咨询与建议

限定检索结果

文献类型

  • 446 篇 期刊文献
  • 376 篇 会议
  • 4 册 图书

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 611 篇 工学
    • 460 篇 计算机科学与技术...
    • 382 篇 软件工程
    • 159 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 75 篇 电气工程
    • 68 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 45 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 光学工程
    • 24 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 安全科学与工程
  • 305 篇 理学
    • 176 篇 数学
    • 77 篇 生物学
    • 58 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 22 篇 化学
  • 158 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 49 篇 医学
    • 44 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
    • 17 篇 药学(可授医学、理...
  • 33 篇 法学
    • 22 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 11 篇 军事学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 26 篇 authentication
  • 24 篇 deep learning
  • 23 篇 cryptography
  • 15 篇 internet of thin...
  • 14 篇 feature extracti...
  • 13 篇 security
  • 13 篇 training
  • 12 篇 image segmentati...
  • 12 篇 machine learning
  • 11 篇 blockchain
  • 10 篇 object detection
  • 10 篇 accuracy
  • 10 篇 cloud computing
  • 10 篇 privacy
  • 9 篇 computational mo...
  • 9 篇 protocols
  • 9 篇 federated learni...
  • 9 篇 encryption
  • 8 篇 security of data
  • 8 篇 optimization

机构

  • 26 篇 security enginee...
  • 20 篇 key lab of infor...
  • 18 篇 department of el...
  • 14 篇 state key labora...
  • 10 篇 department of co...
  • 10 篇 cyber security d...
  • 9 篇 guangxi key lab ...
  • 8 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 lab-sticc umr cn...
  • 8 篇 department of co...
  • 8 篇 department of in...
  • 8 篇 computer science...
  • 8 篇 key laboratory o...
  • 7 篇 peng cheng labor...
  • 7 篇 key lab. of netw...
  • 7 篇 riphah school of...
  • 7 篇 key lab of netwo...
  • 6 篇 royal stoke univ...

作者

  • 17 篇 walid el-shafai
  • 12 篇 el-shafai walid
  • 10 篇 naglaa f.soliman
  • 9 篇 zheng qinghua
  • 9 篇 tan zuowen
  • 8 篇 el-samie fathi e...
  • 8 篇 yang jian
  • 8 篇 meng deyu
  • 8 篇 muhammad adnan k...
  • 8 篇 taher m.ghazal
  • 7 篇 zhang lei
  • 7 篇 wang wei
  • 7 篇 hu yupu
  • 7 篇 abeer d.algarni
  • 7 篇 pais alwyn r.
  • 6 篇 li yang
  • 6 篇 quist-aphetsi ke...
  • 6 篇 xiaohong guan
  • 6 篇 sagheer abbas
  • 6 篇 nana laurent

