咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,235 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,047 篇 工学
    • 1,617 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 93 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 67 篇 software
  • 66 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,880 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3255 条 记 录,以下是821-830 订阅
排序:
Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks
Securing Smart Grids: Deep Reinforcement Learning Approach f...
收藏 引用
International Conference on Smart Communications and Networking (SmartNets)
作者: Ahmed T. El-Toukhy Islam Elgarhy Mahmoud M. Badr Mohamed Mahmoud Mostafa M. Fouda Mohamed I. Ibrahem Fathi Amsaad Department of Electrical and Computer Engineering Tennessee Tech. University Cookeville TN USA Department of Electrical Engineering Faculty of Engineering Al-Azhar University Cairo Egypt Department of Computer Systems Faculty of Computer and Information Sciences Ain Shams University Egypt Department of Network and Computer Security: Cybersecurity SUNY Polytechnic Institute Utica NY USA Department of Electrical Engineering Faculty of Engineering at Shoubra Benha University Cairo Egypt Department of Electrical and Computer Engineering Idaho State University Pocatello ID USA Center for Advanced Energy Studies (CAES) Idaho Falls ID USA School of Computer and Cyber Sciences Augusta University Augusta GA USA Department of Computer Science and Engineering Wright State University Dayton OH USA
Smart meters (SMs) are deployed in smart power grids to monitor customer power consumption and facilitate energy management. However, fraudulent customers can compromise these SMs to manipulate power readings and enga... 详细信息
来源: 评论
Enhanced Area Triboelectric Nanogenerator Utilizing Recycled Single Used Plastic Bubble Wrap and Discarded Sketching Paper Ensuring Circularity of Material
Enhanced Area Triboelectric Nanogenerator Utilizing Recycled...
收藏 引用
Conference on Technologies for Sustainability (Sustech)
作者: Muhammad Umaid Bukhari Kashif Riaz Rehan Ahmed Adeel Arshad Khawaja Qasim Maqbool Arshad Khan Amine Bermak Abdelkrim Khelif Department of Computer and Software Engineering Information Technology University of the Punjab Lahore Pakistan Division of Computing and Information Technology College of Science and Engineering Hamad Bin Khalifa University Doha Qatar Department of Electrical Engineering Information Technology University of the Punjab Lahore Pakistan Faculty of Engineering and Technology Superior University Lahore Pakistan Department of Computer Science Bahria University Lahore Pakistan
Plastic pollution has become a major environmental challenge globally as millions of tons of plastic waste are entering oceans and landfills every year. The production and usage of plastic has surged due to its low co... 详细信息
来源: 评论
A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things
A Secured and Optimized Broadcast Authentication Scheme for ...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), International Conference on
作者: Syed Waleed Riaz Fazlullah Khan Insaf Ullah Bandar Alshawi Ryan Alturki Mohammad Wedyan Computer Science Department Abdul Wali Khan University Mardan KPK Pakistan Faculty of Science and Engineering School of Computer Science University of Nottingham Ningbo China Ningbo Zhejiang China Institute for Analytics and Data Science University of Essex Colchester UK Department of Computer and Network Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Computer Sciences Faculty of Information Technology and Computer Sciences Yarmouk University (YU) Irbid Jordan
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo... 详细信息
来源: 评论
Image Reconstruction Improvement of Variable Coded Aperture Using Deep Learning Method for Gamma and Lensless Imaging Applications
Image Reconstruction Improvement of Variable Coded Aperture ...
