咨询与建议

限定检索结果

文献类型

  • 46,314 篇 会议
  • 175 篇 期刊文献
  • 168 册 图书

馆藏范围

  • 46,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27,932 篇 工学
    • 23,810 篇 计算机科学与技术...
    • 19,070 篇 软件工程
    • 8,568 篇 信息与通信工程
    • 4,805 篇 控制科学与工程
    • 4,442 篇 生物工程
    • 3,489 篇 电气工程
    • 2,980 篇 生物医学工程(可授...
    • 2,019 篇 网络空间安全
    • 1,965 篇 电子科学与技术(可...
    • 1,918 篇 光学工程
    • 1,916 篇 安全科学与工程
    • 1,827 篇 机械工程
    • 1,787 篇 交通运输工程
    • 1,770 篇 动力工程及工程热...
    • 1,455 篇 仪器科学与技术
    • 1,388 篇 化学工程与技术
  • 13,622 篇 理学
    • 7,084 篇 数学
    • 4,716 篇 生物学
    • 2,928 篇 统计学(可授理学、...
    • 2,775 篇 物理学
    • 1,676 篇 化学
    • 1,283 篇 系统科学
  • 9,438 篇 管理学
    • 5,450 篇 图书情报与档案管...
    • 4,942 篇 管理科学与工程(可...
    • 2,740 篇 工商管理
  • 3,145 篇 医学
    • 2,588 篇 临床医学
    • 2,514 篇 基础医学(可授医学...
    • 1,630 篇 药学(可授医学、理...
    • 1,500 篇 公共卫生与预防医...
  • 1,977 篇 法学
    • 1,589 篇 社会学
  • 1,088 篇 经济学
  • 855 篇 农学
  • 696 篇 教育学
  • 216 篇 文学
  • 104 篇 军事学
  • 8 篇 艺术学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 1,113 篇 machine learning
  • 1,106 篇 deep learning
  • 741 篇 internet of thin...
  • 695 篇 big data
  • 506 篇 forecasting
  • 476 篇 blockchain
  • 455 篇 support vector m...
  • 445 篇 data mining
  • 369 篇 feature extracti...
  • 324 篇 computational mo...
  • 319 篇 training
  • 295 篇 long short-term ...
  • 290 篇 covid-19
  • 290 篇 object detection
  • 283 篇 convolutional ne...
  • 279 篇 sentiment analys...
  • 275 篇 data privacy
  • 266 篇 data models
  • 253 篇 predictive model...
  • 249 篇 cloud computing

机构

  • 187 篇 university of sc...
  • 120 篇 school of comput...
  • 112 篇 chitkara univers...
  • 108 篇 centre of interd...
  • 89 篇 karnataka bangal...
  • 81 篇 computer science...
  • 78 篇 maharishi school...
  • 62 篇 computer science...
  • 58 篇 shandong provinc...
  • 57 篇 school of comput...
  • 56 篇 college of compu...
  • 55 篇 vishwakarma inst...
  • 52 篇 department of co...
  • 51 篇 school of comput...
  • 50 篇 department of el...
  • 49 篇 huazhong univers...
  • 49 篇 graphic era deem...
  • 48 篇 department of co...
  • 47 篇 school of comput...
  • 45 篇 department of ph...

作者

  • 61 篇 haungs a.
  • 45 篇 fan k.l.
  • 44 篇 chen z.
  • 44 篇 butterfield d.
  • 43 篇 flaggs b.
  • 43 篇 fürst p.
  • 43 篇 alameddine j.m.
  • 42 篇 de mitri i.
  • 42 篇 aglietta m.
  • 42 篇 anastasi g.a.
  • 42 篇 bourbeau e.
  • 42 篇 li li
  • 41 篇 bismark k.
  • 41 篇 fazzini n.
  • 41 篇 avila g.
  • 41 篇 covault c.e.
  • 41 篇 deligny o.
  • 41 篇 almeida cheminan...
  • 41 篇 condorelli a.
  • 41 篇 zhang lei

