咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 370 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir
  • 10 篇 muhammad adnan k...

语言

  • 809 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
970 条 记 录,以下是131-140 订阅
排序:
Efficient Deep CNN Model for COVID-19 Classification
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4373-4391页
作者: Walid El-Shafai Amira A.Mahmoud El-Sayed M.El-Rabaie Taha E.Taha Osama F.Zahran Adel S.El-Fishawy Mohammed Abd-Elnaby Fathi E.Abd El-Samie Department Electronics and Electrical Communications Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Coronavirus(COVID-19)infection was initially acknowledged as a global pandemic in Wuhan in *** Health Organization(WHO)stated that the COVID-19 is an epidemic that causes a 3.4%death *** X-Ray(CXR)and computerized Tom... 详细信息
来源: 评论
DSTNet: Distinguishing Source and Target Areas for Image Copy-Move Forgery Detection  27th
DSTNet: Distinguishing Source and Target Areas for Image Cop...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhao, Kaiqi Yuan, Xiaochen Huang, Guoheng Liu, Kun School of Cyberspace Security Shandong University of Political Science and Law Jinan China Faculty of Applied Sciences Macao Polytechnic University China School of Computer Science and Technology Guangdong University of Technology Guangzhou China School of Information Science and Engineering University of Jinan Jinan China
In copy-move forgery detection, most relevant studies concern locating the copy-move areas without the distinction of source and target regions. This paper proposes an end-to-end network, DSTNet, to identify the sourc... 详细信息
来源: 评论
Modeling of Complex Electrodynamic Objects Based on a Combined Approach
Modeling of Complex Electrodynamic Objects Based on a Combin...
收藏 引用
2022 International Siberian Conference on Control and Communications, SIBCON 2022
作者: Lvovich, Igor Lvovich, Yakov Preobrazhenskiy, Andrey Preobrazhenskiy, Yuriy Avetisyan, Tatyana Faculty of Informatics Voronezh Institute of High Technologies Voronezh Russia Voronezh State Technical University Faculty of Information Technology and Computer Security Voronezh Russia
The paper deals with the problem of assessing the characteristics of electromagnetic wave scattering on electrodynamic objects with a complex shape. A combined approach, which is based on the use of statistical method... 详细信息
来源: 评论
Effective Density-Based Concept Drift Detection for Evolving Data Streams  24th
Effective Density-Based Concept Drift Detection for Evolving...
收藏 引用
24th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2023
作者: Cui, Zelin Tian, Hui Shen, Hong Institute of Information Security Engineering Chinese Academy of Sciences Beijing China School of Information and Communication Technology Griffith University Brisbane Australia Faculty of Applied Sciences Macao Polytechnic University China School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China
Concept drift is a common phenomenon appearing in evolving data streams of a wide range of applications including credit card fraud protection, weather forecast, network monitoring, etc. For online data streams it is ... 详细信息
来源: 评论
Modeling the Characteristics of Antenna Based on the Flat Focusing Reflector  24
Modeling the Characteristics of Antenna Based on the Flat Fo...
收藏 引用
24th International Conference on Digital Signal Processing and its Applications, DSPA 2022
作者: Lvovich, Igor Lvovich, Yakov Preobrazhenskiy, Andrey Preobrazhenskiy, Yuriy Voronezh Institute of High Technologies Faculty of Informatics Voronezh Russia Voronezh State Technical University Faculty of Information Technology and Computer Security Voronezh Russia
The paper considers the problem associated with the construction of an antenna, based on the flat focusing reflector with waveguide slots of a square profile, filled with a homogeneous dielectric. Algorithms for anten... 详细信息
来源: 评论
A Scalable and Lightweight Authentication Architecture for the Internet of Things (IoT) in Smart Home Applications  2
A Scalable and Lightweight Authentication Architecture for t...
收藏 引用
2nd Zimbabwe Conference on information Communication and technology, ZCICT 2023
作者: Gamundani, Attlee M. Phillips, Amelia Muyingi, Hippolyte N. Namibia University of Science and Technology Faculty of Computing & Informatics Cyber Security Department Windhoek Namibia University of the Cumberlands School of Computer and Information Sciences WilliamsburgKY United States Namibia University of Science and Technology Faculty of Computing & Informatics Windhoek Namibia
In the evolving landscape of smart home applications, ensuring robust and efficient authentication within the Internet of Things (IoT) environments is paramount. This paper presents a scalable, lightweight authenticat... 详细信息
来源: 评论
Efficient Convolutional Neural Network Based Side Channel Attacks Based on AES Cryptography  21
Efficient Convolutional Neural Network Based Side Channel At...
收藏 引用
21st IEEE Student Conference on Research and Development, SCOReD 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Aman, Azana Hafizah Abdulkadir, Rabiu Aliyu Islam, Shayla Farhan, Basim Abdulkareem Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
In recent years, profiled side-channel attacks have emerged as a particularly potent kind of side-channel attack that can circumvent cryptographic equipment's security. Convolutional neural networks (CNNs) have be... 详细信息
来源: 评论
Bitcoin Price Prediction Using Cuckoo Search Algorithm for Feature Selection with LSTM Model  2
Bitcoin Price Prediction Using Cuckoo Search Algorithm for F...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Radmand, Elnaz Pirgazi, Jamshid Odeh, Mahmoud Sorki, Ali Ghanbari University of Science and Technology of Mazandaran Faculty of Electrical and Computer Engineering Behshahr Iran School of Information Technology Zarqa University Cyber Security Department Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia
Deep learning is now a top method for predicting the price of Bitcoin, providing an excellent and well thought out strategy. This technique makes use of a wealth of historical data from reliable sources covering the f... 详细信息
来源: 评论
Determinants Influencing E- Payment Adoption Amidst COVID-19: A Conceptual Framework  7
Determinants Influencing E- Payment Adoption Amidst COVID-19...
收藏 引用
7th International Conference on New Media Studies, CONMEDIA 2023
作者: Hammood, Waleed A. Abdullah, Khairul Hafezad Hammood, Omar A. Aminuddin, Afrig Asti Astuti, Ika Hadi Purwanto, Ibnu University of Anbar Faculty of Computer Science and Information Technology Department of Information Systems Ramadi Iraq School of Business Management Universiti Utara Malaysia Social Security Management Center of Excellence Utara Malaysia University of Fallujah Faculty of Administration and Economics Business Administration Department Fallujah Iraq Universitas Amikom Yogyakarta Faculty of Computer Science Sleman Indonesia
In recent years, there has been a significant surge in the demand for electronic payments (e-payments), particularly during the COVID-19 pandemic. E-payments have played a crucial role in promoting social distancing a... 详细信息
来源: 评论
Digital Twin-Based Automated Fault Diagnosis in Industrial IoT Applications
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 183-196页
作者: Samah Alshathri Ezz El-Din Hemdan Walid El-Shafai Amged Sayed Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Security Engineering LabPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electrical Energy Engineering College of Engineering&TechnologyArab Academy for Science Technology&Maritime TransportSmart Village CampusEgypt
In recent years, Digital Twin (DT) has gained significant interestfrom academia and industry due to the advanced in information technology,communication systems, Artificial Intelligence (AI), Cloud Computing (CC),and ... 详细信息
来源: 评论