咨询与建议

限定检索结果

文献类型

  • 6,701 篇 会议
  • 39 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 6,774 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,022 篇 工学
    • 3,643 篇 计算机科学与技术...
    • 3,131 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 718 篇 控制科学与工程
    • 646 篇 生物工程
    • 544 篇 电气工程
    • 354 篇 安全科学与工程
    • 292 篇 电子科学与技术(可...
    • 278 篇 网络空间安全
    • 256 篇 动力工程及工程热...
    • 235 篇 生物医学工程(可授...
    • 233 篇 交通运输工程
    • 210 篇 机械工程
    • 171 篇 光学工程
    • 126 篇 化学工程与技术
    • 119 篇 仪器科学与技术
  • 1,692 篇 理学
    • 842 篇 数学
    • 682 篇 生物学
    • 278 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 176 篇 化学
    • 142 篇 系统科学
  • 980 篇 管理学
    • 567 篇 管理科学与工程(可...
    • 502 篇 图书情报与档案管...
    • 288 篇 工商管理
  • 384 篇 法学
    • 225 篇 社会学
    • 175 篇 法学
  • 217 篇 医学
    • 165 篇 临床医学
    • 163 篇 基础医学(可授医学...
  • 136 篇 经济学
    • 131 篇 应用经济学
  • 79 篇 教育学
  • 55 篇 农学
  • 22 篇 军事学
  • 18 篇 文学

主题

  • 352 篇 network security
  • 210 篇 security
  • 192 篇 deep learning
  • 169 篇 internet of thin...
  • 135 篇 machine learning
  • 130 篇 blockchain
  • 128 篇 software
  • 98 篇 intrusion detect...
  • 90 篇 feature extracti...
  • 80 篇 neural networks
  • 72 篇 cybersecurity
  • 69 篇 convolutional ne...
  • 66 篇 cryptography
  • 65 篇 software defined...
  • 64 篇 privacy
  • 62 篇 computational mo...
  • 61 篇 training
  • 59 篇 convolution
  • 56 篇 authentication
  • 56 篇 cloud computing

机构

  • 77 篇 school of cyber ...
  • 75 篇 institute of inf...
  • 50 篇 college of compu...
  • 41 篇 chitkara univers...
  • 36 篇 school of comput...
  • 35 篇 chinese academy ...
  • 31 篇 school of inform...
  • 27 篇 university of ch...
  • 26 篇 shandong provinc...
  • 25 篇 school of cyber ...
  • 25 篇 shenzhen univers...
  • 22 篇 school of comput...
  • 19 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of softwa...
  • 19 篇 school of softwa...
  • 19 篇 purple mountain ...
  • 17 篇 peng cheng labor...
  • 17 篇 college of compu...
  • 17 篇 school of comput...

作者

  • 15 篇 sharma ishu
  • 12 篇 liu yang
  • 11 篇 li bo
  • 10 篇 zhang lei
  • 10 篇 zhang bo
  • 9 篇 iqbal muhammad w...
  • 9 篇 chen chen
  • 9 篇 yang wei
  • 9 篇 tiwari mohit
  • 8 篇 zhang yuqing
  • 8 篇 yang yang
  • 8 篇 ishu sharma
  • 8 篇 liu chang
  • 8 篇 liu qingyun
  • 8 篇 li hui
  • 7 篇 wang jing
  • 7 篇 mohit tiwari
  • 7 篇 wang xu
  • 7 篇 qingyun liu
  • 7 篇 xiao jianmao

