咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 319 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 368 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 109 篇 信息与通信工程
    • 96 篇 电气工程
    • 75 篇 控制科学与工程
    • 62 篇 生物工程
    • 40 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 164 篇 理学
    • 83 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 109 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 32 篇 security
  • 30 篇 machine learning
  • 29 篇 deep learning
  • 28 篇 feature extracti...
  • 26 篇 privacy
  • 20 篇 blockchain
  • 19 篇 cloud computing
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 training
  • 14 篇 scalability
  • 14 篇 deep neural netw...
  • 14 篇 computational mo...
  • 13 篇 data privacy
  • 13 篇 authentication
  • 13 篇 protocols
  • 12 篇 support vector m...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 12 篇 cryptography

机构

  • 50 篇 school of cyber ...
  • 49 篇 school of comput...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 28 篇 national enginee...
  • 26 篇 services computi...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 institute of inf...
  • 25 篇 cluster and grid...
  • 23 篇 engineering rese...
  • 20 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 hubei key labora...
  • 16 篇 school of cyber ...
  • 16 篇 center for cyber...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 15 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 34 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 hu shengshan
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 hasan mohammad k...
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 liu daizong
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 11 篇 wan wei
  • 10 篇 xu zichuan

语言

  • 642 篇 英文
  • 72 篇 其他
  • 5 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
718 条 记 录,以下是571-580 订阅
排序:
A Survey on Deep Learning Event Extraction: Approaches and Applications
arXiv
收藏 引用
arXiv 2021年
作者: Li, Qian Li, Jianxin Sheng, Jiawei Cui, Shiyao Wu, Jia Hei, Yiming Peng, Hao Guo, Shu Wang, Lihong Beheshti, Amin Yu, Philip S. The School of Computer Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The Institute of Information Engineering Chinese Academy of Sciences Beijing100083 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The School of Computing Macquarie University Sydney Australia The Department of Computer Science University of Illinois at Chicago Chicago60607 United States
Event extraction is a crucial research task for promptly apprehending event information from massive textual data. With the rapid development of deep learning, event extraction based on deep learning technology has be... 详细信息
来源: 评论
Why Do Developers Remove Lambda Expressions in Java?  21
Why Do Developers Remove Lambda Expressions in Java?
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Mingwei Zheng Jun Yang Ming Wen Hengcheng Zhu Yepang Liu Hai Jin Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Huazhong University of Science and Technology Wuhan China School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China The Hong Kong University of Science and Technology Hong Kong China Southern University of Science and Technology Shenzhen China Cluster and Grid Computing Lab School of Computer Science and Technology HUST Wuhan China
Java 8 has introduced lambda expressions, a core feature of functional programming. Since its introduction, there is an increasing trend of lambda adoptions in Java projects. Developers often adopt lambda expressions ... 详细信息
来源: 评论
Dynamically redactable blockchain based on decentralized Chameleon hash
收藏 引用
Digital Communications and Networks 2024年
作者: Xinzhe Huang Yujue Wang Yong Ding Qianhong Wu Changsong Yang Hai Liang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin 541004 China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin 541004 China Hangzhou Innovation Institute of Beihang University Hangzhou 311228 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education Hong Kong 999077 China School of Cyber Science and Technology Beihang University Beijing 100083 China
The immutability is a crucial property for blockchain applications, however, it also leads to problems such as the inability to revise illegal data on the blockchain and delete private data. Although redactable blockc... 详细信息
来源: 评论
MalScan: Android Malware Detection Based on Social-Network Centrality Analysis
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wu, Yueming Suo, Wenqi Feng, Siyue Zou, Deqing Yang, Wei Liu, Yang Jin, Hai Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Jinyinhu Laboratory Wuhan430074 China University of Texas at Dallas United States Nanyang Technological University Singapore Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China
Malware scanning of an app market is expected to be scalable and effective. However, existing approaches use syntax-based features that can be evaded by transformation attacks or semantic-based features which are usua... 详细信息
