咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 368 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 968 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 573 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 18 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 17 篇 alauthman mohamm...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 al-qerem ahmad
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir

语言

  • 807 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
968 条 记 录,以下是61-70 订阅
排序:
Enhancing Phishing URL Detection: A Comparative Study of Machine Learning Algorithms  23
Enhancing Phishing URL Detection: A Comparative Study of Mac...
收藏 引用
2023 Asia Conference on Artificial Intelligence, Machine Learning and Robotics, AIMLR 2023
作者: Alsarhan, Ayoub Igried, Bashar Bani Saleem, Raad Mohammad Alauthman, Mohammad Aljaidi, Mohammad Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Computer Science and Applications Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology TheHashemite University Zarqa Jordan Department of Information Security University of Petra Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan
Phishing constitutes a significant threat in the digital world, often exploiting human vulnerabilities to illicitly obtain sensitive data such as personal credentials, financial details, and private information. Misus... 详细信息
来源: 评论
Novel Adaptive Binarization Method for Degraded Document Images
收藏 引用
computers, Materials & Continua 2021年 第6期67卷 3815-3832页
作者: Siti Norul Huda Sheikh Abdullah Saad M.Ismail Mohammad Kamrul Hasan Palaiahnakote Shivakumara Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaSelangor43600Malaysia The Faculty of Computer and Information Sciences Aljouf UniversitySaudi Arabia Faculty of Computer Systems and Information Technology University of MalayaMalaysia
Achieving a good recognition rate for degraded document images is difficult as degraded document images suffer from low contrast,bleedthrough,and nonuniform illumination *** the existing baseline thresholding techniqu... 详细信息
来源: 评论
Performance Framework for Virtual Machine Migration in Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6289-6305页
作者: Tahir Alyas Taher M.Ghazal Badria Sulaiman Alfurhood Munir Ahmad Ossma Ali Thawabeh Khalid Alissa Qaiser Abbas Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan School of Information Technology Skyline University CollegeUniversity City SharjahSharjah1797UAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebansaan Malaysia(UKM)Bangi43600SelangorMalaysia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversitySaudi Arabia School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Dean of Student Affairs Skyline University CollegeUniversity City SharjahSharjah1797UAE Networks and Communications Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Faculty of Computer and Information Systems Islamic University Madinah Madinah42351Saudi Arabia
In the cloud environment,the transfer of data from one cloud server to another cloud server is called *** can be delivered in various ways,from one data centre to *** research aims to increase the migration performanc... 详细信息
来源: 评论
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
2023 IEEE Region 10 Symposium, TENSYMP 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Center for Cyber Security Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the... 详细信息
来源: 评论
Facial Recognition Utilizing the CLM Model and Supervised Machine Learning: A Comparative Analysis  25
Facial Recognition Utilizing the CLM Model and Supervised Ma...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Iqtait, Musab Ababneh, Jafar Abu-Jassar, Amer Al-Refai, Mohammad Dmour, Mohammad Arabiat, Mohammad Binsaddig, Ruaa Zarqa University Faculty of Information Technology Department of Artificial Intelligence Zarqa Jordan Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Amman Arab University University College of of Computer Sciences and Information Amman Jordan Zarqa University Faculty of Information Technology Software Engineering Department Zarqa Jordan University of Business and Technology College of Business Administration Department of Finance Jeddah21432 Saudi Arabia
Facial recognition is a common challenge in artificial intelligence. We extensively utilized this program in our daily life. Face recognition software was implemented on many phones to protect user identities and prom... 详细信息
来源: 评论
Enhancing visual clarity in hazy media: a comprehensive approach through preprocessing and feature fusion attention-based dehazing
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18071-18093页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and atte... 详细信息
来源: 评论
Source Camera Identification Algorithm Based on Multi-Scale Feature Fusion
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3047-3065页
作者: Jianfeng Lu Caijin Li Xiangye Huang Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Shangyu Institute of Science and Engineering Hangzhou Dianzi UniversityShaoxing312300China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
The widespread availability of digital multimedia data has led to a new challenge in digital *** source camera identification algorithms usually rely on various traces in the capturing ***,these traces have become inc... 详细信息
来源: 评论
Binary and Multi-Class Classification on the IoT-23 Dataset
Binary and Multi-Class Classification on the IoT-23 Dataset
收藏 引用
2023 Advances in Science and Engineering technology International Conferences, ASET 2023
作者: Ahli, Alia Raza, Ayesha Akpinar, Kevser Ovaz Akpinar, Mustafa Rochester Institute of Technology Computing Security Department Dubai United Arab Emirates Higher Colleges of Technology Faculty of Computer Information System Sharjah United Arab Emirates
In the recent years, Internet of Things (IoT) technology has become widespread and is commonly used by organizations for many different purposes. With the increase in the demand for this technology, new security chall... 详细信息
来源: 评论
Secure speaker identification in open and closed environments modeled with symmetric comb filters
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19147-19189页
作者: Shafik, Amira Monir, Mohamad El-Shafai, Walid Khalaf, Ashraf A. M. Nassar, M.M. El-Fishawy, Adel S. El-Din, M. A. Zein Dessouky, Moawad I. El-Rabaie, El-Sayed M. Abd El-Samie, Fathi E. Department Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Laboratory Department of Computer Science Prince Sultan University Riyadh11586 Saudi Arabia Electrical Engineering Department Faculty of Engineering Minia University Minia61519 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Speech is a fundamental means of human interaction. Speaker Identification (SI) plays a crucial role in various applications, such as authentication systems, forensic investigation, and personal voice assistance. Howe... 详细信息
来源: 评论
Centromere Landscapes Resolved from Hundreds of Human Genomes
收藏 引用
Genomics, Proteomics & Bioinformatics 2024年 第5期22卷 61-71页
作者: Shenghan Gao Yimeng Zhang Stephen J. Bush Bo Wang Xiaofei Yang Kai Ye School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi'an Jiaotong UniversityXi'an 710049China Center for Mathematical Medical The First Affiliated HospitalXi'an Jiaotong UniversityXi'an 710061China School of Life Science and Technology Xi'an Jiaotong UniversityXi'an 710049China Faculty of Science Leiden UniversityLeiden 2311 EZThe Netherlands
High-fidelity(HiFi)sequencing has facilitated the assembly and analysis of the most repetitive region of the genome,the ***,our current understanding of human centromeres is based on a relatively small number of telom... 详细信息
来源: 评论