语言

  • 6,618 篇 英文
  • 148 篇 其他
  • 41 篇 中文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023"
6774 条 记 录,以下是81-90 订阅
排序:
Research and Application of E-commerce Marketing Fraud Detection Method Based on Graph Neural network  24
Research and Application of E-commerce Marketing Fraud Detec...
收藏 引用
2nd international conference on Artificial Intelligence, Systems and network security, AISNS 2024
作者: Zhu, Hui Huang, Zihao Zhong, Weijie Wang, Zhenyu School of Economics and Trade Guangdong Mechanical &Electrical Polytechnic Guangzhou China School of Software Engineering South China University of Technology Guangzhou China School of Software Engineering South China University of Technology Guangdong Guangzhou China
In recent years, graph-based E-commerce Fraud detection methods have received more and more attention, but there are still some problems. Firstly, fraudulent users only account for a small part of active users, and th... 详细信息
来源: 评论
Optimizing Resource Allocation in the Internet of Vehicles: An Intelligent Vehicle-Edge-Cloud Collaboration Approach  20th
Optimizing Resource Allocation in the Internet of Vehicle...
收藏 引用
20th IFIP WG 10.3 international conference on network and Parallel Computing, NPC 2024
作者: Chen, Weijie Lin, Li Xiong, Jinbo Lin, Jiayi Huang, Ruihong Wang, Xing College of Computer and Cyber Security Fujian Normal University Fuzhou China Fujian Provincial University Engineering Research Center of Big Data Analysis and Application Fuzhou China
The proliferation of the Internet of Vehicles (IoV) has spurred the development of computationally intensive and latency-sensitive applications in vehicles. However, limited onboard computing resources hinder their ex... 详细信息
来源: 评论
Bounded Collusion-Resistant Registered Functional Encryption for Circuits  30th
Bounded Collusion-Resistant Registered Functional Encryption...
收藏 引用
30th international conference on the Theory and Application of Cryptology and Information security
作者: Zhang, Yijian Chen, Jie He, Debiao Zhang, Yuqing East China Normal Univ Shanghai Key Lab Trustworthy Comp Sch Software Engn Shanghai Peoples R China Wuhan Univ Inst Math & AI Wuhan Peoples R China Univ Wollongong Inst Cybersecur & Cryptol Sch Comp & Informat Technol Wollongong NSW Australia Wuhan Univ Sch Cyber Sci & Engn Wuhan Peoples R China Univ Chinese Acad Sci Natl Comp Network Intrus Protect Ctr Beijing Peoples R China Hainan Univ Sch Cyberspace Secur Haikou Hainan Peoples R China
As an emerging primitive, Registered Functional Encryption (RFE) eliminates the key-escrow issue that threatens numerous works for functional encryption, by replacing the trusted authority with a transparent key curat... 详细信息
来源: 评论
Anti-Packet-Loss Encrypted Traffic Classification via Masked Autoencoder  18th
Anti-Packet-Loss Encrypted Traffic Classification via Maske...
收藏 引用
18th international conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Yang, Chen Guo, Li Gu, Zheyuan Gou, Gaopeng Lin, Xinjie Xiong, Gang Guan, Yangyang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Encrypted traffic classification is an important technique for network management and network security assurance. Current mainstream methods utilize machine learning and deep learning techniques for classification, an... 详细信息
来源: 评论
A Review on Internet of Things (IoT) Environment Using software-Defined networking (SDN) Based on Different networks
A Review on Internet of Things (IoT) Environment Using Softw...
收藏 引用
international conference on Advances and Applications of Artificial Intelligence and Machine Learning, ICAAAIML 2023
作者: Bajpai, Nidhi Dhingra, Madhavi Chaurasia, Nisha CSE Department Amity University Madhya Pradesh Gwalior India IT Department NIT Jalandhar Jalandhar India
software-Defined networking (SDN) and the Internet of Things (IoT) are collaborating in a transformative way to establish connections. The Internet of Things enables remote management of equipment as well as real-time... 详细信息
来源: 评论
