咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是931-940 订阅
排序:
Assessing the Effects of Blackhole Attacks on MANET Reliability and security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Saif Aamer Fadhil Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论
Low-Complexity PSCL Decoding of Polar Codes
收藏 引用
IEEE Transactions on Communications 2025年
作者: Yao, Xinyuanmeng Ma, Xiao Ningbo University of Technology School of Cyber Science and Engineering Ningbo315211 China Sun Yat-sen University School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China School of Computer Science and Engineering China Sun Yat-sen University Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China
Successive cancellation list (SCL) decoding enables polar codes and their generalizations to deliver satisfactory performance in finite-length scenarios but it comes with high latency and complexity. To reduce latency... 详细信息
来源: 评论
Remote Sensing Target Recognition Model Based on Small Sample Image Generation  4
Remote Sensing Target Recognition Model Based on Small Sampl...
收藏 引用
4th International Symposium on computer engineering and Intelligent Communications, ISCEIC 2023
作者: Chen, Lei Sun, Liting Space Engineering University School of Space Information Beijing China Beijing Institute of Computer Technology and Application General Department of Network and Information Security Beijing China
In recent years, remote sensing object recognition methods based on deep learning have received extensive attention. Deep learning methods need to use a large number of labeled data to carry out network training. Howe... 详细信息
来源: 评论
Pioneering Advanced Deep Multi-Task Learning Model for Precise COVID-19 Diagnosis  2
Pioneering Advanced Deep Multi-Task Learning Model for Preci...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Kordnoori, Shirin Alqammaz, Abdullah Sabeti, Maliheh Boostani, Reza Mostafaei, Hamidreza Agha Banihashemi, Saeed Seyed Islamic Azad University North Tehran Branch Department of Computer Engineering Tehran Iran Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia Shiraz University Faculty of Electrical and Computer Engineering Cse and It Departmnet Shiraz Iran Islamic Azad University Shiraz University North Tehran Branch Department of Statistics Tehran Iran Islamic Azad University North Tehran Branch Department of Mathematics Tehran Iran
To address the urgent need for intelligent systems capable of simultaneously identifying COVID-19 cases and delineating lung infection regions in CT scan images, we introduce a multi-task architecture. Initially, our ... 详细信息
来源: 评论
A robust and automatic method for the recognition of speech category in online learning discourse
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第12期15卷 3913-3924页
作者: Jiang, Dazhi He, Zhihui Chen, Yifei Xu, Linyan Lin, Jiali Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510399 China Department of Computer Science Shantou University Shantou515063 China Department of Management Economics and Industrial Engineering Politecnico di Milano MI Milan20156 Italy School of Business Shantou University Shantou515063 China
It is a rapid and irresistible developing trend that the traditional classroom learning mode is transformed into an online learning mode. In the online learning process, it is important to achieve effective voice sepa... 详细信息
来源: 评论
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms
收藏 引用
computer Systems Science & engineering 2022年 第10期43卷 87-102页
作者: Safaa El-Gazar Walid El-Shafai Ghada El-Banby Hesham F.A.Hamed Gerges M.Salama Mohammed Abd-Elnaby Fathi E.Abd El-Samie Department of Electrical Engineering Faculty of EngineeringEgyptian-Russian UniversityCairoEgypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in it... 详细信息
来源: 评论
Fuzzy-Based Weighted Federated Machine Learning Approach for Sustainable Energy Management with IoE Integration
Fuzzy-Based Weighted Federated Machine Learning Approach for...
收藏 引用
2024 Systems and Information engineering Design Symposium, SIEDS 2024
作者: Ghazal, Taher M. Iqbal Janjua, Jamshaid Abbas, Sagheer Fatima, Areej Saleem, Muhammad Khan, Muhammad Adnan Alqarafi, Abdulrahman Khalifa University Centre for Cyber Physical Systems Computer Science Department Abu Dhabi United Arab Emirates Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia National College of Business Administration and Economics School of Computer Sciences Lahore Pakistan Al-Khawarizmi Institute of Computer Science Lahore Pakistan Bahria University Department of Computer Science Lahore Pakistan LGU Department of Computer Science Lahore Pakistan Minhaj University School of Computer Science Lahore Pakistan Skyline University College School of Computing Sharjah United Arab Emirates Riphah International University Riphah School of Computing and Innovation Lahore Pakistan Taibah University College of Computer Science and Engineering Medina42353 Saudi Arabia
The considerable surge in energy consumption due to population growth and the use of new technology has posed significant challenges to energy security and the environment. Managing energy consumption on the consumer ... 详细信息
来源: 评论
Lattice-Based Cryptography and NTRU: Quantum-Resistant Encryption Algorithms  4
Lattice-Based Cryptography and NTRU: Quantum-Resistant Encry...
收藏 引用
4th International Conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Nisha, F. Lenin, J. Saravanan, S.K. Rohit, V. Robin Selvam, P.D. Rajmohan, M. Cmr University School of Engineering and Technology Computer Science & Engineering Karnataka Bengaluru India Alliance University Alliance College of Engineering and Design Department of Computer Science & Engineering Karnataka Bengaluru India Simats Saveetha School of Engineering Department of BigData and Network Security Tamil Nadu Chennai India Presidency University Computer Science & Engineering School of Computer Science & Engineering and Information Science Karnataka Bengaluru India Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Hindustan Institute of Technology and Science Department of Electronics and Communication Engineering Tamil Nadu Chennai India
The quantum-resistant qualities of various encryption methods, such as N-th degree Truncated polynomial Ring Units (NTRU) Encrypt, NTRU Sign, Ring-Lizard, and Kyber protocols are becoming more important in light of th... 详细信息
来源: 评论
A comparative analysis of machine learning models developed from homomorphic encryption based RSA and paillier algorithm  5
A comparative analysis of machine learning models developed ...
收藏 引用
5th International Conference on Intelligent Computing and Control Systems, ICICCS 2021
作者: Kiratsata, Harsh J. Panchal, Mahesh GTU-Graduate School of Engineering and Technology Cyber Security Department Ahmedabad India
Nowadays, the use of Auto ML for development of machine learning (ML) models is increasing day by day. In which users need to upload their dataset to develop machine learning models. Where security of user's data ... 详细信息
来源: 评论
Implementation of Maximum Weighted Independent Set through Brute Force and Greedy Heuristics Approaches
Implementation of Maximum Weighted Independent Set through B...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Noonari, Nooruddin Arshid, Kaleem Fardous, Shamaila Karim, Javed Duraisamy, Sathishkumar Iba Community College Department of Computer Science Naushahro Feroze Sindh Pakistan University of Genova Diten Genova Italy Beijing Institute of Technology Institute of Technology Beijing China University of Genova Strategic and Security Engineering Italy Kathir College of Engineering Dept of Mechanical Engineering Tamilnadu India
The optimization problem of the Maximum Weighted Independent Set (MWIS) in graph theory is a significant challenge with wide-ranging applications in resource allocation, network design, and scheduling. This paper intr... 详细信息
来源: 评论