咨询与建议

限定检索结果

文献类型

  • 6,730 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,804 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,046 篇 工学
    • 3,662 篇 计算机科学与技术...
    • 3,143 篇 软件工程
    • 1,336 篇 信息与通信工程
    • 728 篇 控制科学与工程
    • 646 篇 生物工程
    • 547 篇 电气工程
    • 355 篇 安全科学与工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 网络空间安全
    • 260 篇 动力工程及工程热...
    • 236 篇 生物医学工程(可授...
    • 235 篇 交通运输工程
    • 214 篇 机械工程
    • 171 篇 光学工程
    • 130 篇 化学工程与技术
    • 120 篇 仪器科学与技术
  • 1,698 篇 理学
    • 845 篇 数学
    • 683 篇 生物学
    • 280 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 178 篇 化学
    • 142 篇 系统科学
  • 985 篇 管理学
    • 570 篇 管理科学与工程(可...
    • 504 篇 图书情报与档案管...
    • 289 篇 工商管理
  • 386 篇 法学
    • 225 篇 社会学
    • 177 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 137 篇 经济学
    • 132 篇 应用经济学
  • 80 篇 教育学
  • 56 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 194 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 130 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 70 篇 convolutional ne...
  • 66 篇 software defined...
  • 66 篇 cryptography
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 78 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 51 篇 college of compu...
  • 41 篇 chitkara univers...
  • 37 篇 school of comput...
  • 36 篇 chinese academy ...
  • 31 篇 school of inform...
  • 28 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 24 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 20 篇 purple mountain ...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 xu yuwei
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu

语言

  • 6,524 篇 英文
  • 272 篇 其他
  • 57 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6804 条 记 录,以下是61-70 订阅
排序:
ECOPY:DATA-FREE MODEL STEALING FOR DEEP NEURAL network
ECOPY:DATA-FREE MODEL STEALING FOR DEEP NEURAL NETWORK
收藏 引用
2023 international conference on computer network security and software engineering, cnsse 2023
作者: Qin, Weilun Zhang, Zijiao Xie, Yufei Zhu, Lin School of Cyberspace Security Zhengzhou University Henan Zhengzhou404300 China
Deep neural networks are widely used increasingly in the real world, such as machine learning as a service (MLaas) which makes the owner of the model can deploy their fully trained model in the cloud for others to use... 详细信息
来源: 评论
Research and implementation of urban water supply pipe network management system based on WebGIS
Research and implementation of urban water supply pipe netwo...
收藏 引用
2024 international conference on computer network security and software engineering, cnsse 2024
作者: Cai, Xinpei Lin, Sen Cai, Sihan Chen, Yuxuan Ningbo University of Technology Ningbo China Donghai Group Ningbo China
The urban water supply network affects residents' water use experience and the economic benefits of water supply enterprises, and is an important component of the urban underground pipeline network. With the conti... 详细信息
来源: 评论
software defined networking flow admission and routing under minimal security constraints  22
Software defined networking flow admission and routing under...
收藏 引用
IEEE 22nd international conference on Trust, security and Privacy in Computing and Communications (TrustCom) / BigDataSE conference / CSE conference / EUC conference / ISCI conference
作者: Lopez, Jorge Chatzinakis, Charalampos Cartigny, Marc Poletti, Claude Airbus Issy Les Moulineaux France
In recent years, computer networks and telecommunications in general have been shifting paradigms to adopt software-centric approaches. software Defined networking (SDN) is one of such paradigms that centralizes contr... 详细信息
来源: 评论
Research on network Digital Information security Defense System under computer Big Data Technology
Research on Network Digital Information Security Defense Sys...
收藏 引用
2023 IEEE international conference on Sensors, Electronics and computer engineering, ICSECE 2023
作者: Li, Kexin Henan College of Industry & Information Technology Department of Information Engineering Henan Jiaozuo China
This paper introduces a Web information security protection and Web data mining based on web content data collection, classification, type determination and other functions. The software mainly includes: web text acqu... 详细信息
来源: 评论
Database programming technology for computer software engineering
Database programming technology for computer software engine...
收藏 引用
2022 international conference on computer network security and software engineering, cnsse 2022
作者: Liu, Lei Jiangxi Industry Polytechnic College Jiangxi Nanchang330095 China
The application of database programming technology in computer software engineering is mainly for the establishment of the database. The first thing is to improve the database system, start from the network operation ... 详细信息
来源: 评论
Application Research of computer Artificial Intelligence Technology in network security System
Application Research of Computer Artificial Intelligence Tec...
收藏 引用
2023 IEEE international conference on Sensors, Electronics and computer engineering, ICSECE 2023
作者: Zhang, Yuxin Tianjin University of Technology Tianjin China
This paper proposes an intelligent network security defense system based on multi-agent architecture. Objective To prevent network intrusion. First of all, the factors of modern computer network security risk are anal... 详细信息
来源: 评论
A Survey on security and Challenges in software-Defined networking  10
A Survey on Security and Challenges in Software-Defined Netw...
收藏 引用
10th IEEE Uttar Pradesh Section international conference on Electrical, Electronics and computer engineering, UPCON 2023
作者: Abhishek Kaur, Manjot School of Computer Science and Engineering Lovely Professional University Punjab Phagwara India
The fast-evolving trends in communication and information technology, such as cloud, mobile, and big data, are posing new challenges for the future of the Internet. For these challenges, ubiquity, longer bandwidth, an... 详细信息
来源: 评论
Research on model validation of routing protocol for UAV swarm cooperative disaster relief system
Research on model validation of routing protocol for UAV swa...
收藏 引用
2023 international conference on computer Application and Information security, ICCAIS 2023
作者: Wei, Tonghao Liu, Jie Yang, Fei Han, Wenxing Jiang, Wei School of Computer Science/Software University of South China Hunan Hengyang China Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Sichuan Chengdu China
In recent years, with the continuous expansion of unmanned aerial vehicle (UAV) swarm applications and the rapid development of the UAV self-organizing network system, the related security threats have also increased.... 详细信息
来源: 评论
Management and Application of computer software engineering Based On Improved Manta Rays Optimization Algorithm
Management and Application of Computer Software Engineering ...
收藏 引用
2023 international conference on Data Science and network security, ICDSNS 2023
作者: Li, Fen Wuhan Qingchuan University Wuhan China
This paper mainly discusses the management and application of computer software engineering to improve the optimization algorithm of manta rays. With the rapid development of computer science and engineering, more and... 详细信息
来源: 评论
Research on Telecommuting security Solution Based on Zero Trust Architecture  1
收藏 引用
13th international conference on computer engineering and networks (CENet)
作者: Kou, Wanli Zhou, Huaizhe Du, Jia Natl Univ Def Technol Test Ctr Xian Peoples R China
With the continuous deepening of information technology construction and the surge in demand for telecommuting, traditional security protection measures are difficult to cope with complex network environments. Solving... 详细信息
来源: 评论