咨询与建议

限定检索结果

文献类型

  • 657 篇 会议
  • 514 篇 期刊文献
  • 11 册 图书

馆藏范围

  • 1,182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 747 篇 工学
    • 619 篇 计算机科学与技术...
    • 513 篇 软件工程
    • 200 篇 信息与通信工程
    • 127 篇 电气工程
    • 110 篇 控制科学与工程
    • 92 篇 生物工程
    • 78 篇 网络空间安全
    • 52 篇 电子科学与技术(可...
    • 45 篇 生物医学工程(可授...
    • 38 篇 安全科学与工程
    • 29 篇 机械工程
    • 28 篇 仪器科学与技术
    • 26 篇 化学工程与技术
    • 23 篇 光学工程
    • 23 篇 交通运输工程
  • 281 篇 理学
    • 141 篇 数学
    • 101 篇 生物学
    • 46 篇 统计学(可授理学、...
    • 39 篇 物理学
    • 28 篇 化学
    • 25 篇 系统科学
  • 198 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 97 篇 图书情报与档案管...
    • 44 篇 工商管理
  • 68 篇 法学
    • 43 篇 社会学
    • 29 篇 法学
  • 60 篇 医学
    • 48 篇 基础医学(可授医学...
    • 45 篇 临床医学
    • 34 篇 公共卫生与预防医...
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 14 篇 农学
  • 7 篇 教育学
  • 6 篇 军事学
  • 4 篇 艺术学
  • 2 篇 文学

主题

  • 55 篇 accuracy
  • 46 篇 machine learning
  • 46 篇 privacy
  • 45 篇 training
  • 43 篇 deep learning
  • 42 篇 security
  • 41 篇 feature extracti...
  • 40 篇 internet of thin...
  • 40 篇 data models
  • 36 篇 blockchain
  • 35 篇 computational mo...
  • 34 篇 data privacy
  • 29 篇 cloud computing
  • 27 篇 real-time system...
  • 26 篇 predictive model...
  • 25 篇 federated learni...
  • 24 篇 authentication
  • 23 篇 support vector m...
  • 23 篇 artificial intel...
  • 23 篇 convolutional ne...

机构

  • 75 篇 school of cyber ...
  • 51 篇 school of comput...
  • 49 篇 school of cyber ...
  • 48 篇 institute of inf...
  • 27 篇 college of cyber...
  • 26 篇 school of comput...
  • 26 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 school of cyber ...
  • 24 篇 services computi...
  • 24 篇 cluster and grid...
  • 23 篇 school of comput...
  • 22 篇 hubei key labora...
  • 19 篇 division of comp...
  • 19 篇 cyber security d...
  • 19 篇 school of softwa...
  • 17 篇 hubei engineerin...
  • 17 篇 school of inform...
  • 16 篇 state key labora...

作者

  • 37 篇 zhou pan
  • 34 篇 jin hai
  • 30 篇 hai jin
  • 22 篇 cao xiaochun
  • 21 篇 hu shengshan
  • 21 篇 xu qianqian
  • 20 篇 huang qingming
  • 17 篇 choo kim-kwang r...
  • 17 篇 zhu tianqing
  • 15 篇 zhou wanlei
  • 15 篇 zhang leo yu
  • 14 篇 liu daizong
  • 14 篇 yang zhiyong
  • 14 篇 deqing zou
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 zou deqing
  • 12 篇 taher m. ghazal
  • 11 篇 quist-aphetsi ke...
  • 11 篇 wan wei