收藏 引用
Conference on Lasers and Electro-Optics Europe (CLEO EUROPE)
作者: Ariel Schwarz Amir Shemer Eliezer Danan Noa E. Cohen Yossef Danan Department of Electrical and Electronics Engineering Azrieli College of Engineering Jerusalem Israel Faculty of Engineering Bar-Ilan University Ramat-Gan Israel School of Software Engineering and Computer Science Azrieli College of Engineering Jerusalem Israel
In gamma ray imaging for nuclear medicine, coded aperture is used to improve sensitivity. one of the main reconstructing methods is inverse filtering (deconvolution), where the recorded image is cross-correlated with ... 详细信息
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among IT Students
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
International IEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Anita Mihalovicsne Kollar Jozsef Katona Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Institute of Electronics and Communication Systems Kando Kalman Faculty of Electrical Engineering Obuda University Budapest Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论
Leveraging Bitcoin Mining Machines in Demand-Response Mechanisms to Mitigate Ramping-Induced Transients
arXiv
收藏 引用
arXiv 2024年
作者: Ginzburg-Ganz, Elinor Eyal, Ittay Machlev, Ram Baimel, Dmitry Santosh, Leena Belikov, Juri Levron, Yoash Segev, I. Keren, S. Andrew and Erna Viterbi Faculty of Electrical & Computer Engineering Technion—Israel Institute of Technology Haifa3200003 Israel Computer Science Faculty of Electrical and Computer Engineering Technion—Israel Institute of Technology Haifa3200003 Israel Shamoon College of Engineering Beer-Sheva84100 Israel Pandit Deendayal Energy University India Department of Software Science Tallinn University of Technology Akadeemia tee 15a Tallinn12618 Estonia
We propose an extended demand response program, based on ancillary service for supplying flexible electricity demand. In our proposed scheme, we suggest a broader management model to control the scheduling and power c...
来源: 评论
Harnessing ML and NLP for Enhanced cybersecurity: A Comprehensive Approach for Phishing Email Detection
Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehe...
收藏 引用
Information Technology (ACIT)
作者: Mahmoud AlJamal Rabee Alquran Mohammad Aljaidi Osama S AlJamal Ayoub Alsarhan Issa Al-Aiash Ghassan Samara Mohammad BaniSalman Mohammad Khouj Department of Cybersecurity Faculty of Science and Information Technology Irbid National University Irbid Jordan Department of Information Technology Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University Zarqa Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Department of Computer Science Al Hussein Technical University Amman Jordan Jordan Research and Training Reactor(JRTR) Irbid Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia
Emails stand as a predominant mode of online communication, facilitating the exchange of information. With the ubiquity of emails, there has been a marked rise in unsolicited messages, particularly phishing emails. Th... 详细信息
来源: 评论
Weighted Density for The Win: Accurate Subspace Density Clustering
Weighted Density for The Win: Accurate Subspace Density Clus...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Maixuan Peng Yuyang Wu Yang Lu Mengke Li Yiqun Zhang Yiu-Ming Cheung School of Computer Science and Technology Guangdong University of Technology Guangzhou China Faculty of Science Wilfrid Laurier University Brantford Canada Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer Science Hong Kong Baptist University China
k-clustering typically struggles with the detection of irregular-distributed clusters due to the natural bias, while density clustering usually cannot well-adapt to different datasets and clustering tasks as it is not... 详细信息
来源: 评论
Multi-batch Nuclear-norm Adversarial Network for Unsupervised Domain Adaptation
Multi-batch Nuclear-norm Adversarial Network for Unsupervise...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Pei Wang Yun Yang Zhenyu Yu School of Information Science and Engineering Yunnan University Kunming China National Pilot School of Software Yunnan University Kunming China Yunnan Key Laboratory of Software Engineering Yunnan University Kunming China Guangzhou University Guangzhou China CISiP Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia
Adversarial learning has achieved great success for unsupervised domain adaptation (UDA). Existing adversarial UDA methods leverage the predicted discriminative information with Nuclear-norm Wasserstein discrepancy fo... 详细信息
来源: 评论
Everything you wanted to know about ChatGPT: Components, capabilities, applications, and opportunities
收藏 引用
Internet Technology Letters 2024年 第6期7卷
作者: Heidari, Arash Navimipour, Nima Jafari Zeadally, Sherali Chamola, Vinay Department of Software Engineering Haliç University Istanbul Turkey Department of Computer Engineering Faculty of Engineering and Natural Science İstanbul Atlas University Istanbul Turkey Department of Computer Engineering Faculty of Engineering and Natural Sciences Kadir Has University Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Douliou Taiwan College of Communication and Information University of Kentucky LexingtonKY United States Pilani India
Conversational Artificial Intelligence (AI) and Natural Language Processing have advanced significantly with the creation of a Generative Pre-trained Transformer (ChatGPT) by OpenAI. ChatGPT uses deep learning techniq... 详细信息
来源: 评论