咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是541-550 订阅
排序:
An access control system for intelligent buildings  9
An access control system for intelligent buildings
收藏 引用
9th EAI International Conference on Mobile Multimedia Communications, MOBIMEDIA 2016
作者: Xue, Nian Liang, Lulu Zhang, Jie Huang, Xin Department of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University China School of Electrical Engineering and Electronics and Computer Science University of Liverpool United Kingdom China Information Technology Security Evaluation Center China
Accompanied with accelerated development of the Internet of Things (IoT) and smart home industry, smart access control systems, e.g. smart locks, are getting popular in recent years. In this paper, we propose a smart ... 详细信息
来源: 评论
Infection tracing in smart hospitals  12
Infection tracing in smart hospitals
收藏 引用
12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016
作者: Qathrady, Mimonah Al Helmy, Ahmed Almuzaini, Khalid Computer and Information Science and Engineering Department University of Florida GainesvilleFL United States National Center for Cyber Security Technology King Abdulaziz City for Science and Technology Riyadh Saudi Arabia
Many disease infection cases are acquired and spread in hospital settings. Early detection of such infection cases is necessary to identify population at risk accurately and effectively. This paper introduces a system... 详细信息
来源: 评论
Model checking of IoT system in microgrid  8
Model checking of IoT system in microgrid
收藏 引用
8th International Conference on information Technology in Medicine and Education, ITME 2016
作者: Liang, Lulu Zheng, Kai Wei, Zilong Wang, Yanmei Wu, Sihan Huang, Xin China Information Technology Security Evaluation Center Xi'an Jiaotong-Liverpool University Suzhou China Department of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University Suzhou China
Due to the serious air pollution, the renewable energy sources had attracted more and more attention. In order to manage the renewable energy sources, the concept of microgrid is introduced. The IoT system can also be... 详细信息
来源: 评论
Person re-identification by camera correlation aware feature augmentation
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Ying-Cong Zhu, Xiatian Zheng, Wei-Shi Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China Department of Computer Science and Engineering Chinese University of Hong Kong School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Sun Yatsen University Ministry of Education China Guangdong Province Key Laboratory of Information Security China
The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. Whil... 详细信息
来源: 评论
Performance analysis of parallel replica molecular dynamics
收藏 引用
AIP Conference Proceedings 2018年 第1期1978卷
作者: Boyao Zhang Jue Wang Yangde Feng Ji Xiang Lei Wang 1Computer Network Information Center Chinese Academy of Science Department of High Performance Computing Technology and Application Development Beijing China 2University of Chinese Academy of Sciences Beijing China 3State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China 4School of cybersecurity Chinese Academy of Sciences China
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations...
来源: 评论
Provable multiple replication data possession with full dynamics for secure cloud storage
Provable multiple replication data possession with full dyna...
收藏 引用
作者: Zhang, Yafang Ni, Jianbing Tao, Xiaoling Wang, Yong Yu, Yong Big Data Research Center School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada College of Information and Communication Guilin University of Electronic Technology Guilin541004 China Guangxi Cloud Security and Cloud Service Engineering Research Center Guilin University of Electronic Technology Guilin541004 China
Cloud storage has been gaining tremendous popularity among individuals and corporations because of its low maintenance cost and on-demand services for the clients. To improve the availability and the reliability of cr... 详细信息
来源: 评论
An Improved Community Detection Algorithm Based on DCT and K-Means
An Improved Community Detection Algorithm Based on DCT and K...
收藏 引用
2016 International Conference on Communications, information Management and Network security (CIMNS2016)
作者: Lin Li Kefeng Fan Jiezhong Gong Hao Peng Research Center of Information Security China Electronics Standardization Institute Department of Computer Science and Engineering Zhejiang Normal University
Detecting an overlapping and hierarchical community structure can give a significant insight into structural and functional properties in complex networks. In this paper, we propose an improved algorithm to detect com... 详细信息
来源: 评论
GB-RC4: Effective brute force attacks on RC4 algorithm using GPU  7
GB-RC4: Effective brute force attacks on RC4 algorithm using...
收藏 引用
7th International Green and Sustainable Computing Conference, IGSC 2016
作者: Xue, Pei Li, Tao Dong, Han Liu, Chunbo Ma, Wenjing Pei, Songwen College of Computer and Control Engineering Nankai University Tianjin300071 China Information Security Evaluation Center Civil Aviation University of China Tianjin300300 China Laboratory of Parallel Software and Computational Science State Key Laboratory of Computing Science Institute of Software CAS Beijing China Shanghai Key Lab of Modern Optical Systems Department of Computer Science and Engineering University of Shanghai for Science and Technology Shanghai200093 China
Encryption algorithms are applied to a variety of fields and the security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space search. RC4 algorithm has an extensive appl... 详细信息
来源: 评论
An Access Control System for Intelligent Buildings  16
An Access Control System for Intelligent Buildings
收藏 引用
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications
作者: Nian Xue Lulu Liang Jie Zhang Xin Huang Department of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University China and School of Electrical Engineering and Electronics and Computer Science University of Liverpool UK China Information Technology Security Evaluation Center Department of Computer Science and Software Engineering Xi'an Jiaotong-Liverpool University China
Accompanied with accelerated development of the Internet of Things (IoT) and smart home industry, smart access control systems, e.g. smart locks, are getting popular in recent years. In this paper, we propose a smart ... 详细信息
来源: 评论
Complexity analysis and comparison of test paths based on DSE
Complexity analysis and comparison of test paths based on DS...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Jiawen Lu Lizhi Cai Yang Zhang Keyi Hong Laboratory of Computer Software Testing & Evaluation Shanghai Development Center of Computer Software Technology Shanghai China School of Information Science & Engineering East China University of Science and Technology Shanghai China Cyber Security Department of Shanghai Public Security Bureau Shanghai China
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on D... 详细信息
来源: 评论