咨询与建议

限定检索结果

文献类型

  • 8,732 篇 会议
  • 1,283 篇 期刊文献
  • 86 册 图书

馆藏范围

  • 10,101 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,446 篇 工学
    • 4,899 篇 计算机科学与技术...
    • 4,112 篇 软件工程
    • 1,962 篇 信息与通信工程
    • 998 篇 控制科学与工程
    • 709 篇 电子科学与技术(可...
    • 690 篇 电气工程
    • 626 篇 生物工程
    • 475 篇 生物医学工程(可授...
    • 437 篇 光学工程
    • 389 篇 机械工程
    • 339 篇 仪器科学与技术
    • 320 篇 动力工程及工程热...
    • 258 篇 化学工程与技术
    • 252 篇 安全科学与工程
    • 241 篇 交通运输工程
    • 199 篇 建筑学
  • 3,041 篇 理学
    • 1,706 篇 数学
    • 797 篇 物理学
    • 653 篇 生物学
    • 543 篇 统计学(可授理学、...
    • 348 篇 系统科学
    • 253 篇 化学
  • 1,665 篇 管理学
    • 1,009 篇 管理科学与工程(可...
    • 733 篇 图书情报与档案管...
    • 521 篇 工商管理
  • 407 篇 医学
    • 359 篇 临床医学
    • 329 篇 基础医学(可授医学...
    • 201 篇 药学(可授医学、理...
    • 191 篇 公共卫生与预防医...
  • 294 篇 法学
    • 218 篇 社会学
  • 180 篇 农学
  • 163 篇 教育学
  • 161 篇 经济学
  • 41 篇 文学
  • 26 篇 军事学
  • 12 篇 艺术学
  • 1 篇 哲学

主题

  • 246 篇 feature extracti...
  • 236 篇 accuracy
  • 195 篇 computational mo...
  • 157 篇 real-time system...
  • 152 篇 deep learning
  • 138 篇 training
  • 137 篇 data mining
  • 136 篇 machine learning
  • 135 篇 predictive model...
  • 134 篇 support vector m...
  • 125 篇 computer science
  • 124 篇 servers
  • 118 篇 internet of thin...
  • 118 篇 protocols
  • 113 篇 neural networks
  • 109 篇 quality of servi...
  • 108 篇 security
  • 107 篇 authentication
  • 104 篇 wireless sensor ...
  • 104 篇 visualization

机构

  • 110 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 36 篇 dept. of compute...
  • 35 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 25 篇 dept. of informa...
  • 25 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 dept. of informa...
  • 21 篇 graduate institu...
  • 21 篇 dept. of compute...
  • 20 篇 university of th...
  • 20 篇 dept. of compute...
  • 20 篇 dept. of compute...

作者

  • 45 篇 lorenzo bruzzone
  • 21 篇 jian-jhih kuo
  • 20 篇 du xiaojiang
  • 19 篇 ren-hung hwang
  • 19 篇 libertario demi
  • 19 篇 li kuan-ching
  • 18 篇 mei-hui wang
  • 18 篇 chen yen-lin
  • 18 篇 yen-lin chen
  • 17 篇 kim young-choon
  • 17 篇 guizani mohsen
  • 17 篇 lo hoi-kwong
  • 16 篇 kwon soonhak
  • 16 篇 francesca bovolo
  • 15 篇 jia-ching wang
  • 15 篇 xiaojiang du
  • 14 篇 lee yue-shi
  • 14 篇 jiwani nasmin
  • 14 篇 nasmin jiwani
  • 14 篇 bae hae-young

