咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 319 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 368 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 109 篇 信息与通信工程
    • 96 篇 电气工程
    • 75 篇 控制科学与工程
    • 62 篇 生物工程
    • 40 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 164 篇 理学
    • 83 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 109 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 32 篇 security
  • 30 篇 machine learning
  • 29 篇 deep learning
  • 28 篇 feature extracti...
  • 26 篇 privacy
  • 20 篇 blockchain
  • 19 篇 cloud computing
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 training
  • 14 篇 scalability
  • 14 篇 deep neural netw...
  • 14 篇 computational mo...
  • 13 篇 data privacy
  • 13 篇 authentication
  • 13 篇 protocols
  • 12 篇 support vector m...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 12 篇 cryptography

机构

  • 50 篇 school of cyber ...
  • 49 篇 school of comput...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 28 篇 national enginee...
  • 26 篇 services computi...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 institute of inf...
  • 25 篇 cluster and grid...
  • 23 篇 engineering rese...
  • 20 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 hubei key labora...
  • 16 篇 school of cyber ...
  • 16 篇 center for cyber...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 15 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 34 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 hu shengshan
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 hasan mohammad k...
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 liu daizong
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 11 篇 wan wei
  • 10 篇 xu zichuan

语言

  • 642 篇 英文
  • 72 篇 其他
  • 5 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
718 条 记 录,以下是531-540 订阅
排序:
Efficient Adversarial Attacks for Visual Object Tracking  1
收藏 引用
16th European Conference on computer Vision, ECCV 2020
作者: Liang, Siyuan Wei, Xingxing Yao, Siyuan Cao, Xiaochun Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China Beijing Key Laboratory of Digital Media School of Computer Science and Engineering Beihang University Beijing100191 China
Visual object tracking is an important task that requires the tracker to find the objects quickly and accurately. The existing state-of-the-art object trackers, i.e., Siamese based trackers, use DNNs to attain high ac... 详细信息
来源: 评论
One-click medicine discovery in real time
收藏 引用
AIP Conference Proceedings 2024年 第1期2512卷
作者: Manas Tuteja Naivedya Tiwari Vasim Babu Abirami Vinoth Kumar Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chennai India Department of ECE KKR & KSR Institute of Technology and Sciences Guntur India Center for Cyber Forensics and Information Security University of Madras Chennai India
Medical records are a goldmine for Data Analytics companies to gain better insight into patient trends, diseases and customer behavior which can in turn be used to provide greater outpatient care. Most of the data col...
来源: 评论
Personalized Local Differential Privacy for Multi-dimensional Range Queries over Mobile User Data
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: He, Yuanyuan Wang, Meiqi Deng, Xianjun Yang, Peng Xue, Qiao Yang, Laurence T. Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Huazhong University of Science and Technology School of Electronic Information and Communications Wuhan430074 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210000 China
Multi-dimensional range queries performed on the mobile user data records become increasingly important and popular in the fields of e-commerce, social media, transportation logistics, etc. Meanwhile, mobile users usu... 详细信息
来源: 评论
security Threats and their Mitigations on the Operating System of Internet of Medical Things (IoMT)
Security Threats and their Mitigations on the Operating Syst...
收藏 引用
International Conference on Mathematics, Actuarial science, computer science and Statistics (MACS)
作者: Taher M. Ghazal Mohammad Kamrul Hasan Ghassan F. Issa Nidal A. Al-Dmour Saif. E. A. Alnawayseh Waleed T. Al-Sit Rashed Aldhaheri School of Information Technology Skyline University College University City Sharjah Sharjah UAE Faculty of Information Science & Technology Universiti Kebansaan Malaysia (UKM) Center for Cyber Security Selangor Malaysia Department of Computer Engineering Mutah University Al-Karak Jordan Department of Electric Engineering Mutah University Karak Jordan Higher Colleges of Technology Dubai United Arab Emirates
The potential security dangers of IoMT influence the privacy, uprightness, realness and accessibility of its information and the related assets. In spite of the fact that IoMT is engaged with enormous scope administra... 详细信息
来源: 评论
Expression of Concern for: security Threats and their Mitigations on the Operating System of Internet of Medical Things (IoMT)
