咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是491-500 订阅
排序:
Dense attention fluid network for salient object detection in optical remote sensing images
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Qijian Cong, Runmin Li, Chongyi Cheng, Ming-Ming Fang, Yuming Cao, Xiaochun Zhao, Yao Kwong, Sam The Department of Computer Science City University of Hong Kong Hong Kong The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The School of Computer Science and Engineering Nanyang Technological University Singapore The College of Computer Science Nankai University Tianjin300071 China School of Information Technology Jiangxi University of Finance and Economics NanchangJiangxi330032 China The State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
Despite the remarkable advances in visual saliency analysis for natural scene images (NSIs), salient object detection (SOD) for optical remote sensing images (RSIs) still remains an open and challenging problem. In th... 详细信息
来源: 评论
Hybrid RAG-empowered Multi-modal LLM for Secure Data Management in Internet of Medical Things: A Diffusion-based Contract Approach
arXiv
收藏 引用
arXiv 2024年
作者: Su, Cheng Wen, Jinbo Kang, Jiawen Wang, Yonghua Su, Yuanjia Pan, Hudan Zhong, Zishao Hossain, M. Shamim School of Automation The GuangdongHongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangdong University of Technology Guangzhou510006 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing210016 China School of Automation The Guangdong Basic Research Center of Excellence for Ecological Security and Green Development Key Laboratory for City Cluster Environmental Safety Green Development The Ministry of Education Guangdong University of Technology Guangzhou510006 China School of Automation The Key Laboratory of Intelligent Detection and IoT in Manufacturing Ministry of Education Guangdong University of Technology Guangzhou510006 China School of Automation Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangdong University of Technology Guangzhou510006 China Guangzhou University of Traditional Chinese Medicine State Key Laboratory of Traditional Chinese Medicine Syndrome The Second Affiliated Hospital of Guangzhou University of Chinese Medicine Chinese Medicine Guangdong Laboratory Hengqin 519000 China Second Affiliated Hospital of Guangzhou University of Chinese Medicine Chinese Medicine Guangdong Laboratory Hengqin 519000 China Department of Software Engineering College of Computer and Information Sciences King Saud University Riyadh12372 Saudi Arabia
Secure data management and effective data sharing have become paramount in the rapidly evolving healthcare landscape, especially with the growing integration of the Internet of Medical Things (IoMT). The rise of gener... 详细信息
来源: 评论
Front Cover: International Journal of Intelligent Systems, Volume 37 Issue 11 November 2022
收藏 引用
International Journal of Intelligent Systems 2022年 第11期37卷
作者: Xianjia Meng Yong Yang Ximeng Liu Nan Jiang School of Information Science and Technology Northwest University Xi'an People's Republic of China Fujian Province Key Laboratory of Information Security of Network System and College of Computer and Data Science Fuzhou University Fuzhou People's Republic of China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen People's Republic of China Department of Internet of Things School of Information Engineering East China Jiao Tong University Nanchang People's Republic of China
来源: 评论
Golden grain: Building a secure and decentralized model marketplace for MLaaS
arXiv
收藏 引用
arXiv 2020年
作者: Weng, Jiasi Weng, Jian Cai, Chengjun Huang, Hongwei Wang, Cong The College of Information Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes the lives of people. A natural requirement for MLaaS is, however, to provide highly accurate prediction services. To achieve this, current MLaaS ... 详细信息
来源: 评论
Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix
收藏 引用
computers, Materials & Continua 2018年 第5期55卷 201-211页
作者: Junjia Chen Wei Lu Yuileong Yeung Yingjie Xue Xianjin Liu Cong Lin Yue Zhang School of Data and Computer Science Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhou 510006China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China Center for Faculty Development and Educational Technology Guangdong University of Finance and EconomicsGuangzhou 510320China Department of Computer Science College of Engineering and Computer ScienceEastern Lake AvenueOrlandoFLUSA.
