咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 319 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 368 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 109 篇 信息与通信工程
    • 96 篇 电气工程
    • 75 篇 控制科学与工程
    • 62 篇 生物工程
    • 40 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 164 篇 理学
    • 83 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 109 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 32 篇 security
  • 30 篇 machine learning
  • 29 篇 deep learning
  • 28 篇 feature extracti...
  • 26 篇 privacy
  • 20 篇 blockchain
  • 19 篇 cloud computing
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 training
  • 14 篇 scalability
  • 14 篇 deep neural netw...
  • 14 篇 computational mo...
  • 13 篇 data privacy
  • 13 篇 authentication
  • 13 篇 protocols
  • 12 篇 support vector m...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 12 篇 cryptography

机构

  • 50 篇 school of cyber ...
  • 49 篇 school of comput...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 28 篇 national enginee...
  • 26 篇 services computi...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 institute of inf...
  • 25 篇 cluster and grid...
  • 23 篇 engineering rese...
  • 20 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 hubei key labora...
  • 16 篇 school of cyber ...
  • 16 篇 center for cyber...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 15 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 34 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 hu shengshan
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 hasan mohammad k...
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 liu daizong
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 11 篇 wan wei
  • 10 篇 xu zichuan

语言

  • 642 篇 英文
  • 72 篇 其他
  • 5 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
718 条 记 录,以下是551-560 订阅
排序:
Ensuring Data Confidentiality with a Secure XTS-AES Design in Flash Translation Layer  5
Ensuring Data Confidentiality with a Secure XTS-AES Design i...
收藏 引用
5th IEEE International Conference on Cloud Computing and Big Data Analytics, ICCCBDA 2020
作者: Zhang, Qionglu Jia, Shijie He, Junlin Zhao, Xinyi Xia, Luning Niu, Yingjiao Jing, Jiwu State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Beijing Certificate Authority Corporation Limited Beijing China
Nowadays sensitive data are commonly stored on personal mobile devices (e.g., laptops and smartphones) or public cloud storage platforms. Data on these platforms are commonly protected with strong cryptography like fu... 详细信息
来源: 评论
Vulnerability Time Series Prediction Based on Multivariable LSTM
Vulnerability Time Series Prediction Based on Multivariable ...
收藏 引用
IEEE International Workshop on Anti-counterfeiting, security, Identification, ASID
作者: Shuang Wu Congyi Wang Jianping Zeng Chengrong Wu School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai China
Vulnerabilities have been widely exploited to launch various cyberattacks, and become one of the most popular network security problems. Several kinds of research on vulnerabilities have been carried out, such as, min... 详细信息
来源: 评论
MANDERA: Malicious Node Detection in Federated Learning via Ranking
arXiv
收藏 引用
arXiv 2021年
作者: Zhu, Wanchuang Zhao, Benjamin Zi Hao Luo, Simon Liu, Tongliang Deng, Ke Data61 CSIRO Sydney Australia Department of Computing Macquarie University Australia. Optus Macquarie Cyber Security Hub Sydney Australia School of Computer Science The University of New South Wales Sydney Australia School of Computer Science The University of Sydney Sydney Australia Center for Statistical Science Department of Industrial Engineering Tsinghua University Beijing China
Byzantine attacks hinder the deployment of federated learning algorithms. Although we know that the benign gradients and Byzantine attacked gradients are distributed differently, to detect the malicious gradients is c... 详细信息
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collaboratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Deep Reinforcement Learning Guided Graph Neural Networks for Brain Network Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Xusheng Wu, Jia Peng, Hao Beheshti, Amin Monaghan, Jessica J.M. McAlpine, David Hernandez-Perez, Heivet Dras, Mark Dai, Qiong Li, Yangyang Yu, Philip S. He, Lifang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computing Macquarie University Sydney Australia Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China National Acoustic Laboratories Sydney Australia Department of Linguistics The Australian Hearing Hub Macquarie University Sydney Australia CAEIT Beijing China Department of Computer Science University of Illinois ChicagoIL United States Computer Science & Engineering Lehigh University PA United States
Modern neuroimaging techniques enable us to construct human brains as brain networks or connectomes. Capturing brain networks' structural information and hierarchical patterns is essential for understanding brain ... 详细信息
来源: 评论