Expression of Concern for: Security Threats and their Mitiga...
收藏 引用
International Conference on Mathematics, Actuarial science, computer science and Statistics (MACS)
作者: Taher M. Ghazal Mohammad Kamrul Hasan Ghassan F. Issa Nidal A. Al-Dmour Saif. E. A. Alnawayseh Waleed T. Al-Sit Rashed Aldhaheri School of Information Technology Skyline University College University City Sharjah Sharjah UAE Faculty of Information Science & Technology Universiti Kebansaan Malaysia (UKM) Center for Cyber Security Selangor Malaysia Department of Computer Engineering Mutah University Al-Karak Jordan Department of Electric Engineering Mutah University Karak Jordan Higher Colleges of Technology Dubai United Arab Emirates
The potential security dangers of IoMT influence the privacy, uprightness, realness and accessibility of its information and the related assets. In spite of the fact that IoMT is engaged with enormous scope administra...
来源: 评论
Flush+Time: A High Accuracy and High Resolution Cache Attack On ARM-FPGA Embedded SoC  38
Flush+Time: A High Accuracy and High Resolution Cache Attack...
收藏 引用
38th IEEE VLSI Test Symposium, VTS 2020
作者: Tang, Churan Liu, Pengkun Ma, Cunqing Liu, Zongbin Ge, Jingquan State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Intelligent Software Research Center Institute of Software CAS Beijing China School of Computer and Science University of Chinese Academy of Sciences Beijing China
Flush based cache attacks have become a practical threat to data privacy and information security due to their advantages such as high accuracy and resolution. However, their accuracy and resolution still has room for... 详细信息
来源: 评论
Securing the Private Key in Your Blockchain Wallet: A Continuous Authentication Approach Based on Behavioral Biometric
Securing the Private Key in Your Blockchain Wallet: A Contin...
收藏 引用
作者: Teng Hu Xiaolei Liu Weina Niu Kangyi Ding Yanping Wang Xiaosong Zhang Institute for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of China Institute of Computer Application China Academy of Engineering Physics Peng Cheng Laboratory Cyberspace Security Research Center
As blockchain is increasingly valued, the application of blockchain and its security has become a research hotspot. Not only that, more and more ordinary users are paying attention to the blockchain and beginning to t... 详细信息
来源: 评论
Wavelet Frequency Transformation for Specific Weeds Recognition
Wavelet Frequency Transformation for Specific Weeds Recognit...
收藏 引用
Artificial Intelligence and Data Analytics (CAIDA), International Conference on
作者: Shaban Habib Ishrat Khan Muhammad Islam Waleed Albattah Saleh Mohammed Alyahya Sheroz Khan Mohammad Kamrul Hassan College of Computer Qassim University Buraydah Saudi Arabia College of Computer and Inofrmation Science Prince Sultan University Riyadh Saudi Arabia College of Engineering and Information Technology Onaizah Colleges Saudi Arabia Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia
Saudi Arabia is experiencing depleting water level which ultimately leading to having reduced level of weed and crops farms. The ongoing practice of watering for all kind of weeds at farms is manual which is laborious... 详细信息
来源: 评论
CEPS: A Cross-Blockchain based Electronic Health Records Privacy-Preserving Scheme
CEPS: A Cross-Blockchain based Electronic Health Records Pri...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Sheng Cao Jing Wang Xiaojiang Du Xiaosong Zhang Xiaolin Qin School of Computer Science and Engineering Center for Cyber Security University of Electronic Science and Technology of China China School of Information and Software Engineering Center for Cyber Security University of Electronic Science and Technology of China China Department of Computer and Information Sciences Temple University Philadelphia USA CAS Chengdu Institute of Computer Applications Chengdu China
The Electronic Health Record (EHR) has been widely used in cloud-based medical data platforms. Since the owner of the EHR is a patient and the manager is a doctor (or hospital), this separation of ownership of privacy... 详细信息
来源: 评论
Automatic firmware emulation through invalidity-guided knowledge inference (extended version)
arXiv
收藏 引用
arXiv 2021年
作者: Zhou, Wei Guan, Le Liu, Peng Zhang, Yuqing National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China Department of Computer Science University of Georgia United States College of Information Sciences and Technology The Pennsylvania State University United States School of Cyber Engineering Xidian University China School of Computer Science and Cyberspace Security Hainan University China
Emulating firmware for microcontrollers is challenging due to the tight coupling between the hardware and firmware. This has greatly impeded the application of dynamic analysis tools to firmware analysis. The state-of... 详细信息
来源: 评论