咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是981-990 订阅
排序:
Joint Optimization of Compression, Transmission and Computation for Cooperative Perception Aided Intelligent Vehicular Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8201-8214页
作者: Lu, Binbin Huang, Xumin Wu, Yuan Qian, Liping Zhou, Sheng Niyato, Dusit University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 999078 China Guangdong University of Technology School of Automation Guangzhou510006 China University of Macau State Key Lab of Internet of Things for Smart City 999078 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer Information Science 999078 China Zhuhai UM Science and Technology AQ2 Research Institute Zhuhai519301 China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Beijing100084 China Nanyang Technological University School of Computer Science and Engineering 639815 Singapore
Cooperative perception is a promising paradigm to tackle the perception limitations of a single intelligent vehicle (IV) to enhance the driving safety and efficiency in intelligent vehicular networks. However, the rea... 详细信息
来源: 评论
Wireless modulation classification based on Radon transform and convolutional neural networks
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 6263-6272页
作者: Ghanem, Hanan S. Al-Makhlasawy, Rasha M. El-Shafai, Walid Elsabrouty, Maha Hamed, Hesham F. A. Salama, Gerges M. El-Samie, Fathi E. Abd Department of Electrical Engineering Faculty of Engineering Minia University Minia61111 Egypt Department of Computers and Systems Electronics Research Institute Cairo Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Electronics and Communications Engineering Egypt-Japan University of Science and Technology Alexandria Egypt Faculty of Engineering Egyptian-Russian University Cairo Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Convolutional Neural Networks (CNNs) are efficient tools for pattern recognition applications. They have found applications in wireless communication systems such as modulation classification from constellation d... 详细信息
来源: 评论
Enhancing Diabetic Retinopathy Detection using Hybrid Deep Learning Approach
Enhancing Diabetic Retinopathy Detection using Hybrid Deep L...
收藏 引用
Augmented Intelligence and Sustainable Systems (ICAISS), International Conference on
作者: S. Prasanth M. Roshni Thanka E. Bijolin Edwin V. Ebenezer Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
One of the main causes of impaired vision is diabetic retinopathy or DR, for which rapid and precise diagnosis is essential to successful medical care. This inquiry presents a hybridized deep learning AI model that co... 详细信息
来源: 评论
Blockchain-enabled Privacy Preserving of IoT Data for Sustainable Smart Cities using Machine Learning  14
Blockchain-enabled Privacy Preserving of IoT Data for Sustai...
收藏 引用
14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022
作者: Kumar, Priyan Malarvizhi Rawal, Bharat Gao, Jiechao Kyung Hee University Seoul Seoul Korea Republic of Gannon University Cyber Security Cyber Engineering EriePA United States University of Virginia Department of Computer Science CharlottesvilleVA United States
The development of sensor technologies and an explosion of the inexpensive electronic circuit, the Internet of Things (IoT) is emergent as an encouraging innovation to comprehend sustainable smart city. Smart cities c... 详细信息
来源: 评论
Survival Analysis with Cox Proportional Hazards Model in Predicting Patient Outcomes  5
Survival Analysis with Cox Proportional Hazards Model in Pre...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Monikapreethi, S.K. Preetha, J. Reddy, K. Narsimha Ramya, S. Yuvaraj, S. Murugan, S. Rajalakshmi Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Department of Artificial Intelligence & Data Science Tamil Nadu Trichy India Vardhaman College of Engineering Department of Electronics and Communication Engineering Telangana Hyderabad India Paavai Engineering College Department of Cyber Security Tamil Nadu Namakkal India Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Electronics and Communication Engineering Tamil Nadu Kattankulathur India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Biomedical Engineering Tamil Nadu Chennai India
Survival analysis is crucial for understanding the factors that influence patient outcomes across time. The objective is to predict the outcomes of patient survival under various circumstances using the Cox Proportion... 详细信息
来源: 评论
Generative Adversarial Networks for Synthetic Jamming Attacks on UAVs
Generative Adversarial Networks for Synthetic Jamming Attack...
收藏 引用
International Conference on computer Science and engineering (UBMK)
作者: Burcu Sönmez Sarikaya Şerif Bahtiyar Department of Computer Engineering Cyber Security and Privacy Research Lab. SPFLab Istanbul Technical University Istanbul Türkiye
Intrusion Detection Systems (IDS) have been significant for Unmanned Aerial Vehicles (UAVs) since high connectivity is essential for such vehicles. Recently, machine learning-based defense mechanisms have contributed ... 详细信息
来源: 评论
Towards Task-Free Privacy-Preserving Data Collection
收藏 引用
China Communications 2022年 第7期19卷 310-323页
作者: Zhibo Wang Wei Yuan Xiaoyi Pang Jingxin Li Huajie Shao School of Cyber Science and Engineering Wuhan University430072 China School of Cyber Science and Technology Zhejiang University310027 China State Key Laboratory of Integrated Services Networks Xidian University710071 China Department of Computer Science College of William and MaryWilliamsburgVA23186 USA
With the rapid developments of Internet of Things(IoT)and proliferation of embedded devices,large volume of personal data are collected,which however,might carry massive private information about attributes that users... 详细信息
来源: 评论
Secure Communication for MUM-T: A Blockchain and Lightweight Cryptography Framework
Secure Communication for MUM-T: A Blockchain and Lightweight...
收藏 引用
security of Information and Networks (SIN), International Conference on
作者: Halimcan Yaşar Şerif Bahtiyar Department of Computer Engineering Cyber Security and Privacy Research Lab SPFLab Istanbul Technical University Maslak Istanbul Türkiye
Manned-Unmanned Teaming (MUM-T) systems integrate manned aircraft and unmanned aerial vehicles (UAVs) to enhance mission effectiveness, allowing a single pilot to coordinate multiple UAVs for tasks like reconnaissance... 详细信息
来源: 评论
Multi-view Evidential Learning-based Medical Image Segmentation  39
Multi-view Evidential Learning-based Medical Image Segmentat...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Chao Shi, Yushu Wong, Waikeung Liu, Chengliang Wang, Wei Wang, Zhihua Wen, Jie School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University China School of Fashion and Textiles Hong Kong Polytechnic University Hong Kong Laboratory for Artificial Intelligence in Design Hong Kong Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Computer Science City University of Hong Kong Hong Kong School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Medical image segmentation provides useful information about the shape and size of organs, which is beneficial for improving diagnosis, analysis, and treatment. Despite traditional deep learning-based models can extra... 详细信息
来源: 评论
Leveraging AI Diffusion and LoRA for Dynamic 3D Room Design and Visualization
Leveraging AI Diffusion and LoRA for Dynamic 3D Room Design ...
收藏 引用
Pervasive Computing and Social Networking (ICPCSN), International Conference on
作者: Rajat Tandel Stewart Kirubakaran S Santhiya P Ebenezer V Roshni Thanka M Bijolin Edwin Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Sciences and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
This paper focuses on the challenges faced in the 3D modeling. In this paper, an innovative 3D construction modeling tool using an AI-based diffusion and Low-Rank Adaptation (LoRA) model for producing realistic 3D roo... 详细信息
来源: 评论