咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 310 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 693 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 348 篇 计算机科学与技术...
    • 285 篇 软件工程
    • 105 篇 信息与通信工程
    • 92 篇 电气工程
    • 65 篇 控制科学与工程
    • 62 篇 生物工程
    • 38 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 17 篇 安全科学与工程
  • 163 篇 理学
    • 82 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 106 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 35 篇 法学
    • 18 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 30 篇 machine learning
  • 29 篇 security
  • 28 篇 feature extracti...
  • 27 篇 deep learning
  • 23 篇 privacy
  • 20 篇 blockchain
  • 18 篇 cloud computing
  • 16 篇 internet of thin...
  • 14 篇 scalability
  • 14 篇 accuracy
  • 14 篇 training
  • 13 篇 deep neural netw...
  • 13 篇 computational mo...
  • 12 篇 support vector m...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 12 篇 cryptography
  • 11 篇 wireless sensor ...
  • 11 篇 semantics
  • 11 篇 protocols

机构

  • 46 篇 school of comput...
  • 46 篇 school of cyber ...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 25 篇 national enginee...
  • 25 篇 institute of inf...
  • 24 篇 hubei engineerin...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 engineering rese...
  • 23 篇 cluster and grid...
  • 18 篇 school of softwa...
  • 16 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 16 篇 hubei engineerin...
  • 16 篇 school of inform...
  • 15 篇 center for cyber...
  • 15 篇 school of cyber ...
  • 14 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 32 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 taher m. ghazal
  • 18 篇 hu shengshan
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 15 篇 deqing zou
  • 15 篇 ahmed amjed abba...
  • 13 篇 liu daizong
  • 13 篇 zhang leo yu
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 xu zichuan
  • 9 篇 nurhizam safie m...

语言

  • 653 篇 英文
  • 36 篇 其他
  • 4 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
693 条 记 录,以下是611-620 订阅
排序:
Understanding the Behavioral Differences Between American and German Users: A Data-Driven Study
收藏 引用
Big Data Mining and Analytics 2018年 第4期1卷 284-296页
作者: Chenxi Yang Yang Chen Qingyuan Gong Xinlei He Yu Xiao Yuhuan Huang Xiaoming Fu School of Computer Science Fudan UniversityShanghai 200433China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of EducationShanghai 200433China Department of Communications and Networking Aalto University02150 EspooFinland Faculty of European Languages and Cultures Guangdong University of Foreign StudiesGuangzhou 510420China Institute of Computer Science University of Gottingen37077 GottingenGermany
Given that the USA and Germany are the most populous countries in North America and Western Europe,understanding the behavioral differences between American and German users of online social networks is *** this work,... 详细信息
来源: 评论
Distortion-free watermarking scheme for compressed data in columnar database  15
Distortion-free watermarking scheme for compressed data in c...
收藏 引用
15th International Joint Conference on e-Business and Telecommunications, ICETE 2018
作者: Yaqub, Waheeb Kamel, Ibrahim Aung, Zeyar Center for Cyber Security New York University Abu Dhabi United Arab Emirates Department of Electrical and Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science Khalifa University of Science and Technology Masdar Institute Abu Dhabi United Arab Emirates
Digital watermarking is an effective technique for protecting various databases against data copyright infringement, piracy, and data tampering in the columnar database. Increasing deployments of various database syst... 详细信息
来源: 评论
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures  13th
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minut...
收藏 引用
13th International Conference on Information securityand cryptology, Inscrypt 2017
作者: Li, Xiangmin Ding, Ning Lu, Haining Gu, Dawu Wang, Shanshan Xu, Beibei Yuan, Yuan Yan, Siyun Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China School of Cyber Security Shanghai Jiao Tong University Shanghai China Information Technology Co. Ltd. Hangzhou China
Biometrics-based cryptosystems are helpful tools facilitating our daily life. Examples are that people use their biometrics to identify themselves in clouds or protect passwords as well as other privacy information in... 详细信息
来源: 评论
Stance-In-Depth Deep Neural Approach to Stance Classification
收藏 引用
Procedia computer science 2018年 132卷 1646-1653页
作者: Gayathri Rajendran Bhadrachalam Chitturi Prabaharan Poornachandran Dept. of Computer Science and Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Amritapuri Kerala India Amrita Center for Cyber Security & Networks
Understanding the user intention from text is a problem of growing interest. The social media like Twitter, Facebook etc. extract user intention to analyze the behaviour of a user which in turn is employed for bot rec... 详细信息
来源: 评论
A blockchain-based architecture framework for secure sharing of personal health data  20
A blockchain-based architecture framework for secure sharing...