来源: 评论
Event extraction by associating event types and argument roles
arXiv
收藏 引用
arXiv 2021年
作者: Li, Qian Guo, Shu Wu, Jia Li, Jianxin Sheng, Jiawei Wang, Lihong Dong, Xiaohan Peng, Hao Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Department of Computing Macquarie University Sydney Australia Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Event extraction (EE), which acquires structural event knowledge from texts, can be divided into two sub-tasks: event type classification and element extraction (namely identifying triggers and arguments under differe... 详细信息
来源: 评论
Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement
Towards Efficient Co-audit of Privacy-Preserving Data on Con...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Xiaoyan Hu Xiaoyi Song Guang Cheng Jian Gong Lu Yang Honggang Chen Zhichao Liang School of Cyber Science & Engineering Southeast University Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) China Research Base of International Cyberspace Governance (Southeast University) Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Jiangsu Province Engineering Research Center of Security for Ubiquitous Network Nanjing China JiangSu Peerfintech Technology Co. Ltd.
Blockchain is well known for its storage consistency, decentralization and tamper-proof, but the privacy disclosure and difficulty in auditing discourage the innovative application of blockchain technology. As compare... 详细信息
来源: 评论
SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment
SEGIVE: A Practical Framework of Secure GPU Execution in Vir...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Ziyang Wang Fangyu Zheng Jingqiang Lin Guang Fan Jiankuo Dong State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center CAS Beijing China School of Cyber Security University of Science and Technology of China Hefei School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China
With the advancement of processor technology, general-purpose GPUs have become popular parallel computing accelerators in the cloud. However, designed for graphics rendering and high-performance computing, GPUs are bo... 详细信息
来源: 评论
HomDroid: Detecting android covert malware by social-network homophily analysis
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Yueming Zou, Deqing Yang, Wei Li, Xiang Jin, Hai Huazhong University of Science and Technology China University of Texas at Dallas United States Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Hust Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hust Wuhan430074 China Shenzhen Hust Research Institute Shenzhen518057 China Cluster and Grid Computing Lab School of Computer Science and Technology Hust Wuhan430074 China
Android has become the most popular mobile operating system. Correspondingly, an increasing number of Android malware has been developed and spread to steal users' private information. There exists one type of mal... 详细信息
来源: 评论
A trust chain assessment method based on blockchain for SDN network nodes  3
A trust chain assessment method based on blockchain for SDN ...
收藏 引用
3rd IEEE International Conference on Smart Internet of Things, SmartIoT 2019
作者: Liu, Yifan Zhao, Bo Li, Xiaofei Wang, Shuo Zhang, Bin Liu, Zhenpeng School of Cyber Science and Engineering Wuhan University Wuhan China Information Technology Center Hebei University Baoding China School of Cyberspace Security and Computer Hebei University Baoding China
The SDN node can complete the forwarding task efficiently and reliably does not attract enough attention. A new method called TrustBlock was proposed, which introduces the SDN node trust evaluation and block chain to ... 详细信息
来源: 评论
Transferring knowledge distillation for multilingual social event detection
arXiv
收藏 引用
arXiv 2021年
作者: Ren, Jiaqian Peng, Hao Jiang, Lei Wu, Jia Tong, Yongxin Wang, Lihong Bai, Xu Wang, Bo Yang, Qiang Institute of Information Engineering Chinese Academy of Sciences The School of Cyber Security University of Chinese Academy of Sciences Beijing100041 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100083 China The School of Cyber Science and Technology Beihang University Beijing100083 China Institute of Information Engineering Chinese Academy of Sciences Beijing100041 China The Department of Computing Macquarie University Sydney Australia The State Key Laboratory of Software Development Environment The School of Computer Science and Engineering Beihang University Beijing100083 China The National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong AI Group WeBank Co. Ltd. China
Recently published graph neural networks (GNNs) show promising performance at social event detection tasks. However, most studies are oriented toward monolingual data in languages with abundant training samples. This ... 详细信息
来源: 评论