咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 319 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 368 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 109 篇 信息与通信工程
    • 96 篇 电气工程
    • 75 篇 控制科学与工程
    • 62 篇 生物工程
    • 40 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 164 篇 理学
    • 83 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 109 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 32 篇 security
  • 30 篇 machine learning
  • 29 篇 deep learning
  • 28 篇 feature extracti...
  • 26 篇 privacy
  • 20 篇 blockchain
  • 19 篇 cloud computing
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 training
  • 14 篇 scalability
  • 14 篇 deep neural netw...
  • 14 篇 computational mo...
  • 13 篇 data privacy
  • 13 篇 authentication
  • 13 篇 protocols
  • 12 篇 support vector m...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 12 篇 cryptography

机构

  • 50 篇 school of cyber ...
  • 49 篇 school of comput...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 28 篇 national enginee...
  • 26 篇 services computi...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 institute of inf...
  • 25 篇 cluster and grid...
  • 23 篇 engineering rese...
  • 20 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 hubei key labora...
  • 16 篇 school of cyber ...
  • 16 篇 center for cyber...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 15 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 34 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 hu shengshan
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 hasan mohammad k...
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 liu daizong
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 11 篇 wan wei
  • 10 篇 xu zichuan

语言

  • 642 篇 英文
  • 72 篇 其他
  • 5 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
718 条 记 录,以下是561-570 订阅
排序:
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China University of Texas at Dallas Dallas United States National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
An efficient i(○)-based data integrity verification scheme for cloud storage
收藏 引用
中国科学:信息科学(英文版) 2019年 第5期62卷 233-235页
作者: Lixue SUN Chunxiang XU Yuan ZHANG Kefei CHEN Center for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of China Chengdu 611731 China Center for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of China Chengdu 611731 China Department of Electrical and Computer Engineering University of Waterloo Waterloo N2L 3G1 Canada School of Science Hangzhou Normal University Hangzhou 310036 China
Dear editor,With the advent of big data,an increasing number of people are storing their data on remote cloud *** storage services enable users to flexibly maintain and access their data via mobile or wireless ***,des...
来源: 评论
Adaptive Decoding Mechanisms for UAV-enabled Double-Uplink Coordinated NOMA
arXiv
收藏 引用
arXiv 2022年
作者: Nguyen, Thanh Luan Kaddoum, Georges Do, Tri Nhu da Costa, Daniel Benevides Haas, Zygmunt J. Université du Québec MontréalQCH3C 1K3 Canada Cyber Security Systems and Applied AI Research Center Lebanese American University Lebanon The Technology Innovation Institute Masdar City Abu Dhabi9639 United Arab Emirates The Department of Computer Science University of Texas at Dallas RichardsonTX75080 United States The School of Electrical and Computer Engineering Cornell University IthacaNY14853 United States
In this paper, we propose a novel adaptive decoding mechanism (ADM) for the unmanned aerial vehicle (UAV)enabled uplink (UL) non-orthogonal multiple access (NOMA) communications. Specifically, considering a harsh UAV ... 详细信息
来源: 评论
Heart Disease Prediction Using Machine Learning Method
Heart Disease Prediction Using Machine Learning Method
收藏 引用
cyber Resilience (ICCR), International Conference on
作者: Mafia Rasheed Muhammad Adnan Khan Nouh Sabri Elmitwally Ghassan F. Issa Taher M. Ghazal Hamza Alrababah Beenu Mago Department of Computer Science Agriculture University Faisalabad Pakistan Faculty of Computing Riphah School of Computing & Innovation Riphah International University Lahore Pakistan Faculty of Computing Engineering and the Built Environment Birmingham City University Birmingham United Kingdom School of Information Technology Skyline University College University City Sharjah Sharjah UAE Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Selangor Malaysia School of Information Technology Skyline University College Sharjah UAE