语言

  • 9,629 篇 英文
  • 335 篇 其他
  • 92 篇 中文
  • 23 篇 日文
  • 22 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Engineering and Information Security"
10101 条 记 录,以下是1-10 订阅
排序:
Simulation of an ARP Spoofing Attack on the E2 Interface in Open RAN  35
Simulation of an ARP Spoofing Attack on the E2 Interface in ...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Seoul Korea Republic of
In anticipation of the 5G-Advanced and 6G era, this paper explores Open RAN as an innovative solution to enhance the existing Radio Access Network (RAN) capabilities, particularly in managing the surge in mobile traff... 详细信息
来源: 评论
A Self-Adaptive Access Control Framework Based on User Attributes Among Heterogeneous Internet of Things Platforms  9
A Self-Adaptive Access Control Framework Based on User Attri...
收藏 引用
Joint 9th International Conference on Digital Arts, Media and Technology with 7th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Park, Jihoon Koo, Jahoon Kim, Young-Gab Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Dept. of Computer and Information Security Seoul Korea Republic of
Internet of Things (IoT) platforms are being actively designed to provide various services to users. However, most IoT platforms are developed in independent environments, causing difficulties in their interoperabilit... 详细信息
来源: 评论
A Novel Identity Authentication Mechanism forUnmanned Maritime Vessels Communication Based on MITRE ATT&CK Framework
收藏 引用
Journal of Marine Science and Technology (Taiwan) 2024年 第2期32卷 170-180页
作者: He, Jun-Xian Chang, Shih-Hao Dept. of Computer Science and Information Engineering Tamkang University New Taipei City Taiwan Dept. of Computer Science and Information Engineering National Taipei University of Technology Taipei City Taiwan
With the development of the smart shipping industry, unmanned vessel technology is rapidly evolving, accompanied by a demand for robust Internet of Things (IoT) communication security practices. Key communication tech... 详细信息
来源: 评论
Experimental Approach to Internal security Threats for 5G-Advanced Core Networks  35
Experimental Approach to Internal Security Threats for 5G-Ad...
收藏 引用
35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2024
作者: Park, Jaehyoung Kim, Jihye Woo, Seungchan Park, Kyungmin Kim, Jonghyun Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security & Convergence Engineering for Metaverse Seoul Korea Republic of Electronics and Telecommunications Research Institute Daejeon Korea Republic of
As we embrace the dawn of the 5G era, the fusion of Software Defined Network (SDN) and Network Function Virtualization (NFV) technologies has heralded a new epoch in network architecture. This provides indispensable c... 详细信息
来源: 评论
Hybrid CNN-ViT architecture to exploit spatio-temporal feature for fire recognition trained through transfer learning
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4703-4732页
作者: Shahid, Mohammad Wang, Hong-Cyuan Chen, Yung-Yao Hua, Kai-Lung Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan Dept. of Electronic and Computer Engineering National Taiwan University of Science and Technology Taipei Taiwan
Fires are becoming one of the major natural hazards that threaten the ecology, economy, human life and even more worldwide. Therefore, early fire detection systems are crucial to prevent fires from spreading out of co... 详细信息
来源: 评论
A Novel Music Recommendation System Using Filtering Techniques
收藏 引用
Informatica (Slovenia) 2024年 第4期48卷 595-610页
作者: Vashishtha, Srishti Varshney, Deepika Sarin, Eva Kaur, Simran Computer Science and Engineering Dept. Bharati Vidyapeeth’s College of Engineering GGSIPU New Delhi India Computer Science and Engineering Dept. Jaypee Institute of Information Technology Noida India
With the growth of the World Wide Web, a large amount of music data is available on the Internet. A large number of people listen to music online rather than downloading and listening offline. But only some sites prov... 详细信息
来源: 评论
A Method for De-Identification Analysis of Encrypted Video  9
A Method for De-Identification Analysis of Encrypted Video
收藏 引用
Joint 9th International Conference on Digital Arts, Media and Technology with 7th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Kim, Deok-Han Kim, Young-Gab Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of
As the variety of video content increases, so does the likelihood of data breaches of sensitive personal information. Consequently, several video de-identification techniques have been developed to protect personal da... 详细信息
来源: 评论
Framework for Cloud-Based Data Management in Autonomous Vehicles
Framework for Cloud-Based Data Management in Autonomous Vehi...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer Science, SCEECS 2025
作者: Pallapothu, Harshith Gopi Krishna, G. Sunil, Digvijay Teja Yadav, S. Nagasundari, S. Pes University Dept. of Computer Science & Engineering Bengaluru India Research Center for Information Security Forensics and Cyber Resilience Pes University Dept. of Computer Science & Engineering Bengaluru India
The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr... 详细信息
来源: 评论
Copyright and License Agreement History Management Framework for Outsourced Software
Copyright and License Agreement History Management Framework...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Lee, Taeyang Lee, Jinsue Woo, Seungchan Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Dept. of Computer and Information Security Seoul Korea Republic of
The practice of transitioning software development tasks to outsourcing has become increasingly prevalent. However, this approach presents challenges in systematically managing the historical records of copyright and ... 详细信息
来源: 评论
Decentralized Identifier System for Software Copyright Transfer and License Management
Decentralized Identifier System for Software Copyright Trans...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Woo, Seungchan Lee, Taeyang Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of
This paper presents a distributed identifier (DID) system that offers transparent and traceable outsourcing support platform for software development. The proposed system is designed to ensure the privacy of contracti... 详细信息
来源: 评论