咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 368 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 968 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 573 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 18 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 17 篇 alauthman mohamm...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 al-qerem ahmad
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir

语言

  • 807 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
968 条 记 录,以下是1-10 订阅
排序:
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 183-211页
作者: Murad Njoum Rossilawati Sulaiman Zarina Shukur Faizan Qamar Center of Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia Computer Science and Cyber Security Faculty of Engineering and Information TechnologyBirZeit UniversityBirZeitRamallahP.O.Box 14Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Enhancing Malware Detection Resilience:A U-Net GAN Denoising Framework for Image-Based Classification
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4263-4285页
作者: Huiyao Dong Igor Kotenko Faculty of Information Technology and Security ITMO National Research UniversitySt.Petersburg197101Russia Laboratory of Computer Security Problems St.Petersburg Federal Research Center of the Russian Academy of SciencesSt.Petersburg199178Russia
The growing complexity of cyber threats requires innovative machine learning techniques,and image-based malware classification opens up new ***,existing research has largely overlooked the impact of noise and obfuscat... 详细信息
来源: 评论
Orbit Weighting Scheme in the Context of Vector Space information Retrieval
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1347-1379页
作者: Ahmad Ababneh Yousef Sanjalawe Salam Fraihat Salam Al-E’mari Hamzah Alqudah Department of Computer Science Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Department of Cybersecurity Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityP.O.Box 346Ajman13306United Arab Emirates Information Security Department Faculty of Information TechnologyUniversity of PetraAmman11196Jordan Department of Data Science and Artificial Intelligence Faculty of Information TechnologyAmerican University of MadabaAmman11821Jordan
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
Classifying Psychiatric Patients Using Machine Learning  25
Classifying Psychiatric Patients Using Machine Learning
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Alrjoob, Hmmam M. Alazaidah, Raed Batyha, Radwan Khafajeh, Hayel Elsoud, Esraa Abu Saeb Al-Sherideh, Ala'a Elrashidi, Ali Alqaraleh, Muhyeeddin Amer, Waleed Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Applied Science Private University Faculty of Information Technology Department of Computer Science Amman Jordan Zarqa University Faculty of Information Technology Department Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Cyper Security Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of Information Technology Department of Software Engineering Zarqa Jordan Zarqa University Faculty on Information Technology Department of Cyber Security Zarqa Jordan
Psychological disorders are considered chronic illnesses that affect a wide range of populations. Some studies in the United States indicate that one in every eight individuals is affected by a psychological disorder.... 详细信息
来源: 评论
Improving long-tail classification via decoupling and regularisation
收藏 引用
CAAI Transactions on Intelligence technology 2025年 第1期10卷 62-71页
作者: Shuzheng Gao Chaozheng Wang Cuiyun Gao Wenjian Luo Peiyi Han Qing Liao Guandong Xu School of Computer Science and Technology Harbin Institute of TechnologyShenzhenChina Peng Cheng Laboratory ShenzhenChina Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Harbin Institute of TechnologyShenzhenChina Faculty of Engineering and Information Technology University of Technology SydneySydneyNew South WalesAustralia
Real-world data always exhibit an imbalanced and long-tailed distribution,which leads to poor performance for neural network-based *** methods mainly tackle this problem by reweighting the loss function or rebalancing... 详细信息
来源: 评论
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2245-2267页
作者: Ashraf S.Mashaleh Noor Farizah Binti Ibrahim Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh School of Computer Sciences Universiti Sains MalaysiaPenangMalaysia Department Computer Center Al-Balqa Applied UniversitySaltJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Department of Computer Science Tafila Technical UniversityTafilaJordan College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic *** IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection *** paper pro... 详细信息
来源: 评论
Enhancing Wireless Sensor Network Data Collection through Aerial Unmanned Vehicles
Enhancing Wireless Sensor Network Data Collection through Ae...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Ali Alheeti, Khattab M. Najim, Ali Hamza Satar, Nurhizam Safie Mohd Aliesawi, Salah A. Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq Faculty of Engineering Department of Electrical and Computer Engineering International Islamic University Malaysia Selangor Malaysia
This study addresses the critical aspect of data collection within Wireless Sensor Networks (WSNs), which consist of autonomous, compact sensor devices deployed to monitor environmental conditions. These networks have... 详细信息
来源: 评论