The heart disease is also known as coronary artery disease, many hearts affecting symptoms that are very common nowadays and causes death. It is a challenging task to diagnose heart diseases without any intelligent di... 详细信息
来源: 评论
A Secure Opus Pulse Steganographic Scheme Based on Message Transform
A Secure Opus Pulse Steganographic Scheme Based on Message T...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Yanzhen Ren Shan Zhong Weiping Tuy Lina Wang Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University
This paper proposes a secure steganography scheme in Opus pulse domain. Opus is a versatile audio codec designed for interactive Internet applications and is widely used in the Internet communication applications. In ... 详细信息
来源: 评论
FedMLC: White-box Model Watermarking for Copyright Protection in Federated Learning for IoT Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Chen, Weitong Zhang, Wei Wu, Di Keskinarkaus, Anja Seppanen, Tapio Zhang, Jiale Gao, Longxiang Luan, Tom H. Yangzhou University School of Information Engineering Yangzhou225009 China ToowoombaQLD4350 Australia University of Oulu Physiological Signal Analysis Team Center for Machine Vision and Signal Analysis Oulu90014 Finland University of Southern Queensland SoMPC ToowoombaQLD4350 Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China Xi'an Jiaotong University School of Cyber Science and Engineering Xi'an710049 China
With the widespread application of the Internet of Things (IoT), data processing has gradually migrated to edge devices that are closer to the data source. This shift has significantly improved the ability of real-tim... 详细信息
来源: 评论
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
收藏 引用
science China(Information sciences) 2018年 第3期61卷 228-230页
作者: Lixue SUN Chunxiang XU Mingwu ZHANG Kefei CHEN Hongwei LI Center for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of China School of Computer Science Hubei University of Technology School of Science Hangzhou Normal University Laboratory of Science and Technology on Communication Security
Public key encryption with keyword search(PEKS)enables one to search encrypted data containing some keyword without decrypting the data in public key *** et al.[1]introduced the notion of PEKS,but later Byun et al.[2]... 详细信息
来源: 评论
A systematic review of bio-cyber interface technologies and security issues for internet of bio-nano things
arXiv
收藏 引用
arXiv 2021年
作者: Zafar, Sidra Nazir, Mohsin Bakhshi, Taimur Ali Khattak, Hasan Khan, Sarmadullah Bilal, Muhammad Choo, Kim-Kwang Raymond Kwak, Kyung-Sup Sabah, Aneeqa Department of Computer Science Lahore College for Women University Lahore54000 Pakistan Center for Information Management & Cyber Security National University of Computer & Emerging Sciences Lahore Pakistan Islamabad Pakistan School of Computer Science and Informatics De Montfort University LeicasterLE1 9BH United Kingdom Department of Computer Engineering Hankuk University of Foreign Studies Gyeonggi-do Yongin-si17035 Korea Republic of Department of Information Systems and Cyber Security University of Texas San AntonioTX78249 United States Department of Information and Communication Engineering Inha University Incheon22212 Korea Republic of Department of Physics Lahore College for Women University Lahore54000 Pakistan
Advances in synthetic biology and nanotechnology have contributed to the design of tools that can be used to control, reuse, modify, and re-engineer cells’ structure, as well as enabling engineers to effectively use ... 详细信息
来源: 评论
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
arXiv
收藏 引用
arXiv 2023年
作者: Sami, H. Hammoud, A. Arafeh, M. Wazzeh, M. Arisdakessian, S. Chahoud, M. Wehbi, O. Ajaj, M. Mourad, A. Otrok, H. Abdel Wahab, O. Mizouni, R. Bentahar, J. Talhi, C. Dziong, Z. Damiani, E. Guizani, M. Concordia Institute for Information Systems Engineering Concordia University MontréalQC Canada Department of Electrical Engineering École de Technologie Supérieure Montréal Canada Department of Software and IT engineering École de Technologie Supérieure Montréal Canada Department of Computer and Software Engineering Polytechnique Montréal Montreal Canada Cyber Security Systems and Applied AI Research Center Department of CSM Lebanese American University Beirut Lebanon Division of Science New York University Abu Dhabi United Arab Emirates Department of EECS Khalifa University Abu Dhabi United Arab Emirates Department of ML Mohamed Bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many discipl... 详细信息
来源: 评论