收藏 引用
20th IEEE International Conference on e-Health Networking, Applications and Services, Healthcom 2018
作者: Amofa, Sandro Sifah, Emmanuel Boateng Obour Agyekum, Kwame O.-B. Abla, Smahi Xia, Qi Gee, James C. Gao, Jianbin School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China Department of Radiology University of Pennsylvania Philadelphia United States School of Resource and Enviroment Center for Digital Health University of Electronic Science and Technology China
Health information exchanges have been popular for some time with their advantages known and widely researched. In spite of their utility in increasing provider efficiency and decreasing administrative costs, one chal... 详细信息
来源: 评论
Targeted Malicious Email Detection using Hypervisor-based Dynamic Analysis and Ensemble Learning
Targeted Malicious Email Detection using Hypervisor-based Dy...
收藏 引用
IEEE Global Communications Conference
作者: Jian Zhang Zhaojun Gu Wenzhen Li Liangyi Gong Jeffrey Wu School of Computer Science and Engineering Tianjin University of Technology College of Cyber Science Nankai University Tianjin China School of Computer Science and Engineering Tianjin University of Technology Tianjin China School of Software and BNRist Tsinghua University Beijing China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin China Jiaxing Chenxiang Information Technology Co. Ltd. Jiaxing China
At present, email is still one of the most frequently used communication tools for organizations and individuals. With the leakage of personal privacy information, targeted malicious email (TME) is becoming a prominen... 详细信息
来源: 评论
Towards the Trust-Enhancements of Single Sign-On Services
Towards the Trust-Enhancements of Single Sign-On Services
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Xuhua Bao Xiaokun Zhang Jingqiang Lin Dawei Chu Qiongxiao Wang Fengjun Li Legendsec Information Technology (Beijing) Inc. CHINA Joint Laboratory of Institute of Information Engineering Chinese Academy of Sciences and QiAnXin Group Academy of Opto-Electronics Chinese Academy of Sciences State Key Laboratory of Information Security Chinese Academy of Sciences Data Assurance and Communication Security Research Center Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Department of Electrical Engineering and Computer Science University of Kansas USA
Single sign-on (SSO) becomes popular as the identity management and authentication infrastructure in the Internet. A user receives an SSO ticket after being authenticated by the identity provider (IdP), and this IdP-i... 详细信息
来源: 评论
On the hardness of learning parity with noise over rings  12th
On the hardness of learning parity with noise over rings
收藏 引用
12th International Conference on Provable security, ProvSec 2018
作者: Zhao, Shuoyao Yu, Yu Zhang, Jiang Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China National Engineering Laboratory for Wireless Security Xi’an University of Posts and Telecommunications Xi’an China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China Westone Cryptologic Research Center Beijing100070 China
Learning Parity with Noise (LPN) represents a notoriously hard problem in learning theory and it is also closely related to the "decoding random linear codes" problem in coding theory. Recently LPN has found... 详细信息
来源: 评论
NTIRE 2021 challenge on video super-resolution
arXiv
收藏 引用
arXiv 2021年
