咨询与建议

限定检索结果

文献类型

  • 6,704 篇 会议
  • 40 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,027 篇 工学
    • 3,650 篇 计算机科学与技术...
    • 3,127 篇 软件工程
    • 1,337 篇 信息与通信工程
    • 721 篇 控制科学与工程
    • 645 篇 生物工程
    • 552 篇 电气工程
    • 353 篇 安全科学与工程
    • 294 篇 电子科学与技术(可...
    • 280 篇 网络空间安全
    • 256 篇 动力工程及工程热...
    • 235 篇 生物医学工程(可授...
    • 232 篇 交通运输工程
    • 212 篇 机械工程
    • 171 篇 光学工程
    • 126 篇 化学工程与技术
    • 119 篇 仪器科学与技术
  • 1,698 篇 理学
    • 849 篇 数学
    • 681 篇 生物学
    • 281 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 176 篇 化学
    • 141 篇 系统科学
  • 980 篇 管理学
    • 566 篇 管理科学与工程(可...
    • 503 篇 图书情报与档案管...
    • 288 篇 工商管理
  • 382 篇 法学
    • 223 篇 社会学
    • 175 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 136 篇 经济学
    • 131 篇 应用经济学
  • 79 篇 教育学
  • 55 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 354 篇 network security
  • 210 篇 security
  • 194 篇 deep learning
  • 169 篇 internet of thin...
  • 136 篇 machine learning
  • 130 篇 blockchain
  • 128 篇 software
  • 99 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 69 篇 convolutional ne...
  • 66 篇 cryptography
  • 65 篇 software defined...
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 77 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 50 篇 college of compu...
  • 41 篇 chitkara univers...
  • 36 篇 school of comput...
  • 35 篇 chinese academy ...
  • 31 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 25 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 19 篇 purple mountain ...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu
  • 7 篇 xiao jianmao

语言

  • 6,611 篇 英文
  • 159 篇 其他
  • 38 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6778 条 记 录,以下是81-90 订阅
排序:
A Hybrid WOA-MTCNN Algorithm for Accurate Face Detection Based on IoT Architecture  9th
A Hybrid WOA-MTCNN Algorithm for Accurate Face Detection Bas...
收藏 引用
9th international conference on Intelligent IoT as a Service
作者: Hu, Xi Ruan, Hang Xiong, Xin Zhang, Siqi Huang, Ning Wang, Jun Jianghan Univ State Key Lab Precis Blasting Wuhan 430056 Peoples R China Jianghan Univ Sch Artificial Intelligence Wuhan 430056 Peoples R China Jianghan Univ Artificial Intelligence Inst Wuhan 430056 Peoples R China Dongfeng Motor Corp Tech Ctr Wuhan 430058 Peoples R China
To further improve the detection accuracy in face detection based on IoT architecture, this paper designs and implements a hybrid face detection system based on the MTCNN model, and optimize the MTCNN model by combini... 详细信息
来源: 评论
Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving  19th
Demystifying Blockchain Scalability: Sibling Chains with Min...
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Ma, Jiangfeng Zhang, Xuetao Li, Xiangxue East China Normal Univ Shanghai Key Lab Trustworthy Comp Sch Software Engn Shanghai 200062 Peoples R China Shanghai Key Lab Trusted Data Circulat & Governan Shanghai 200240 Peoples R China
Blockchain provides alluring infrastructure for distributed ledgers supporting anonymous online payments. However, existing solutions for blockchain scalability have limitations of either being increasingly cumbersome... 详细信息
来源: 评论
Unsupervised and Adaptive Tor Website Fingerprinting  19th
Unsupervised and Adaptive Tor Website Fingerprinting
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Zhang, Guoqiang Cao, Jiahao Xu, Mingwei Deng, Xinhao Tsinghua Univ Dept Comp Sci & Technol Beijing Peoples R China Tsinghua Univ Inst Network Sci & Cyberspace Beijing Peoples R China
Over the past few years, deep-learning based approaches for Tor website fingerprinting have experienced a significant breakthrough in prediction accuracy. However, many of these approaches suppose that their training ... 详细信息
来源: 评论
Uncertainty-aware Correspondence Distillation for Deep Image Clustering
Uncertainty-aware Correspondence Distillation for Deep Image...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Chang, Luyao Chen, Leiting Zhou, Chuan School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China
Image clustering is a challenging task in computer vision, with performance heavily dependent on the quality of feature representations due to the inherent complexity of images. However, current image clustering metho... 详细信息
来源: 评论
Privacy-Preserving k-core Decomposition for Graphs  25th
Privacy-Preserving k-core Decomposition for Graphs
收藏 引用
25th international conference on Web Information Systems engineering, WISE 2024
作者: Liu, Xuyang Zhao, Rong Feng, Bingwen Zhang, Jilian College of Cyber Security Jinan University Guangzhou China Engineering Research Center of Trustworthy AI Ministry of Education Jinan University Guangzhou China
k-core decomposition is an important task in graph data processing in various fields, such as social network analysis, computational biology, medicine research, etc. In some applications involving massive graph proces... 详细信息
来源: 评论
System Integration and software Platform engineering Implementation of Digital Twin Model for Ultra-high Voltage Converter Valve Side Bushing
System Integration and Software Platform Engineering Impleme...
收藏 引用
2024 international conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Zhang, Shiling He, Yongsheng Dai, Liangjun Wang, Pengbo Deng, Baojia State Grid Chongqing Electric Power Company Electric Power Research Institute Yubei District Chongqing401123 China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing400044 China
Compared with simulation technology, the prominent feature of digital twin technology is its complex interaction ability with the external information, which enables the digital twin function of the physical objects t... 详细信息
来源: 评论
Practical Privacy-Preserving Community Detection in Decentralized Weighted networks  19th
Practical Privacy-Preserving Community Detection in Decentra...
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Han, Tingxuan Tong, Wei Niu, Jiacheng Zhong, Sheng Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China
As one of the essential graph analysis tasks, community detection plays a crucial role in various applications. Since a graph can be viewed as a collection of users' personal information and the relationships amon... 详细信息
来源: 评论
7th international conference on Wireless Communications, networking and Applications, WCNA 2023
7th International Conference on Wireless Communications, Net...
收藏 引用
7th international conference on Wireless Communications, networking and Applications, WCNA 2023
The proceedings contain 38 papers. The special focus in this conference is on Wireless Communications, networking and Applications. The topics include: EffiNet: An Efficient, Low-Complexity Neural network for Mon...
来源: 评论
15th international conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023
15th International Conference on e-Infrastructure and e-Serv...
收藏 引用
15th international conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023
The proceedings contain 44 papers. The special focus in this conference is on e-Infrastructure and e-Services for Developing Countries. The topics include: Digital Forensics Investigations: Major Challenges in Mobile ...
来源: 评论
15th international conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023
15th International Conference on e-Infrastructure and e-Serv...
收藏 引用
15th international conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2023
The proceedings contain 44 papers. The special focus in this conference is on e-Infrastructure and e-Services for Developing Countries. The topics include: Digital Forensics Investigations: Major Challenges in Mobile ...
来源: 评论