咨询与建议

限定检索结果

文献类型

  • 5,676 篇 期刊文献
  • 131 篇 会议
  • 1 册 图书

馆藏范围

  • 5,808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,925 篇 工学
    • 2,664 篇 计算机科学与技术...
    • 1,102 篇 软件工程
    • 982 篇 电子科学与技术(可...
    • 878 篇 控制科学与工程
    • 779 篇 网络空间安全
    • 602 篇 机械工程
    • 592 篇 仪器科学与技术
    • 586 篇 信息与通信工程
    • 74 篇 电气工程
    • 58 篇 航空宇航科学与技...
    • 56 篇 光学工程
    • 46 篇 材料科学与工程(可...
    • 39 篇 交通运输工程
    • 36 篇 公安技术
    • 33 篇 生物医学工程(可授...
    • 25 篇 化学工程与技术
    • 20 篇 测绘科学与技术
  • 1,194 篇 管理学
    • 1,166 篇 管理科学与工程(可...
    • 24 篇 公共管理
  • 672 篇 理学
    • 279 篇 数学
    • 159 篇 物理学
    • 133 篇 系统科学
    • 38 篇 生物学
  • 417 篇 医学
    • 372 篇 临床医学
  • 154 篇 军事学
    • 152 篇 军队指挥学
  • 88 篇 艺术学
    • 87 篇 设计学(可授艺术学...
  • 85 篇 经济学
    • 83 篇 应用经济学
  • 56 篇 教育学
    • 49 篇 教育学
  • 49 篇 农学
  • 46 篇 文学
    • 33 篇 外国语言文学
  • 41 篇 法学
    • 26 篇 社会学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 522 篇 deep learning
  • 315 篇 security
  • 250 篇 machine learning
  • 174 篇 network
  • 170 篇 internet of thin...
  • 144 篇 blockchain
  • 94 篇 authentication
  • 92 篇 iot
  • 78 篇 clustering
  • 77 篇 wireless sensor ...
  • 73 篇 intrusion detect...
  • 68 篇 convolutional ne...
  • 67 篇 network security
  • 64 篇 covid-19
  • 64 篇 cybersecurity
  • 61 篇 cnn
  • 61 篇 neural network
  • 61 篇 artificial intel...
  • 61 篇 cloud computing
  • 60 篇 optimization

机构

  • 65 篇 department of co...
  • 60 篇 department of co...
  • 48 篇 department of co...
  • 46 篇 department of in...
  • 34 篇 department of in...
  • 34 篇 ieee
  • 31 篇 department of co...
  • 31 篇 department of co...
  • 25 篇 department of co...
  • 25 篇 department of in...
  • 24 篇 department of co...
  • 23 篇 department of el...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 department of in...
  • 19 篇 department of in...
  • 18 篇 department of co...
  • 18 篇 information tech...
  • 18 篇 department of co...
  • 17 篇 department of co...

作者

  • 60 篇 abdelwahed motwa...
  • 48 篇 anwer mustafa hi...
  • 46 篇 mesfer al duhayy...
  • 44 篇 manar ahmed hamz...
  • 37 篇 ishfaq yaseen
  • 33 篇 fahd n.al-wesabi
  • 32 篇 walid el-shafai
  • 30 篇 mehedi masud
  • 30 篇 fathi e.abd el-s...
  • 27 篇 abu sarwar zaman...
  • 25 篇 naglaa f.soliman
  • 22 篇 radwa marzouk
  • 20 篇 yunyoung nam
  • 19 篇 mohammed rizwanu...
  • 18 篇 seifedine kadry
  • 18 篇 mahmoud ragab
  • 17 篇 gyanendra prasad...
  • 17 篇 jie wu
  • 17 篇 doaa sami khafag...
  • 17 篇 muhammad attique...