A Novel Approach Using Machine Learning for Accurate Detection of DDoS Attack in software Defined network  2nd
A Novel Approach Using Machine Learning for Accurate Detecti...
收藏 引用
2nd international conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Sharma, Hitesh Kumar Choudhury, Tanupriya Kotecha, Ketan Mahdi, Hussain Falih Dutta, Soumi Bhattacharya, Abhishek Sar, Ayan Energy Acres Bidholi Uttarakhand Bidholi India School of Computer Science University of Petroleum and Energy Studies Uttarakhand Dehradun India Pune India Pune India Department of Computer and Software Engineering University of Diyala Baquba Iraq Sister Nivedita University Chakpachuria India
A denial Of Service (DoS) attack is termed an attack when the request-receiving server or network shuts down or becomes inaccessible for service. This kind of attack is caused by flooding the target server or network ... 详细信息
来源: 评论
Measurement of Performance Parameters in the GPON Optical network  23
Measurement of Performance Parameters in the GPON Optical Ne...
收藏 引用
23rd Slovak-Czech-Polish Optical conference on Wave and Quantum Aspects of Contemporary Optics
作者: Trubák, Kamil Štípal, Jiří Látal, Jan Šiška, Petr Vojtěch, Josef Hristov, Hristo Department of Telecommunications Faculty of Electrical Engineering and Computer Science VSB-Technical University of Ostrava 17. listopadu 2172/15 Ostrava-Poruba708 00 Czech Republic CESNET a. l. e. Zikova 1903/4 Prague160 00 6 Czech Republic Department of Software Technologies Plovdiv University "Paisii Hilendarski" Plovdiv4000 Bulgaria
With the increasing number of end users that are using multimedia services, demand for access network high bitrate systems with sufficient quality of services also increases. However, this might not always be ensured ... 详细信息
来源: 评论
Comparing MAE and RMSE as Fitness of Genetic Algorithm for Optimizing Echo State network Hyperparameters with Different Probabilistic Distributions  25th
Comparing MAE and RMSE as Fitness of Genetic Algorithm for O...
收藏 引用
25th international conference on Intelligent Data engineering and Automated Learning
作者: de Araujo, Henrique Vaz Cardoso, Fabian Correa de Mattos, Viviane Leite Dias Borges, Eduardo Nunes Lucca, Giancarlo Dalmazo, Bruno Lopes Berri, Rafael Alceste Fed Univ Rio Grande BR-96203900 Rio Grande RS Brazil Fed Univ Rio Grande Computat Modeling Grad Program BR-96203900 Rio Grande RS Brazil Univ Rio Verde Fac Software Engn BR-75901970 Rio Verde Go Brazil Univ Catolica Pelotas BR-96015560 Pelotas RS Brazil
This work aims to compare Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE) as fitness functions in a genetic algorithm used to optimize the hyperparameters of an Echo State network (ESN) with five probabil... 详细信息
来源: 评论
Demystifying Blockchain Scalability: Sibling Chains with Minimal Interleaving  19th
Demystifying Blockchain Scalability: Sibling Chains with Min...
收藏 引用
19th international conference on security and Privacy in Communication networks
作者: Ma, Jiangfeng Zhang, Xuetao Li, Xiangxue East China Normal Univ Shanghai Key Lab Trustworthy Comp Sch Software Engn Shanghai 200062 Peoples R China Shanghai Key Lab Trusted Data Circulat & Governan Shanghai 200240 Peoples R China
Blockchain provides alluring infrastructure for distributed ledgers supporting anonymous online payments. However, existing solutions for blockchain scalability have limitations of either being increasingly cumbersome... 详细信息
来源: 评论
A Solution Against Selective Jamming Attack in IEEE 802.15.4e Wireless networks  4th
A Solution Against Selective Jamming Attack in IEEE 802.15.4...
收藏 引用
4th international conference on Data and Information in Online Environments
作者: Wang, Xinlong Yang, Wei Hou, Chengqi Jiangxi Normal Univ Sch Software Nanchang Jiangxi Peoples R China
Industrial wireless technology plays a crucial role in the application of the Internet of Things (IoT). Among them, in the context of increasingly complex network topologies and the issue of control node energy consum... 详细信息
来源: 评论