咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,240 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,056 篇 工学
    • 1,629 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 391 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 226 篇 生物工程
    • 183 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 158 篇 机械工程
    • 133 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 化学工程与技术
    • 74 篇 仪器科学与技术
    • 73 篇 网络空间安全
  • 957 篇 理学
    • 531 篇 数学
    • 250 篇 生物学
    • 240 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 70 篇 化学
  • 661 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 109 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 51 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 95 篇 deep learning
  • 90 篇 machine learning
  • 73 篇 accuracy
  • 66 篇 software
  • 65 篇 artificial intel...
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 54 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,060 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3257 条 记 录,以下是21-30 订阅
排序:
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
TSN vs I3D vs Pose-C3D: Action Recognition in Basketball using SpaceJam Dataset  24
TSN vs I3D vs Pose-C3D: Action Recognition in Basketball usi...
收藏 引用
7th International Conference on Computational Intelligence and Intelligent Systems, CIIS 2024
作者: Chiura, Tafadzwa Blessing Van Der Haar, Dustin Academy of Computer Science and Software Engineering Faculty of Science University of Johannesburg Gauteng Johannesburg South Africa
Most of the research conducted in action recognition is mainly focused on general human action recognition, and most of the available datasets support studies in general human action recognition. In more specific cont... 详细信息
来源: 评论
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1383-1398页
作者: Xueqing YAN Yongming LI Sanjiang LI School of Computer Science Shaanxi Normal University School of Mathematics and Statistics Shaanxi Normal University Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile... 详细信息
来源: 评论
Auto-3D-house Design from Structured User Requirements
收藏 引用
Machine Intelligence Research 2025年 第2期22卷 368-385页
作者: Minkui Tan Qi Chen Zixiong Huang Qi Wu Yuanqing Li Jiaqiu Zhou School of Software Engineering South China University of TechnologyGuangzhou 510006China Faculty of Engineering Computer and Mathematical ScienceUniversity of AdelaideAdelaide SA 5005Australia School of Automation Science and Engineering South China University of TechnologyGuangzhou 510006China
We study the task of automated house design,which aims to automatically generate 3D houses from user ***,in the automatic system,it is non-trivial due to the intrinsic complexity of house designing:1)the understanding... 详细信息
来源: 评论
An Improved Farmland Fertility Algorithm with Hyper-Heuristic Approach for Solving Travelling Salesman Problem
收藏 引用
computer Modeling in engineering & sciences 2023年 第6期135卷 1981-2006页
作者: Farhad Soleimanian Gharehchopogh Benyamin Abdollahzadeh Bahman Arasteh Department of Computer Engineering Urmia BranchIslamic Azad UniversityUrmiaIran Department of Software Engineering Faculty of Engineering and Natural ScienceIstinye UniversityIstanbulTurkey
Travelling Salesman Problem(TSP)is a discrete hybrid optimization problem considered *** aims to discover the shortest Hamilton route that visits each city precisely once and then returns to the starting point,making ... 详细信息
来源: 评论
Mitigating Ransomware in Government-Managed Institutions: A Global Critical Information Infrastructure Perspective
Mitigating Ransomware in Government-Managed Institutions: A ...
收藏 引用
20th International Conference on Cyber Warfare and Security, ICCWS 2025
作者: Mashila, Musiwalo Sithungu, Siphesihle Philezwini Lebea, Khutso Academy of Computer Science and Software Engineering Faculty of Science University of Johannesburg South Africa
This paper examines the escalating ransomware threats faced by government-managed educational institutions, focusing on their vulnerabilities, case studies, and mitigation strategies. With the adoption of Bring Your O... 详细信息
来源: 评论
Hybrid Color Texture Features Classification Through ANN for Melanoma
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 2205-2218页
作者: Saleem Mustafa Arfan Jaffar Muhammad Waseem Iqbal Asma Abubakar Abdullah S.Alshahrani Ahmed Alghamdi Faculty of Computer Science&Information Technology Superior UniversityLahore54600Pakistan Department of Software Engineering Superior UniversityLahore54600Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of Jeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method ... 详细信息
来源: 评论
Domination based graph neural networks
收藏 引用
International Journal of computers and Applications 2024年 第11期46卷 998-1005页
作者: Meybodi, Mohsen Alambardar Safari, Mahdi Davoodijam, Ensieh Department of Applied Mathematics and Computer Science Faculty of Mathematics and Statistics University of Isfahan Isfahan Iran Department of Software Engineering University of Kashan Kashan Iran
Graph Neural Networks (GNNs) have emerged as a widely used and effective method across various domains for learning from graph data. Despite the abundance of GNN variants, many struggle with effectively propagating me... 详细信息
来源: 评论
Access Management in IoT: Implementing a Secure Access Control System  15
Access Management in IoT: Implementing a Secure Access Contr...
收藏 引用
15th International Conference on Communications, COMM 2024
作者: Neculai, Razvan-Sebastian Bogdan, Ioana-Corina Alexandru, Marian Robu, Dan-Nicolae Transilvania University of Brasov & Eviden Faculty of Electrical Engineering and Computer Science Department of Cybersecurity Braşov Romania Transilvania University of Brasov Faculty of Electrical Engineering and Computer Science Department of Electronics and Computers Braşov Romania
This paper aims to implement and use the Spring Security framework to secure and authenticate the connection between a web application and the ESP32 device. In the context of a web application, by analyzing the integr... 详细信息
来源: 评论
Early Detection of Cyber-Physical Attacks on Electric Vehicles Fast Charging Stations Using Wavelets and Deep Learning
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2024年 2卷 220-231页
作者: Abu-Nassar, Ahmad M. Morsi, Walid G. Electrical Computer and Software Engineering Department Faculty of Engineering and Applied Science OshawaONL1G 0C5 Canada
Transportation electrification plays an important role in the operation of the smart grid through the integration of the electric vehicle fast charging stations (EVFCSs), which allows the electric vehicles to provide ... 详细信息
来源: 评论