语言

  • 739 篇 英文
  • 67 篇 其他
  • 21 篇 中文
检索条件"机构=Network & Information Security Lab. Department of Computer Science and Technology"
826 条 记 录,以下是21-30 订阅
排序:
Visual Transformer for Image Splicing Localization  4
Visual Transformer for Image Splicing Localization
收藏 引用
4th International Conference on Big Data and Artificial Intelligence and Software Engineering, ICBASE 2023
作者: Li, Jie Wang, Zuling Hangzhou Normal University Department of Computer Science Hangzhou China Chongqing Vocational Institute of Safety & Technology Department of Network and Information Security Chongqing China
Image splicing, a prevalent form of image tampering with potential security implications, has prompted the need for reliable models to detect and locate manipulated regions. While convolutional neural network (CNN) ba... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
Customer Retention Using Machine Learning  10
Customer Retention Using Machine Learning
收藏 引用
10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer Engineering, UPCON 2023
作者: Das, Lipsa Salman, Rahama Sabeer, Shaista Ansari, Subuhi Kashif Aarif, Mohd Rana, Ajay Amity School of Engineering and Technology Amity University UP Greater Noida India Jazan University Department of Computer Science Saudi Arabia Global Research Network UP Noida India College of Computer Science & Information Technology Jazan University Department of Information Technology and Security Jazan Saudi Arabia College of Computer Science and Information Technology & Security Jazan University Jazan Saudi Arabia
Maintaining customer retention stands as a pivotal element in ensuring business success, given that the costs associated with acquiring new customers often surpass those linked to retaining existing ones. Recognizing ... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Xian, Peijie He, Ying Yu, F. Richard Du, Jianbo Shenzhen Univ. College of Computer Science and Software Engineering Shenzhen China Xi'an Univ. of Posts & Telecomm. Shaanxi Key Lab. of Information Comm. Network and Security Shaanxi Xi'an China Carleton Univ. School of Information Technology OttawaON Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
Machine Learning-Based Malware Detection and Classification in Encrypted TLS Traffic  1
收藏 引用
Second International Conference on security, Privacy and Data Analytics, ISPDA 2022
作者: Kashyap, Himanshu Pais, Alwyn Roshan Kondaiah, Cheemaladinne Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology Karnataka Karnataka Surathkal575025 India
Malware has become a significant threat to Internet users in the modern digital era. Malware spreads quickly and poses a significant threat to cyber security. As a result, network security measures play an important r... 详细信息
来源: 评论
Early Detection of Autism in Children Using Transfer Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 11-22页
作者: Taher M.Ghazal Sundus Munir Sagheer Abbas Atifa Athar Hamza Alrababah Muhammad Adnan Khan School of Information Technology Skyline University CollegeSharjah1797UAE Network and Communication Technology Lab Center for Cyber SecurityFaculty of Information Science and Technology Universiti Kebangsaan Malaysia43600Malaysia School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Lahore Garrison University Lahore54000Pakistan Department of Computer Science COMSATS University Islamabad–Lahore CampusLahore54000Pakistan Department of Software Pattern Recognition and Machine Learning LabGachon UniversitySeongnamGyeonggido13120Korea
Autism spectrum disorder(ASD)is a challenging and complex neurodevelopment syndrome that affects the child’s language,speech,social skills,communication skills,and logical thinking *** early detection of ASD is essen... 详细信息
来源: 评论
Novel Architecture of security Orchestration, Automation and Response in Internet of Blended Environment
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 199-223页
作者: Minkyung Lee Julian Jang-Jaccard Jin Kwak ISAA Lab Department of Cyber SecurityAjou UniversitySuwon16499Korea Department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand Department of Cyber Security Ajou UniversitySuwon16499Korea
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent *** technologies are used in diverse environments,such... 详细信息
来源: 评论
Deep Imputation Bi-stochastic Graph Regularized Matrix Factorization for Clustering Single-cell RNA-sequencing Data
收藏 引用
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2024年 PP卷 1-11页
作者: Lan, Wei Chen, Jianwei Liu, Mingyang Chen, Qingfeng Liu, Jin Wang, Jianxin Chen, Yi-Ping Phoebe Wei Lan is School of Computer Electronic and Information and Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning Guangxi China School of Computer Electronic and Information Guangxi University Nanning Guangxi China School of Computer Electronic and Information and State Key Laboratory for Conservation and Utilization of Subtropical Agro-bioresources Guangxi University Nanning Guangxi China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha Hunan China Department of Computer Science and Information Technology La Trobe University Melbourne Victoria Australia
By generating massive gene transcriptome data and analyzing transcriptomic variations at the cell level, single-cell RNA-sequencing (scRNA-seq) technology has provided new way to explore cellular heterogeneity and fun... 详细信息
来源: 评论
A Caching Strategy Based on Many-to-Many Matching Game in D2D networks
收藏 引用
Tsinghua science and technology 2021年 第6期26卷 857-868页
作者: Kaihang Yu Zhonggui Ma Runyu Ni Tao Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Key Lab of Information Network Security Ministry of Public SecurityShanghai 201204China
Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components of next-generation wireless networks. This paper focuses on the infl... 详细信息
来源: 评论
Joint Optimization of Compression, Transmission and Computation for Cooperative Perception Aided Intelligent Vehicular networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8201-8214页
作者: Lu, Binbin Huang, Xumin Wu, Yuan Qian, Liping Zhou, Sheng Niyato, Dusit University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 999078 China Guangdong University of Technology School of Automation Guangzhou510006 China University of Macau State Key Lab of Internet of Things for Smart City 999078 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer Information Science 999078 China Zhuhai UM Science and Technology AQ2 Research Institute Zhuhai519301 China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Beijing100084 China Nanyang Technological University School of Computer Science and Engineering 639815 Singapore
Cooperative perception is a promising paradigm to tackle the perception limitations of a single intelligent vehicle (IV) to enhance the driving safety and efficiency in intelligent vehicular networks. However, the rea... 详细信息
来源: 评论