咨询与建议

限定检索结果

文献类型

  • 3,972 篇 期刊文献
  • 175 篇 会议

馆藏范围

  • 4,147 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,561 篇 工学
    • 1,324 篇 计算机科学与技术...
    • 385 篇 软件工程
    • 357 篇 电子科学与技术(可...
    • 334 篇 网络空间安全
    • 300 篇 控制科学与工程
    • 208 篇 仪器科学与技术
    • 179 篇 信息与通信工程
    • 178 篇 机械工程
    • 87 篇 测绘科学与技术
    • 78 篇 地质资源与地质工...
    • 71 篇 环境科学与工程(可...
    • 60 篇 交通运输工程
    • 59 篇 水利工程
    • 53 篇 农业工程
    • 51 篇 电气工程
  • 742 篇 医学
    • 608 篇 临床医学
    • 63 篇 公共卫生与预防医...
  • 598 篇 管理学
    • 466 篇 管理科学与工程(可...
    • 59 篇 公共管理
  • 491 篇 理学
    • 161 篇 数学
    • 52 篇 大气科学
    • 50 篇 生物学
    • 45 篇 地理学
    • 45 篇 生态学
  • 283 篇 农学
    • 142 篇 农业资源与环境
    • 48 篇 作物学
  • 218 篇 经济学
    • 208 篇 应用经济学
  • 83 篇 文学
    • 56 篇 外国语言文学
  • 59 篇 军事学
    • 55 篇 军队指挥学
  • 48 篇 艺术学
    • 46 篇 设计学(可授艺术学...
  • 46 篇 法学
  • 38 篇 教育学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 195 篇 security
  • 141 篇 blockchain
  • 139 篇 machine learning
  • 134 篇 deep learning
  • 90 篇 internet of thin...
  • 86 篇 gis
  • 82 篇 management
  • 75 篇 artificial intel...
  • 67 篇 information
  • 66 篇 privacy
  • 63 篇 iot
  • 61 篇 big data
  • 61 篇 cloud computing
  • 50 篇 authentication
  • 47 篇 covid-19
  • 44 篇 remote sensing
  • 44 篇 data
  • 39 篇 system
  • 39 篇 data mining
  • 37 篇 network

机构

  • 21 篇 university of ch...
  • 21 篇 department of co...
  • 19 篇 department of in...
  • 18 篇 department of co...
  • 17 篇 department of co...
  • 15 篇 department of in...
  • 13 篇 department of in...
  • 13 篇 department of el...
  • 13 篇 department of co...
  • 11 篇 department of lo...
  • 10 篇 department of in...
  • 10 篇 ieee
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 security enginee...
  • 9 篇 department of au...
  • 9 篇 department of co...
  • 9 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 school of econom...

作者

  • 20 篇 walid el-shafai
  • 16 篇 mesfer al duhayy...
  • 14 篇 e.laxmi lydia
  • 14 篇 anwer mustafa hi...
  • 13 篇 abdelwahed motwa...
  • 12 篇 manar ahmed hamz...
  • 11 篇 muhammad shafiq
  • 11 篇 kim-kwang raymon...
  • 11 篇 ashit kumar dutt...
  • 11 篇 fahd n.al-wesabi
  • 11 篇 naglaa f.soliman
  • 11 篇 denis a.pustokhi...
  • 10 篇 mehedi masud
  • 10 篇 muhammad adnan k...
  • 10 篇 fathi e.abd el-s...
  • 10 篇 muhammad attique...
  • 10 篇 irina v.pustokhi...
  • 9 篇 abu sarwar zaman...
  • 9 篇 wei liu
  • 9 篇 fatma s.alrayes

语言

  • 3,873 篇 英文
  • 274 篇 中文
检索条件"机构=Department of Information Security/Data Management"
4147 条 记 录,以下是1-10 订阅
排序:
Novel Rifle Number Recognition Based on Improved YOLO in Military Environment
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 249-263页
作者: Hyun Kwon Sanghyun Lee department of Artificial Intelligence and data Science Korea Military AcademySeoulKorea Graduate School of information security Korea Advanced Institute of Science and TechnologyDaejeonKorea
Deep neural networks perform well in image recognition,object recognition,pattern analysis,and speech *** military applications,deep neural networks can detect equipment and recognize *** military equipment,it is nece... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TransTM:A device-free method based on time-streaming multiscale transformer for human activity recognition
收藏 引用
Defence Technology(防务技术) 2024年 第2期32卷 619-628页
作者: Yi Liu Weiqing Huang Shang Jiang Bobai Zhao Shuai Wang Siye Wang Yanfang Zhang Institute of information Engineering Chinese Academy of Sciences School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina School of information management Beijing Information Science and Technology UniversityBeijingChina
RFID-based human activity recognition(HAR)attracts attention due to its convenience,noninvasiveness,and privacy *** RFID-based HAR methods use modeling,CNN,or LSTM to extract features ***,they have shortcomings:1)requ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim department of Financial information security Kookmin UniversitySeoul02707Republic of Korea department of information security Cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Survey on Fake information Generation,Dissemination and Detection
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 573-583页
作者: Wanqiu CUI Dawei WANG Na HAN School of National security People's Public Security University of China Big data Center of The Ministry of Public security
The current booming development of the Internet has put the public in an era of information overload,in which false information is mixed and spread *** phenomenon has seriously disturbed the social network ***,a subst... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Evaluating the Efficacy of Latent Variables in Mitigating data Poisoning Attacks in the Context of Bayesian Networks:An Empirical Study
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第5期139卷 1635-1654页
作者: Shahad Alzahrani Hatim Alsuwat Emad Alsuwat Independent Researcher Specializing in data security and Privacy Taif26571Saudi Arabia department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah24382Saudi Arabia department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif26571Saudi Arabia
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among ***,the reliability and integrity of learned Bayesian network models are highly dependent on the quality... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big data security Technology Fujian Normal UniversityFuzhouChina department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Big data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan Province Key Laboratory of information security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Utilizing blockchains in opportunistic networks for integrity and confidentiality
收藏 引用
Blockchain(Research and Applications) 2024年 第1期5卷 31-38页
作者: Samaneh Rashidibajgan Thomas Hupperich Cyber security Department of Information SystemsUniversity of Münster80539 MünsterGermany
Opportunistic networks(OppNets)are usually a set of smart,wearable,and portable devices or entities with mobility that connect wirelessly without requiring *** a network is of great importance in data transmission,par... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and information management Division Beijing Electronic Science and Technology InstituteBeijing100070China department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China information security Institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Optimizing ASReview Simulations:A generic Multiprocessing Solution for“Light-data'and“Heavy-data'Users
收藏 引用
data Intelligence 2024年 第2期6卷 320-343页
作者: Sergei Romanov Abel Soares Siqueira Jonathan de Bruin Jelle Teijema Laura Hofstee Rens van de Schoot Applied data Science Department of Information and Computing ScienceFaculty of ScienceUtrecht University Netherlands eScienceCenter AmsterdamNL department of Research and data management Services Information Technology ServicesUtrecht UniversityUtrechtthe Netherlands department of Methodology and Statistics Faculty of Social and Behavioral SciencesUtrecht University
Active learning can be used for optimizing and speeding up the screening phase of systematic *** simulation studies mimicking the screening process can be used to test the performance of different machine-learning mod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论