咨询与建议

限定检索结果

文献类型

  • 6,701 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,775 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,022 篇 工学
    • 3,644 篇 计算机科学与技术...
    • 3,131 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 718 篇 控制科学与工程
    • 646 篇 生物工程
    • 544 篇 电气工程
    • 354 篇 安全科学与工程
    • 292 篇 电子科学与技术(可...
    • 278 篇 网络空间安全
    • 256 篇 动力工程及工程热...
    • 235 篇 生物医学工程(可授...
    • 233 篇 交通运输工程
    • 210 篇 机械工程
    • 171 篇 光学工程
    • 126 篇 化学工程与技术
    • 119 篇 仪器科学与技术
  • 1,692 篇 理学
    • 842 篇 数学
    • 682 篇 生物学
    • 278 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 176 篇 化学
    • 142 篇 系统科学
  • 980 篇 管理学
    • 567 篇 管理科学与工程(可...
    • 502 篇 图书情报与档案管...
    • 288 篇 工商管理
  • 384 篇 法学
    • 225 篇 社会学
    • 175 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 136 篇 经济学
    • 131 篇 应用经济学
  • 79 篇 教育学
  • 55 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 192 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 129 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 69 篇 convolutional ne...
  • 66 篇 cryptography
  • 65 篇 software defined...
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 77 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 50 篇 college of compu...
  • 41 篇 chitkara univers...
  • 36 篇 school of comput...
  • 35 篇 chinese academy ...
  • 31 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 25 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 19 篇 purple mountain ...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu
  • 7 篇 xiao jianmao

语言

  • 6,618 篇 英文
  • 149 篇 其他
  • 41 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6775 条 记 录,以下是41-50 订阅
排序:
Research on a more safe image encryption communication algorithm
Research on a more safe image encryption communication algor...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Liu, Lu Li, Yuhui Wang, Ting Qin, Yuhan Ren, Yuhan College of International Education SiChuan Normal University Chengdu610000 China School of Automotive Engineering Harbin Institute of Technology Harbin150001 China Faculty of Computing Harbin Institute of Technology Harbin150001 China Law School SiChuan Normal University Chengdu610000 China
Image encryption has become one of the key techniques for information protection in today's context of increasing number and rising importance of digital communication. The purpose of this paper is to explore a cr... 详细信息
来源: 评论
A secure routing protocol for wireless sensor network
A secure routing protocol for wireless sensor network
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Ye, Peishun Yulin University Yulin China
In this paper, we design a Reputation-based Diffusion Routing (RDR) algorithm based on the reputation evaluation model for selective forwarding attacks in wireless sensor network routing. We introduce the reputation e... 详细信息
来源: 评论
FMAMPN: lightweight feature map attention multipath network for semantic segmentation of remote sensing image
FMAMPN: lightweight feature map attention multipath network ...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Hou, Songqi Yuan, Ying Institute of Spatial Information Technology Xiamen University of Technology Xiamen361024 China
Deep neural networks excel in remote sensing image semantic segmentation, but existing methods, despite their sophistication, often focus on channel and spatial dependencies within identical feature maps. This can lea... 详细信息
来源: 评论
In-vehicle CAN bus security communication protocol based on identity encryption
In-vehicle CAN bus security communication protocol based on ...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Feng, Yao Qin, Guihe Zhang, Zizhan Wang, Guofeng Wang, Kunpeng College of Computer Science and Technology Jilin University Changchun China
The CAN network bus is one of the most widely used buses in the vehicle, but the lack of sufficient security mechanisms allows criminals to maliciously attack the vehicle, which is a very serious security risk. In thi... 详细信息
来源: 评论
TEN: Temporal Excitation network For Video Action Recognition
TEN: Temporal Excitation Network For Video Action Recognitio...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Sun, Dengdi He, Zhenhao Luo, Bin Ding, Zhuanlian School of Artificial Intelligence Anhui University Hefei230601 China School of Computer Science and Technology Anhui University Hefei230601 China School of Internet Anhui University Hefei230039 China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei230026 China
Temporal modeling has attracted the attention of a large number of researchers in the past few years. In this work, we propose a new video architecture, termed as Temporal Excitation network (TEN). The core of TEN is ... 详细信息
来源: 评论
A Rational Decision-Making Approach Based on Bayesian network and BDI Model For Autonomous Driving System
A Rational Decision-Making Approach Based on Bayesian Networ...
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Zhang, Xinyuan Du, Dehui Software Engineering Institute East China Ormal University Shanghai200062 China Shanghai Key Laboratory of Trnstworthy Computing Shanghai200062 China Intemational Joint Laboratory of Trnstworthy Software of Ministry of Education Shanghai200062 China
The safety of decision-making in autonomous driving systems (ADSs) is a challenging issue, which is very important for ADS development. As a highly acceptable decision method, Bayesian Net\vork (BN) has attracted more... 详细信息
来源: 评论
Can large language model replace static analysis tools
Can large language model replace static analysis tools
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Cui, Han School of Software Engineering East China Normal University Shanghai China
Static analysis tools are widely used to ensure code quality and security, especially in large software projects. Recently, the advent of large language models (LLM), such as the Generative Pre-trained Transformer (GP... 详细信息
来源: 评论
Research on network topology visualization under HTML5 technology
Research on network topology visualization under HTML5 techn...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Liu, Jian Dongying Vocational Institute Shandong Dongying257091 China
With the rapid development of computer network technology, the network structure has become increasingly complex, and the number and types of network devices have also shown explosive growth. In order to better unders... 详细信息
来源: 评论
Preface to the special issue on engineering of computer-based systems
收藏 引用
international JOURNAL ON software TOOLS FOR TECHNOLOGY TRANSFER 2025年 第1期27卷 1-3页
作者: Kofron, Jan Margaria, Tiziana Seceleanu, Cristina Charles Univeristy Prague Czech Republic Univ Limerick Limerick Ireland LERO Limerick Ireland Malardalen Univ Vasteras Sweden
This special issue contains nine extended and rigorously peer-reviewed papers selected from those originally presented at ECBS 2023, the 8th international conference on engineering of computer-Based Systems, held at M... 详细信息
来源: 评论
Vehicle CAN bus intrusion detection model based on Bayesian network
Vehicle CAN bus intrusion detection model based on Bayesian ...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Dong, Kangyao Beijing City University 101330 China
With the rapid development of in-vehicle network technology, vehicle safety and protection are facing more and more challenges. The vehicle CAN bus is the main network for vehicle internal communication. However, due ... 详细信息
来源: 评论