咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 313 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 437 篇 工学
    • 351 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 106 篇 信息与通信工程
    • 94 篇 电气工程
    • 65 篇 控制科学与工程
    • 62 篇 生物工程
    • 38 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
  • 163 篇 理学
    • 82 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 106 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 10 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 30 篇 machine learning
  • 29 篇 security
  • 28 篇 feature extracti...
  • 27 篇 deep learning
  • 23 篇 privacy
  • 20 篇 blockchain
  • 18 篇 cloud computing
  • 16 篇 internet of thin...
  • 14 篇 scalability
  • 14 篇 accuracy
  • 14 篇 training
  • 13 篇 deep neural netw...
  • 13 篇 computational mo...
  • 12 篇 support vector m...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 12 篇 cryptography
  • 11 篇 wireless sensor ...
  • 11 篇 semantics
  • 11 篇 protocols

机构

  • 46 篇 school of comput...
  • 46 篇 school of cyber ...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 25 篇 national enginee...
  • 25 篇 institute of inf...
  • 24 篇 hubei engineerin...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 engineering rese...
  • 23 篇 cluster and grid...
  • 18 篇 school of softwa...
  • 16 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 16 篇 hubei engineerin...
  • 16 篇 school of inform...
  • 15 篇 center for cyber...
  • 15 篇 school of cyber ...
  • 14 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 32 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 taher m. ghazal
  • 18 篇 hu shengshan
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 15 篇 deqing zou
  • 15 篇 ahmed amjed abba...
  • 13 篇 liu daizong
  • 13 篇 zhang leo yu
  • 13 篇 hasan mohammad k...
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 xu zichuan
  • 9 篇 nurhizam safie m...

语言

  • 654 篇 英文
  • 38 篇 其他
  • 4 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
696 条 记 录,以下是41-50 订阅
排序:
Distributed Timestamp Mechanism Based on Verifiable Delay Functions
收藏 引用
computer Systems science & engineering 2023年 第2期44卷 1633-1646页
作者: Qiang Wu Zhaoyang Han Ghulam Mohiuddin Yongjun Ren Engineering Research Center of Digital Forensics of Ministry of Education School of Computer ScienceNanjing University of Information Science and TechnologyNanjing210044China Nanjing University of Aeronautics and Astronautics Nanjing210008China Department of Cyber Security at VaporVM Abu Dhabi999041United Arab Emirates
In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered ***,maintaining data security is one of the most important is... 详细信息
来源: 评论
Confident Information Coverage Reliability Evaluation for Sensor Networks of Openly Deployed ICP Systems
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial cyber-Physical Systems 2024年 2卷 565-574页
作者: Chen, Suning Yi, Yuanyuan Yi, Lingzhi Liu, Shenghao Deng, Xianjun Xia, Yunzhi Fan, Xiaoxuan Yang, Laurence T. Park, Jong Hyuk Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Journalism and Information Communication Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430073 China Seoul National University of Technology Department of Computer Science and Engineering Seoul01811 Korea Republic of
Industrial cyber-Physical (ICP) systems are integration of computation and physical processes to help achieve operational excellence. As sensors and actuators compose the openly deployed ICP systems and are often susc... 详细信息
来源: 评论
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Al-Sharhanee, Kareem Ali Malalah Najim, Ali Hamza Alheeti, Khattab M. Ali Satar, Nurhizam Safie Mohd Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad10011 Iraq Department of Computer Technical Al-Diwaniyah Iraq College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论
IoMT-Based Healthcare Framework for Ambient Assisted Living Using a Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6867-6878页
作者: Waleed T.Al-Sit Nidal A.Al-Dmour Taher M.Ghazal Ghassan F.Issa Department of Computer Engineering Mutah UniversityAl-KarakJordanHigher Colleges of TechnologyDubaiUAE Department of Computer Engineering College of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKM43600BangiSelangorMalaysia
In the age of universal computing,human life is becoming smarter owing to the recent developments in the Internet of Medical Things(IoMT),wearable sensors,and telecommunication innovations,which provide more effective... 详细信息
来源: 评论
Blockchain Based security Enabled Smart Contract for Energy Management  16
Blockchain Based Security Enabled Smart Contract for Energy ...
收藏 引用
16th International Conference on security of Information and Networks, SIN 2023
作者: Sharma, Aditi Patel, Mukta Choudhary, Arjun Kumar, Gajender Department of Computer Science and Engineering Maharashtra Pune India Parul Institute of Technology Parul University Department of Computer Science and Engineering Gujarat Vadodara India Sardar Patel University of Police Center for Cyber Security Security and Criminal Justice Jodhpur India Srm University Department of Computer Science and Engineering Delhi-NCR Campus India
Energy consumption is highly demanded area for major security concerns due to the high eye from attackers. In 2020, the 'Recorded future' released report for massive power outage in India[1]. With the increasi... 详细信息
来源: 评论
Tracking Objects and Activities with Attention for Temporal Sentence Grounding  48
Tracking Objects and Activities with Attention for Temporal ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Xiong, Zeyu Liu, Daizong Zhou, Pan Zhu, Jiahao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Peking University Wangxuan Institute of Computer Technology China
Temporal sentence grounding (TSG) aims to localize the temporal segment which is semantically aligned with a natural language query in an untrimmed video. Most existing methods extract frame-grained features or object... 详细信息
来源: 评论
ANIMC: A Soft Approach for Autoweighted Noisy and Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 192-206页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering The School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering m... 详细信息
来源: 评论
Face Detection in Video Live Stream Using Deep Learning  2
Face Detection in Video Live Stream Using Deep Learning
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Amrita Kumar, Rajiv Joshi, Shivani Raj, Daksh Centre for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University U.P. Greater Noida India G L Bajaj Institute of Technology and Management Department of Applied Computational Science and Engineering Nvidia Ai Learning & Research Center U.P. Greater Noida India G L Bajaj Institute of Technology and Management Department of Computer Science and Engineering U.P. Greater Noida India Galgotias College of Engineering and Technology Department of Computer Science and Engineering U.P. Greater Noida India
With the increasing popularity of live streaming platforms, there is an imperative need for robust methods for identifying individuals in real-time. The proposed system utilizes Convolutional Neural Networks (CNN) com... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论