In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information *** most state-of-the-art binary image steganographic schemes,t... 详细信息
来源: 评论
Curtailing the spread of COVID-19 in Nigeria using digital framework and data driven approaches
EngMedicine
收藏 引用
EngMedicine 2024年 第2期1卷 22-30页
作者: Bolanle Adefowoke Ojokoh Benjamin S.Aribisala Oluwafemi A.Sarumi Tobore V.Igbe Abimbola H.Afolayan Arome J.Gabriel Abiola Ezekiel Taiwo Olatunji M.Omisore Uchechukwu M.Chukwuocha Olusola T.Babalola Tolulope A.Adebayo Department of Information Systems Federal University of TechnologyP.M.B.704 AkureOndo StateNigeria Department of Computer Science Lagos State UniversityOjoLagos StateNigeria Department of Mathematics and Computer Science University of Marburg35037 MarburgGermany Center for Diabetes Technology Department of Psychiatry&Neurobehavioral SciencesUniversity of VirginiaCharlottesvilleVA 22903USA Department of Cyber Security Federal University of TechnologyP.M.B.704 AkureOndo StateNigeria Faculty of Engineering Mangosuthu University of TechnologyDurban 4026South Africa Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Department of Public Health Federal University of TechnologyIhiagwaOwerriNigeria Department of Computer Science Federal University of TechnologyP.M.B.704 AkureOndo StateNigeria
The onset of the coronavirus disease 2019(COVID-19)pandemic had profound economic and societal repercussions *** nations managed to mitigate the spread of the virus sufficiently early through implementing digital fram... 详细信息
来源: 评论
A review of uncertainty quantification in deep learning: Techniques, applications and challenges
arXiv
收藏 引用
arXiv 2020年
作者: Abdar, Moloud Pourpanah, Farhad Hussain, Sadiq Rezazadegan, Dana Liu, Li Ghavamzadeh, Mohammad Fieguth, Paul Cao, Xiaochun Khosravi, Abbas Rajendra Acharya, U. Makarenkov, Vladimir Nahavandi, Saeid Deakin University Australia College of Mathematics and Statistics Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Shenzhen518060 China Dibrugarh University Dibrugarh India Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland Google research United States Department of Systems Design Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Electronics and Computer Engineering Ngee Ann Polytechnic Clementi Singapore Department of Computer Science University of Quebec in Montreal MontrealQC Canada
—Uncertainty quantification (UQ) plays a pivotal role in the reduction of uncertainties during both optimization and decision making, applied to solve a variety of real-world applications in science and engineering. ... 详细信息
来源: 评论
Secure Cryptography Infrastructures in the Cloud
Secure Cryptography Infrastructures in the Cloud
收藏 引用
IEEE Global Communications Conference
作者: Dawei Chu Kaijie Zhu Quanwei Cai Jingqiang Lin Fengjun Li Le Guan Lingchen Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences National Digital Switching System Engineering & Technological R&D Center CHINA Data Assurance and Communication Security Research Center Chinese Academy of Sciences Department of Electrical Engineering and Computer Science The University of Kansas USA Department of Computer Science University of Georgia USA
information systems are deployed in clouds as virtual machines (VMs) for better agility, elasticity and reliability. It is necessary to safekeep their cryptographic keys, e.g., the private keys used in TLS and SSH, ag... 详细信息
来源: 评论
An Acute Kidney Injury Prediction Model Based on Ensemble Learning Algorithm
An Acute Kidney Injury Prediction Model Based on Ensemble Le...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Yuan Wang Yake Wei Qin Wu Hao Yang Jingwei Li College of Computer Science and Information Engineering Tianjin University of Science and Technology Population and Precision Health Care (Tianjin) Ltd Center for Cyber Security University of Electronic Science and Technology of China Department of critical care medicine Sichuan University State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences
Acute Kidney Injury (AKI), a common disease in Intensive Care Unit (ICU) patients, is related to high cost, morbidity and mortality. The early prediction of AKI is critical for improving patients' outcome. However... 详细信息
来源: 评论
Identity-aware attribute recognition via real-time distributed inference in mobile edge clouds
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Zichuan Zhou, Pan Wu, Jiangkai Ren, Jiankang Xia, Qiufen Liang, Huizhi Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Software Dalian University of Technology Dalian China School of Computer Science Dalian University of Technology Dalian China Key Laboratory for Ubiquitous Network Service Software of Liaoning Province International School of Information Science and Engineering Dalian University of Technology Dalian China Department of Computer Science University of Reading Reading United Kingdom
With the development of deep learning technologies, attribute recognition and person re-identification (re-ID) have attracted extensive attention and achieved continuous improvement via executing computing-intensive d... 详细信息
来源: 评论