语言

  • 5,550 篇 英文
  • 258 篇 中文
检索条件"机构=Department of Computer Information and Network Security"
5808 条 记 录,以下是1-10 订阅
排序:
A Support Vector Machine(SVM)Model for Privacy Recommending Data Processing Model(PRDPM)in Internet of Vehicles
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 389-406页
作者: Ali Alqarni department of computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha61922Saudi Arabia
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Text-Image Feature Fine-Grained Learning for Joint Multimodal Aspect-Based Sentiment Analysis
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 279-305页
作者: Tianzhi Zhang Gang Zhou Shuang Zhang Shunhang Li Yepeng Sun Qiankun Pi Shuo Liu School of Data and Target Engineering Information Engineering UniversityZhengzhou450001China information Engineering department Liaoning Provincial College of CommunicationsShenyang110122China School of computer and Artificial Intelligence Zhengzhou UniversityZhengzhou450000China
Joint Multimodal Aspect-based Sentiment Analysis(JMASA)is a significant task in the research of multimodal fine-grained sentiment analysis,which combines two subtasks:Multimodal Aspect Term Extraction(MATE)and Multimo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Self-Supervised Learning network for Binocular Disparity Estimation
收藏 引用
computer Modeling in Engineering & Sciences 2025年 第1期142卷 209-229页
作者: Jiawei Tian Yu Zhou Xiaobing Chen Salman A.AlQahtani Hongrong Chen Bo Yang Siyu Lu Wenfeng Zheng department of computer Science and Engineering Major in Bio Artificial IntelligenceHanyang UniversityAnsan-si15577Republic of Korea School of Electrical and computer Engineering Louisiana State UniversityBaton RougeLA 70803USA department of computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11574Saudi Arabia School of Automation University of Electronic Science and Technology of ChinaChengdu610054China
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study prop... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment
收藏 引用
computer Modeling in Engineering & Sciences 2025年 第1期142卷 813-834页
作者: Chanhyeong Cho Byeori Kim Haehyun Cho Taek-Young Youn department of Cyber security Dankook UniversityYongin16890Republic of Korea department of Software Soongsil UniversitySeoul07027Republic of Korea
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly ***,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1129-1150页
作者: Shijie Tang Yong Ding Huiyong Wang School of computer Science and information security Guilin University of Electronic TechnologyGuilin541004China School of Electronic Engineering and Automation Guilin University of Electronic TechnologyGuilin541004China Guangxi Engineering Research Center of Industrial Internet security and Blockchain Guilin University of Electronic TechnologyGuilin541004China Institute of Cyberspace Technology HKCT Institute for Higher EducationHong Kong999077China School of Mathematics&Computing Science Guilin University of Electronic TechnologyGuilin541004China
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Robust security Detection Strategy for Next Generation IoT networks
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 443-466页
作者: Hafida Assmi Azidine Guezzaz Said Benkirane Mourade Azrour Said Jabbour Nisreen Innab Abdulatif Alabdulatif Technology Higher School Essaouira Cadi Ayyad UniversityEssaouira44000Morocco IMIA Laboratory MSIA TeamFaculty of Sciences and TechniquesMoulay Ismail University of MeknesErrachidia50050Morocco CRIL-CNRS Artois UniversityLens62300France department of computer Science and information Systems College of Applied SciencesAlMaarefa UniversityDiriyahRiyadh13713Saudi Arabia department of computer Science College of ComputerQassim UniversityBuraydah52571Saudi Arabia
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating *** connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Steel Surface Defect Recognition in Smart Manufacturing Using Deep Ensemble Transfer Learning-Based Techniques
收藏 引用
computer Modeling in Engineering & Sciences 2025年 第1期142卷 231-250页
作者: Tajmal Hussain Jongwon Seok department of information and Communication Engineering Changwon National UniversityChangwon51140Republic of Korea
Smart manufacturing and Industry 4.0 are transforming traditional manufacturing processes by utilizing innovative technologies such as the artificial intelligence(AI)and internet of things(IoT)to enhance efficiency,re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless networks
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1151-1169页
作者: Khalil Ullah Song Jian Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad Faculty of information Engineering and Automation Kunming University of Science and TechnologyKunming650500China department of computer Science Abbottabad University of Science and TechnologyHavelianAbbottabad22500Pakistan department of Computing and Electronics Engineering Middle East CollegeMuscat124Oman department of CS&IT Pak-Austria Fachhochschule Institute of Applied Sciences and Technology MangHaripur22621Pakistan Industrial Engineering department College of EngineeringKing Saud UniversityRiyadh11421Saudi Arabia
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1211-1232页
作者: Jiyu Zhang Kehe Wu Ruomeng Yan Zheng Tian Yizhen Sun Yuxi Wu Yaogong Guo department of Control and computer Engineering North China Electric Power UniversityBeijing102206China State Grid information&Communication Company of Hunan Electric Power Corporation Changsha410118China State Grid Hunan Electric Power Corporation Chenzhou Power Supply Branch Chenzhou423000China
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Intrumer:A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 579-607页
作者: Nazreen Banu A S.K.B.Sangeetha department of computer Science and Engineering SRM Institute of Science and TechnologyVadapalani CampusChennai600026Tamil NaduIndia
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论