咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是951-960 订阅
排序:
Ethereum smart contract security research:survey and future research opportunities
收藏 引用
Frontiers of computer Science 2021年 第2期15卷 143-160页
作者: Zeli WANG Hai JIN Weiqi DAI Kim-Kwang Raymond CHOO Deqing ZOU National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabHubei Engineering Research Center on Big Data SecurityWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s... 详细信息
来源: 评论
Brief Announcement: Agent-Based Leader Election, MST, and Beyond  38
Brief Announcement: Agent-Based Leader Election, MST, and Be...
收藏 引用
38th International Symposium on Distributed Computing, DISC 2024
作者: Kshemkalyani, Ajay D. Kumar, Manish Molla, Anisur Rahaman Sharma, Gokarna Department of Computer Science University of Illinois ChicagoIL United States Department of Computer Science Engineering Indian Institute of Technology Madras India R. C. Bose Centre for Cryptology and Security Indian Statistical Institute Kolkata India Department of Computer Science Kent State University OH United States
Leader election is one of the fundamental and well-studied problems in distributed computing. In this paper, we initiate the study of leader election using mobile agents. Suppose n agents are positioned initially arbi... 详细信息
来源: 评论
Enhanced Deep Learning Approaches for Robust Darknet Traffic Classification
Enhanced Deep Learning Approaches for Robust Darknet Traffic...
收藏 引用
Delhi Section Conference (DELCON), IEEE
作者: Felix Etyang Pramod Pavithran Gideon Mwendwa Ngaira Mandela Musiime Hillary Department of Computer Science School of Engineering Cochin University of Science & Technology Cochin India School of Cyber Security and Digital Forensics National Forensics Sciences University Gandhinagar India School of Cyber Security and Digital Forensics National Forensics Sciences University Jinja Uganda
The classification of darknet traffic remains a pivotal task in modern cybersecurity efforts, necessitating advanced analytical techniques to address malicious activities pre-emptively. This study introduces and compa... 详细信息
来源: 评论
NFCEraser: A security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator
NFCEraser: A Security Threat of NFC Message Modification Cau...
收藏 引用
IEEE Symposium on security and Privacy
作者: Jianshuo Liu Hong Li Mengjie Sun Haining Wang Hui Wen Zhi Li Limin Sun Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Department of Electrical and Computer Engineering Virginia Tech
Near Field Communication (NFC) has been widely used for rapid data exchange between electronic devices over a very short distance. In this paper, we reveal a new security vulnerability in NFC passive communication cha... 详细信息
来源: 评论
Advancing Train Safety Through Autonomous IoT based Obstacle Detection and Response
Advancing Train Safety Through Autonomous IoT based Obstacle...
收藏 引用
Innovations and Challenges in Emerging Technologies (ICICET), International Conference on
作者: Harikumar Naidu Harshita Chourasia Praveen Kumar Mannepalli Pankaj Ramtekkar Department of Electrical Engineering GH Raisoni College of Engineering Nagpur India Department of Artifical Intelligence GH Raisoni College of Engineering Nagpur India Department of Computer Science and Engineering (Cyber Security) GH Raisoni Institute of Engineering and Technology Nagpur India
This study presents an advanced obstacle detection system designed to improve train operating safety. A microprocessor serves as the system’s central processing unit, coordinating the integration of an LCD, a buzzer,... 详细信息
来源: 评论
Differential Region-Based Segmentation Method for Brain Tumor Detection using Computed Tomography Images
Differential Region-Based Segmentation Method for Brain Tumo...
收藏 引用
IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)
作者: G. Balamurugan R. Kaviarasan R. Kalaiyarasan Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Campus Chengalpattu TamilNadu India Department of Computer Science and Engineering (Cyber Security) RGM College of Engineering and Technology Nandyal India Department of ECE Sri Manakula Vinayagar Engineering College Puducherry
Brain malignant growth detection is eased using medical images and machine learning paradigms. This article introduces a differential region-based segmentation method to improve brain tumor detection precision from co... 详细信息
来源: 评论
A Resilient Voice-Based Speaker Identification Approach Using Deep Learning  8
A Resilient Voice-Based Speaker Identification Approach Usin...
收藏 引用
8th Competitive Advantage in the Digital Economy, CADE 2022
作者: Alsaify, Baha A. Abu Arja, Hadeel S. Maayah, Bakal Y. Al-Taweel, Masa M. Alazrai, Rami Department of Network Engineering and Security Jordan University of Science and Technology Irbid Jordan German Jordanian University Department of Computer Engineering Amman Jordan
Speaker recognition technology has achieved tremendous success over the years as it has become more affordable and reliable. Much research have been conducted in the speaker recognition area, but little progress has b... 详细信息
来源: 评论
cyberbullying in Digital Era: History, Trends, Limitations, Recommended Solutions for Future
Cyberbullying in Digital Era: History, Trends, Limitations, ...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Nair, Meghna Manoj Fernandez, Terrance Frederick Tyagi, Amit Kumar Vellore Institute of Technology School of Computer Science and Engineering Chennai Campus Tamilnadu Chennai600127 India Saveetha School of Engineering Department of Information Security TN Chennai India National Institute of Fashion Technology New Delhi Department of Fashion Technology Delhi India
The digital and virtual world has taken a toll on the lives of the vast majority of the population across the globe. Even though it has resulted in numerous technological advancements and has enhanced the scope of soc... 详细信息
来源: 评论
Privacy engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices
收藏 引用
IEEE Transactions on Software engineering 2023年 第9期49卷 4324-4348页
作者: Iwaya, Leonardo Horn Babar, Muhammad Ali Rashid, Awais JoondalupWA6027 Australia Research Group Department of Mathematics and Computer Science Karlstad65188 Sweden The University of Adelaide Centre for Research on Engineering Software Technologies AdelaideSA5005 Australia University of Bristol Bristol Cyber Security Group REPHRAIN: National Research Centre on Privacy Harm Reduction and Adversarial Influence Online Department of Computer Science BristolBS8 1QU United Kingdom
Privacy engineering, as an emerging field of research and practice, comprises the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working syste... 详细信息
来源: 评论
Self-Dual Cyclic Codes with Square-Root-Like Lower Bounds on Their Minimum Distances
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Hao Ding, Cunsheng The College of Information Science and Technology/Cyber Security Jinan University Guangdong Province Guangzhou510632 China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
Binary self-dual cyclic codes have been studied since the classical work of Sloane and Thompson published in IEEE Trans. Inf. Theory, vol. 29, 1983. Twenty five years later, an infinite family of binary self-dual cycl... 详细信息
来源: 评论