作者: Son, Sanghyun Lee, Suyoung Nah, Seungjun Timofte, Radu Lee, Kyoung Mu Chan, Kelvin C.K. Zhou, Shangchen Xu, Xiangyu Loy, Chen Change Jiang, Boyuan Lin, Chuming Dong, Yuchun Luo, Donghao Chu, Wenqing Ji, Xiaozhong Yang, Siqian Tai, Ying Wang, Chengjie Li, Jilin Huang, Feiyue Chen, Chengpeng Chu, Xiaojie Zhang, Jie Lu, Xin Chen, Liangyu Lin, Jing Du, Guodong Hao, Jia Zou, Xueyi Zhang, Qi Jiang, Lielin Li, Xin Zheng, He Liu, Fanglong He, Dongliang Li, Fu Dang, Qingqing Yi, Peng Wang, Zhongyuan Jiang, Kui Jiang, Junjun Ma, Jiayi Chen, Yuxiang Wang, Yutong Liu, Ting Sun, Qichao Liang, Huanwei Li, Yiming Li, Zekun Ruan, Zhubo Shang, Fanjie Guo, Chen Li, Haining Luo, Renjun Shen, Longjie Zafirouli, Kassiani Karageorgos, Konstantinos Konstantoudakis, Konstantinos Dimou, Anastasios Daras, Petros Song, Xiaowei Zhuo, Xu Liu, Hanxi Guo, Mengxi Li, Junlin Li, Yu Zhu, Ye Wang, Qing Zhao, Shijie Sun, Xiaopeng Zhan, Gen Xie, Tangxin Jia, Yu Lu, Yunhua Zhang, Wenhao Sun, Mengdi Michelini, Pablo Navarrete Zhang, Xueheng Jiang, Hao Chen, Zhiyu Chen, Li Xiong, Zhiwei Xiao, Zeyu Xu, Ruikang Cheng, Zhen Fu, Xueyang Song, Fenglong Luo, Zhipeng Yao, Yuehan Dutta, Saikat Shah, Nisarg A. Das, Sourya Dipta Zhao, Peng Shi, Yukai Liu, Hongying Shang, Fanhua Liu, Yuanyuan Chen, Fei Yu, Fangxu Gao, Ruisheng Bai, Yixin Heo, Jeonghwan Yue, Shijie Li, Chenghua Li, Jinjing Zheng, Qian Gang, Ruipeng Song, Ruixia Wee, Seungwoo Jeong, Jechang Li, Chen Wen, Geyingjie Chai, Xinning Song, Li Department of ECE ASRI SNU Korea Republic of Computer Vision Lab ETH Zurich Switzerland S-Lab Nanyang Technological University Singapore YouTu Lab Tencent East China Normal University China Megvii Peking University China Fudan University China Noah's Ark Lab Huawei Canada Technologies Co. Ltd Baidu Inc National Engineering Research Center for Multimedia Software Wuhan University China School of Computer Science and Technology Harbin Institute of Technology China Electronic Information School Wuhan University China School of Computer Science and Engineering University of Electronic Science and Technology of China China MTlab Meitu Inc Xidian university China ITI CERTH Greece Southeast University China Tencent PCG South China University of Technology China ByteDance Sun Yat-Sen University China Electronic Technology Cyber Security Co. Ltd. AIoT R&D Centre BOE Technology Group Co. Ltd. Shanghai Jiao Tong University China University of Science and Technology of China China Huawei Noah's Ark Lab DeepBlue Technology Shanghai Co. Ltd Indian Institute of Technology Madras India Indian Institute of Technology Jodhpur India Jadavpur University India Xidian University China Hanyang University Korea Republic of NCUT China CASIA China CUC China NRTA China
Super-Resolution (SR) is a fundamental computer vision task that aims to obtain a high-resolution clean image from the given low-resolution counterpart. This paper reviews the NTIRE 2021 Challenge on Video Super-Resol... 详细信息
来源: 评论
Password Guessing Time Based on Guessing Entropy and Long-Tailed Password Distribution in the Large-Scale Password Dataset  11
Password Guessing Time Based on Guessing Entropy and Long-Ta...
收藏 引用
2017 11th IEEE International Conference on Anti-counterfeiting,security,and Identification(ASID)
作者: Shuo Zhang Jianping Zeng Zewen Zhang School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education
Currently the password security is serious, but there is not an appropriate metric for measuring passwords. Thus, the main purpose of this paper is to provide a security time period for the user's password in an o... 详细信息
来源: 评论