A novel binary modified beluga whale optimization algorithm using ring crossover and probabilistic state mutation for enhanced bladder cancer diagnosis
收藏 引用
Informatics in Medicine Unlocked 2024年 50卷
作者: Gharaibeh, Hasan Alawad, Noor Aldeen Nasayreh, Ahmad Al Mamlook, Rabia Emhamed Makhadmeh, Sharif Naser Bashkami, Ayah Abualigah, Laith Ezugwu, Absalom E. Computer Science Department Faculty of Information Technology and Computer Sciences Yarmouk University Irbid 21163 Jordan Department of Business Administration Trine University IN United States Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libya Department of Information Technology King Abdullah II School of Information Technology The University of Jordan Amman 11942 Jordan Department Medical Laboratory Sciences – Faculty of Science Al Balqa Applied University Salt 19117 Jordan Department of Cyber Security and Cloud Computing Faculty of Information Technology Applied Science Private University Amman 11937 Jordan Artificial Intelligence and Sensing Technologies (AIST) Research Center University of Tabuk Tabuk 71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq 25113 Jordan MEU Research Unit Middle East University Amman 11831 Jordan Applied science research center Applied science private university Amman 11931 Jordan Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura 140401 India Unit for Data Science and Computing North-West University 11 Hofman Street Potchefstroom 2520 South Africa Artificial Intelligence Research Center (AIRC) College of Engineering and Information Technology Ajman University Ajman P.O. Box 346 United Arab Emirates
Bladder cancer (BC) remains a significant global health challenge, requiring the development of accurate predictive models for diagnosis. In this study, a new Binary Modified White Whale Optimization (B-MBWO) algorith... 详细信息
来源: 评论
Unsupervised Domain Adaptive Person Re-Identification via Human Learning Imitation
arXiv
收藏 引用
arXiv 2021年
作者: Peng, Yang Liu, Ping Luo, Yawei Zhou, Pan Xu, Zichuan Liu, Jingen Center for Frontier AI Research Agency for Science Technology and Research Singapore Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Liaoning Dalian China
Unsupervised domain adaptive person re-identification has received significant attention due to its high practical value. In past years, by following the clustering and finetuning paradigm, researchers propose to util... 详细信息
来源: 评论
Vortex Harmonic Generation by Circularly Polarized Gaussian Beam Interacting with Tilted Target
收藏 引用
Physical Review Applied 2021年 第1期16卷 014065-014065页
作者: Lingang Zhang Baifei Shen Zhigang Bu Xiaomei Zhang Liangliang Ji Shan Huang M. Xiriai Zhangli Xu Chen Liu Zhizhan Xu State Key Laboratory of High Field Laser Physics and CAS Center for Excellence in Ultra-intense Laser Science Shanghai Institute of Optics and Fine Mechanics (SIOM) Chinese Academy of Sciences (CAS) Shanghai 201800 China Department of Physics Shanghai Normal University Shanghai 200234 China Center of Materials Science and Optoelectronics Engineering University of Chinese Academy of Sciences Beijing 100049 China Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing Jiangsu 210031 China
When a circularly polarized (CP) Gaussian beam normally irradiates a solid plasma target, the spin angular momentum of the CP beam transforms into the orbital angular momentum (OAM) of the high-order harmonics through... 详细信息
来源: 评论
Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder
Enhancing Intrinsic Adversarial Robustness via Feature Pyram...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Guanlin Li Shuya Ding Jun Luo Chang Liu Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center (National Supercomputer Center in Jinan) Shandong Computer Science Center Shandong Academy of Sciences School of Cyber Security Qilu University of Technology China School of Computer Science and Engineering Nanyang Technological University
Whereas adversarial training is employed as the main defence strategy against specific adversarial samples, it has limited generalization capability and incurs excessive time complexity. In this paper, we propose an a... 详细信息
来源: 评论
A Gaussian Reputation-based Hybrid BFT Consensus with a Formal security Framework
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Yang, Ningbin Tang, Chunming Deng, Zhihong He, Debiao Guangzhou University School of Mathematics and Information Science Guangzhou510006 China Guangzhou University Guangzhou Center for Applied Mathematics Guangzhou510006 China Guangzhou University Key Laboratory of Information Security Technology Jointly by Guangdong Province and Guangzhou City Guangzhou510006 China Wuhan University School of Cyber Science and Engineering Wuhan China Shandong Computer Science Center Jinan250014 China
Blockchain systems have evolved over decades, addressing the inefficiencies and high costs associated with centralized architectures. Among various consensus mechanisms, committee-based hybrid Byzantine Fault Tolerant... 详细信息
来源: 评论