语言

  • 996 篇 英文
  • 183 篇 其他
  • 4 篇 中文
检索条件"机构=Division of Data Science and Cyber Security School of Computer Science and Technology"
1182 条 记 录,以下是1-10 订阅
排序:
Advanced functional connectivity analysis with integrated EEG signal enhancement and GTW-EEG-GAN for emotion detection
收藏 引用
International Journal of computers and Applications 2024年 第12期46卷 1152-1165页
作者: Babu, Nirmal Varghese Kanaga, E. Grace Mary Division of Computer Science and Engineering School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India Division of Data Science and Cyber Security School of Computer Science and Technology Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India
Emotion recognition is crucial in human-computer interaction and psychological research, utilizing modalities such as facial expressions, voice intonations, and EEG signals. This research investigates AI-driven techni... 详细信息
来源: 评论
Effectiveness of a touch-based hand therapeutic application for hand dexterity in children with handwriting difficulties-a pilot study
收藏 引用
Multimedia Tools and Applications 2024年 第21期84卷 23899-23933页
作者: Smitha, John Renumol, V.G. School of Computer Science and Technology Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India School of Engineering Cochin University of Science and Technology Kochi India
Handwriting is an important skill for children during their academic years. It is the coordination of perceptual-motor and cognitive abilities. Some children have difficulties in handwriting, which is an indication of... 详细信息
来源: 评论
A Local Differential Privacy Hybrid data Clustering Iterative Algorithm for Edge Computing
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1421-1434页
作者: Yousheng ZHOU Zhonghan WANG Yuanni LIU School of Computer Science and Technology Chongqing University of Posts and Telecommunications School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications
As a new computing method, edge computing not only improves the computing efficiency and processing power of data, but also reduces the transmission delay of data. Due to the wide variety of edge devices and the incre... 详细信息
来源: 评论
Ensemble of deep learning models with Walrus Optimization Algorithm for accurate botnet recognition and classification
收藏 引用
Iran Journal of computer science 2025年 1-18页
作者: Chacko, Ashwathy Anda Edwin, E. Bijolin Thanka, M. Roshni Ebenezer, V. Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Coimbatore India
The rapid growth of Internet of Things (IoT) networks has introduced significant security challenges, with botnet attacks being one of the most prevalent threats. These attacks exploit vulnerabilities in IoT devices, ... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
CAED: A Comprehensive Android Emulator Detection Framework With data Augmentation
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 22847-22861页
作者: Yan, Ran Niu, Weina Hou, Qinsheng Su, YuChi Gong, Jiacheng Zhang, Xiaosong University of Electronic Science and Technology of China School of Computer Science and Engineering Institute for Cyber Security Chengdu611731 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China
Anti-emulation is crucial for Android and IoT security as it helps apps determine whether they are running on a real mobile device or in an emulation environment. This prevents apps from being analyzed, debugged, or r... 详细信息
来源: 评论
A Machine Learning Approach for Identifying Mental Health Disorders and Depression in Psychoactive Drug Users  8
A Machine Learning Approach for Identifying Mental Health Di...
收藏 引用
8th International Conference on Trends in Electronics and Informatics, ICOEI 2025
作者: Srivardhan, Cherukuri Daniel, Esther Jebapriya, S. Mathu, T. Karunya Institute of Technology & Sciences Division of Computer Science and Engineering Coimbatore India Karunya Institute of Technology & Sciences Division of Data Science and Cyber Security Coimbatore India
Mental illnesses are among the most prevalent problems worldwide regardless of age. The current investigation examines ML (Machine Learning) methods to predict Depression and CMD (Common Mental Disorders) for people w... 详细信息
来源: 评论
Adaptive Neuro Transformers for Stroke Lesion Segmentation: GatedNeuroTransUNet Implemented using CNNs with Bottleneck Residual Blocks
收藏 引用
SN computer science 2025年 第5期6卷 1-17页
作者: Sulaiman, Sadiya Thanka, M. Roshni Edwin, E. Bijolin Salam, Nader Division of Computer Science and Engineering Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India Division of Data Science and Cyber Security Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India
Accurate lesion segmentation is essential for diagnosing and treating strokes. However, the task of segmenting stroke lesions is difficult due to the intricate backgrounds and noise prevalent in medical images. To tac... 详细信息
来源: 评论
Effective Tool Augmented Multi-Agent Framework for data Analysis
收藏 引用
data Intelligence 2024年 第4期6卷 923-945页
作者: Xilin Zhang Zhixin Mao Ziwen Chen Shen Gao School of Automation Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Computer Science and Engineering(School of Cyber Security) University of Electronic Science and Technology of ChinaChengdu 611731China
data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(L... 详细信息
来源: 评论
DP-PartFIM: Frequent Itemset Mining using Differential Privacy and Partition
收藏 引用
IEEE Transactions on Emerging Topics in Computing 2024年 1-11页
作者: Liu, Xinyu Gan, Wensheng Yu, Lele Liu, Yining School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou China College of Cyber Security Jinan University Guangzhou China
Itemset mining is a popular data mining technique for extracting interesting and valuable information from large datasets. However, since datasets contain sensitive private data, it is not permitted to directly mine t... 详细信息
来源: 评论