咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是971-980 订阅
排序:
Brief Announcement: Agent-Based Leader Election, MST, and Beyond  38
Brief Announcement: Agent-Based Leader Election, MST, and Be...
收藏 引用
38th International Symposium on Distributed Computing, DISC 2024
作者: Kshemkalyani, Ajay D. Kumar, Manish Molla, Anisur Rahaman Sharma, Gokarna Department of Computer Science University of Illinois ChicagoIL United States Department of Computer Science Engineering Indian Institute of Technology Madras India R. C. Bose Centre for Cryptology and Security Indian Statistical Institute Kolkata India Department of Computer Science Kent State University OH United States
Leader election is one of the fundamental and well-studied problems in distributed computing. In this paper, we initiate the study of leader election using mobile agents. Suppose n agents are positioned initially arbi... 详细信息
来源: 评论
The Polar CenterNet for Radar Signal Identification  4
The Polar CenterNet for Radar Signal Identification
收藏 引用
4th International Conference on Intelligent Information Processing, IIP 2022
作者: Wang, Lin Mi, Siya Tian, Ye Wang, Fengsheng He, Shen Southeast University School of Cyber Science and Engineering Nanjing China Institute of China Mobile Communications Corporation Department of Security Technology Research Beijing China
The radar signal sorting is important in the reconnaissance phase of electronic battlefield, and its performance affects the subsequent decision for the situational awareness seriously. With the wide adoption of vario... 详细信息
来源: 评论
Comparative Analysis of Data Dynamics Based on Wavelet Coherence Using Higher-Order Moments  2
Comparative Analysis of Data Dynamics Based on Wavelet Coher...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Al-Sharo, Yasser Abu-Jassar, Amer Vasiurenko, Oleg Lyashenko, Vyacheslav Ajloun National University Faculty of Information Technology Department of Cyber Security Ajloun Jordan Ajloun National University Faculty of Information Technology Department of Computer Science Ajloun Jordan Kyiv University of Intellectual Property and Law Department of Cybersecurity It and Economics Kyiv Ukraine Kharkiv National University of Radio Electronics Department of Media Systems and Technology Kharkiv Ukraine
The article addresses the challenges of analyzing data represented as time series, depicting the evolution of a specific process, phenomenon, or object over time. Special emphasis is placed on conducting a comparative... 详细信息
来源: 评论
Protecting Sensitive Data in the Cloud: A Network security Approach  15
Protecting Sensitive Data in the Cloud: A Network Security A...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Mohammed, Abdul Sajid Sreeramulu, Madhusudhan Dasari Gopal, Santhosh Kumar Gupta, Ketan Anand Kumar, V. University of the Cumberlands Dept of School of Computer and Information Sciences KY United States American Express Dept of Cyber Security United States Charlotte NC United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore641202 India
Cloud Computing adoption has increased dramatically over the past few years, making the protection of sensitive data on the cloud a major concern. In this paper network security is presented as an effective way to ens... 详细信息
来源: 评论
Ethereum smart contract security research:survey and future research opportunities
收藏 引用
Frontiers of computer Science 2021年 第2期15卷 143-160页
作者: Zeli WANG Hai JIN Weiqi DAI Kim-Kwang Raymond CHOO Deqing ZOU National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabClusters and Grid Computing LabHubei Engineering Research Center on Big Data SecurityWuhan430074China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan430074China School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Blockchain has recently emerged as a research trend,with potential applications in a broad range of industries and *** particular successful Blockchain technology is smart contract,which is widely used in commercial s... 详细信息
来源: 评论
Differential Region-Based Segmentation Method for Brain Tumor Detection using Computed Tomography Images
Differential Region-Based Segmentation Method for Brain Tumo...
收藏 引用
IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)
作者: G. Balamurugan R. Kaviarasan R. Kalaiyarasan Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Campus Chengalpattu TamilNadu India Department of Computer Science and Engineering (Cyber Security) RGM College of Engineering and Technology Nandyal India Department of ECE Sri Manakula Vinayagar Engineering College Puducherry
Brain malignant growth detection is eased using medical images and machine learning paradigms. This article introduces a differential region-based segmentation method to improve brain tumor detection precision from co... 详细信息
来源: 评论
Privacy engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices
收藏 引用
IEEE Transactions on Software engineering 2023年 第9期49卷 4324-4348页
作者: Iwaya, Leonardo Horn Babar, Muhammad Ali Rashid, Awais JoondalupWA6027 Australia Research Group Department of Mathematics and Computer Science Karlstad65188 Sweden The University of Adelaide Centre for Research on Engineering Software Technologies AdelaideSA5005 Australia University of Bristol Bristol Cyber Security Group REPHRAIN: National Research Centre on Privacy Harm Reduction and Adversarial Influence Online Department of Computer Science BristolBS8 1QU United Kingdom
Privacy engineering, as an emerging field of research and practice, comprises the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working syste... 详细信息
来源: 评论
cyberbullying in Digital Era: History, Trends, Limitations, Recommended Solutions for Future
Cyberbullying in Digital Era: History, Trends, Limitations, ...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Nair, Meghna Manoj Fernandez, Terrance Frederick Tyagi, Amit Kumar Vellore Institute of Technology School of Computer Science and Engineering Chennai Campus Tamilnadu Chennai600127 India Saveetha School of Engineering Department of Information Security TN Chennai India National Institute of Fashion Technology New Delhi Department of Fashion Technology Delhi India
The digital and virtual world has taken a toll on the lives of the vast majority of the population across the globe. Even though it has resulted in numerous technological advancements and has enhanced the scope of soc... 详细信息
来源: 评论
Smart Detection Framework for Rapid Emergency Response
Smart Detection Framework for Rapid Emergency Response
收藏 引用
Sustainable Computing and Smart Systems (ICSCSS), International Conference on
作者: Arjun S Bhuvaneshwari E Sundara Rajulu Navaneethakrishnan Sathish Kumar P. J Surendran R Department of Cyber Security Chennai Institute of Technology Chennai India Department of Computer Science and Engineering Dhanalakshmi Srinivasan University Trichy Tiruchirappalli India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India
Specialized algorithms for object detections have made the most progress in the field of computer vision. This study showcases the most recent approach to the development of emergency detection for human and vehicle a... 详细信息
来源: 评论
Cyclic and Negacyclic Sum-Rank Codes
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Hao Ding, Cunsheng Cheng, Zhiqiang Xie, Conghui The College of Information Science and Technology/Cyber Security Jinan University Guangdong Province Guangzhou510632 China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
Sum-rank codes have known applications in the multishot network coding, the distributed storage and the construction of space-time codes. U. Martínez-Peñas introduced the cyclic-skew-cyclic sum-rank codes an... 详细信息
来源: 评论