语言

  • 44,594 篇 英文
  • 2,051 篇 其他
  • 534 篇 中文
  • 1 篇 葡萄牙文
检索条件"任意字段=2023 International Conference on Data, Information and Computing Science, CDICS 2023"
46657 条 记 录,以下是11-20 订阅
排序:
Secure Sharing of university data Using Hyperledger Fabric and IPFS system  18
Secure Sharing of university Data Using Hyperledger Fabric a...
收藏 引用
18th international conference on Future Networks and Communications (FNC) / 20th international conference on Mobile Systems and Pervasive computing (MobiSPC) / 13th international conference on Sustainable Energy information Technology (SEIT)
作者: Marhane, Khaoula Taif, Fatima Namir, Abdelouahed Univ Hassan 2 Fac Sci Ben Msik Bd Commandant Driss Al Harti Casablanca 20670 Morocco
the university often sharing the data with the her providers the services and the projects. While the general rule from education records cannot be disclosed a anyone. In this paper we proposed hyperledger fabric in s... 详细信息
来源: 评论
A High Capacity Combined Carrier Steganography Without Embedding Image
A High Capacity Combined Carrier Steganography Without Embed...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big data computing, 2023 international conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Zhang, Yangwen Chen, Yuling Dou, Hui Luo, Yun Tan, Chaoyue Xiong, Maolin College of Computer Science and Technology Guizhou University State Key Laboratory of Public Big Data Guiyang China
The technique of image steganography is the embedding of secret information into the carrier image by means of algorithms that are widely used in the field of information transmission, but steganalysis tools built wit... 详细信息
来源: 评论
Recommendation Algorithm Based on Social information and Global Average Matrix Decomposition
Recommendation Algorithm Based on Social Information and Glo...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big data computing, 2023 international conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Wang, Wanliang Jiang, Jiulei Li, Shengqing School of Computer Science and Engineering North Minzu University Yinchuan China School of Computer Science and Engineering Changshu Institute of Technology Suzhou China
Traditional recommendation systems typically rely solely on user content information to predict product ratings while ignoring the impact of other factors on recommendation effectiveness. Proposes a recommendation alg... 详细信息
来源: 评论
Fault-Tolerant data Aggregation with Error-Checking for Smart Grids
Fault-Tolerant Data Aggregation with Error-Checking for Smar...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big data computing, 2023 international conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Wang, Congcong Wang, Chen Shen, Jian Vijayakumar, Pandi Bhuiyan, Zakirul Alam School of Software Nanjing University of Information Science & Technology Nanjing210044 China School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China University College of Engineering Tindivanam Department of Computer Science and Engineering Tamilnadu 604001 India Fordham University Department of Computer and Information Sciences NY10458 United States
With the rapid development of smart grid technology, a new challenge has been brought about by the massive data generated from distributed devices. data aggregation technology plays a crucial role in smart grid scheme... 详细信息
来源: 评论
The Involvement of Quantum computing in the Realm of Cybersecurity
The Involvement of Quantum Computing in the Realm of Cyberse...
收藏 引用
international conference on Computational science and Computational Intelligence (CSCI)
作者: Mahmoud, Mohammed Univ Jamestown Dept Comp Sci Jamestown ND 58405 USA
In this paper, I will be discussing quantum computing in cybersecurity. Quantum computing is in development and will be released to the public sooner rather than later. With how quickly technology evolves, it will get... 详细信息
来源: 评论
Analysis of the role of computer big data and cloud computing in information security
Analysis of the role of computer big data and cloud computin...
收藏 引用
2023 international conference on Networking, Informatics and computing, ICNETIC 2023
作者: Wei, Qian Tianjin University of Technology Tianjin China
With the rapid development of social economy, science and technology, e-commerce and network, computer extends more and more content, in the era of big data, cloud computing has become an emerging field, multi-tenant,... 详细信息
来源: 评论
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security
Some Classes of Cryptographic Power Functions and Permutatio...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big data computing, 2023 international conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Liu, Qian Dong, Xiaobei Chen, Zhixiong Liu, Ximeng Xu, Li College of Computer and Data Science Fuzhou University Fuzhou China Putian University Fujian Key Laboratory of Financial Information Processing Putian China College of Computer and Data Science Fuzhou University Key Laboratory of Information Security of Network Systems Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic functions with low differential uniformity have wide applications in cryptography and cyber security. In this paper, we further investigate c-differential uniformity proposed by Ellingsen et al. (IEEE Tr... 详细信息
来源: 评论
Differential Privacy Frequent Closed Itemset Mining over data Stream  22
Differential Privacy Frequent Closed Itemset Mining over Dat...
收藏 引用
IEEE 22nd international conference on Trust, Security and Privacy in computing and Communications (TrustCom) / BigdataSE conference / CSE conference / EUC conference / ISCI conference
作者: Ma, Xuebin Guan, Shengyi Lang, Yanan Inner Mongolia Univ Inner Mongolia Key Lab Wireless Networking & Mobi Hohhot Peoples R China
As the most common technique for mining and analyzing massive data, frequent itemset mining is widely used in various scenarios. However, when the data contains sensitive information, it will bring serious privacy lea... 详细信息
来源: 评论
Ensemble Methods for Spatial data Stream Classification  18
Ensemble Methods for Spatial Data Stream Classification
收藏 引用
18th international conference on Future Networks and Communications (FNC) / 20th international conference on Mobile Systems and Pervasive computing (MobiSPC) / 13th international conference on Sustainable Energy information Technology (SEIT)
作者: King, Liam Osborn, Wendy Univ Lethbridge Dept Math & Comp Sci 4401 Univ Dr West Lethbridge AB T1K 3M4 Canada
In this paper, we study the problem of classification of data in a spatial data stream. The classification of spatial objects in a static data set has been well studied. However, classifying objects in a spatial data ... 详细信息
来源: 评论
IoT data Confidentiality Self-Management
IoT Data Confidentiality Self-Management
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big data computing, 2023 international conference on Cyber science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Garah, Abdelhamid Mbarek, Nader Kirgizov, Sergey University of Burgundy Lib Laboratory Dijon21000 France
As the number of connected devices increases, protecting sensitive information transmitted by IoT devices is critical. One of the most effective ways to ensure data confidentiality while accommodating the limited reso... 详细信息
来源: 评论