt... 详细信息
来源: 评论
Contrastive Learning at the Relation and Event Level for Rumor Detection  48
Contrastive Learning at the Relation and Event Level for Rum...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Xu, Yingrui Hu, Jingyuan Ge, Jingguo Wu, Yulei Li, Tong Li, Hui Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China University of Exeter Faculty of Environment Science and Economy Department of Computer Science United Kingdom
Existing studies for rumor detection rely heavily on a large number of labeled data to operate in a fully-supervised manner. However, manual data annotation in realistic cases is very expensive and time-consuming. In ... 详细信息
来源: 评论