咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 319 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 368 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 109 篇 信息与通信工程
    • 96 篇 电气工程
    • 75 篇 控制科学与工程
    • 62 篇 生物工程
    • 40 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 164 篇 理学
    • 83 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 109 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 32 篇 security
  • 30 篇 machine learning
  • 29 篇 deep learning
  • 28 篇 feature extracti...
  • 26 篇 privacy
  • 20 篇 blockchain
  • 19 篇 cloud computing
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 training
  • 14 篇 scalability
  • 14 篇 deep neural netw...
  • 14 篇 computational mo...
  • 13 篇 data privacy
  • 13 篇 authentication
  • 13 篇 protocols
  • 12 篇 support vector m...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 12 篇 cryptography

机构

  • 50 篇 school of cyber ...
  • 49 篇 school of comput...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 28 篇 national enginee...
  • 26 篇 services computi...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 institute of inf...
  • 25 篇 cluster and grid...
  • 23 篇 engineering rese...
  • 20 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 hubei key labora...
  • 16 篇 school of cyber ...
  • 16 篇 center for cyber...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 15 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 34 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 hu shengshan
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 hasan mohammad k...
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 liu daizong
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 11 篇 wan wei
  • 10 篇 xu zichuan

语言

  • 642 篇 英文
  • 72 篇 其他
  • 5 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
718 条 记 录,以下是621-630 订阅
排序:
Stance-In-Depth Deep Neural Approach to Stance Classification
Stance-In-Depth Deep Neural Approach to Stance Classificatio...
收藏 引用
2018 International Conference on Computational Intelligence and Data science, ICCIDS 2018
作者: Rajendran, Gayathri Chitturi, Bhadrachalam Poornachandran, Prabaharan Dept. of Computer Science and Engineering Amrita School of Engineering India Amrita Center for Cyber Security and Networks India Amrita Vishwa Vidyapeetham Amritapuri Kerala India
Understanding the user intention from text is a problem of growing interest. The social media like Twitter, Facebook etc. extract user intention to analyze the behaviour of a user which in turn is employed for bot rec... 详细信息
来源: 评论
Implementation analysis of rectangle cipher and its variant  3
Implementation analysis of rectangle cipher and its variant
收藏 引用
3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2018
作者: Philip, Merly Annie Vaithiyanathan, V. Jain, Kurunandan Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Lightweight ciphers are symmetric cryptographic systems with lower area, lower power and lower cost than standard systems like AES and DES. They were designed to provide security in resource constrained devices like s... 详细信息
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
Fine-grained iterative attention network for temporal language localization in videos
arXiv
收藏 引用
arXiv 2020年
作者: Qu, Xiaoye Tang, Pengwei Zou, Zhikang Cheng, Yu Dong, Jianfeng Zhou, Pan Xu, Zichuan School of Electronic Information and Communication Huazhong University of Science and Technology Huawei Tech. Hangzhou China School of Electronic Information and Communication Huazhong University of Science and Technology China Baidu Inc. China Microsoft Dynamics 365 AI Research RedmondWA United States School of Computer and Information Engineering Zhejiang Gongshang University China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Dalian University of Technology China
Temporal language localization in videos aims to ground one video segment in an untrimmed video based on a given sentence query. To tackle this task, designing an effective model to extract grounding information from ... 详细信息
来源: 评论
Poisoning attack against estimating from pairwise comparisons
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Ke Xu, Qianqian Zeng, Jinshan Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Big Data Mining and Knowledge Management The School of Economics and Management University of Chinese Academy of Sciences Beijing100049 China
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking li... 详细信息
来源: 评论
Triple layer data hiding mechanism using cryptography and steganography  3
Triple layer data hiding mechanism using cryptography and st...
收藏 引用
3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2018
作者: Menon, Nidhi Vaithiyanathan, V. Amrita Center for Cyber Security Systems and Networks Amrita University Amritapuri Kerala India Amrita University Department of Computer Science and Engineering Amritapuri Kerala India
In many areas security systems are well known as the advances are expanding step by step. Using encryption and steganography data security can be accomplished. Cryptography is the process of secure correspondence with... 详细信息
来源: 评论
Securing the Private Key in Your Blockchain Wallet: A Continuous Authentication Approach Based on Behavioral Biometric
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1631卷
作者: Teng Hu Xiaolei Liu Weina Niu Kangyi Ding Yanping Wang Xiaosong Zhang Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China China Institute of Computer Application China Academy of Engineering Physics China Peng Cheng Laboratory Cyberspace Security Research Center China
As blockchain is increasingly valued, the application of blockchain and its security has become a research hotspot. Not only that, more and more ordinary users are paying attention to the blockchain and beginning to t...
来源: 评论
Curtailing the spread of COVID-19 in Nigeria using digital framework and data driven approaches
EngMedicine
收藏 引用
EngMedicine 2024年 第2期1卷 22-30页
作者: Bolanle Adefowoke Ojokoh Benjamin S.Aribisala Oluwafemi A.Sarumi Tobore V.Igbe Abimbola H.Afolayan Arome J.Gabriel Abiola Ezekiel Taiwo Olatunji M.Omisore Uchechukwu M.Chukwuocha Olusola T.Babalola Tolulope A.Adebayo Department of Information Systems Federal University of TechnologyP.M.B.704 AkureOndo StateNigeria Department of Computer Science Lagos State UniversityOjoLagos StateNigeria Department of Mathematics and Computer Science University of Marburg35037 MarburgGermany Center for Diabetes Technology Department of Psychiatry&Neurobehavioral SciencesUniversity of VirginiaCharlottesvilleVA 22903USA Department of Cyber Security Federal University of TechnologyP.M.B.704 AkureOndo StateNigeria Faculty of Engineering Mangosuthu University of TechnologyDurban 4026South Africa Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Department of Public Health Federal University of TechnologyIhiagwaOwerriNigeria Department of Computer Science Federal University of TechnologyP.M.B.704 AkureOndo StateNigeria
The onset of the coronavirus disease 2019(COVID-19)pandemic had profound economic and societal repercussions *** nations managed to mitigate the spread of the virus sufficiently early through implementing digital fram... 详细信息
来源: 评论
Secure Cryptography Infrastructures in the Cloud
Secure Cryptography Infrastructures in the Cloud
收藏 引用
IEEE Global Communications Conference
作者: Dawei Chu Kaijie Zhu Quanwei Cai Jingqiang Lin Fengjun Li Le Guan Lingchen Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences National Digital Switching System Engineering & Technological R&D Center CHINA Data Assurance and Communication Security Research Center Chinese Academy of Sciences Department of Electrical Engineering and Computer Science The University of Kansas USA Department of Computer Science University of Georgia USA
Information systems are deployed in clouds as virtual machines (VMs) for better agility, elasticity and reliability. It is necessary to safekeep their cryptographic keys, e.g., the private keys used in TLS and SSH, ag... 详细信息
来源: 评论
An Acute Kidney Injury Prediction Model Based on Ensemble Learning Algorithm
An Acute Kidney Injury Prediction Model Based on Ensemble Le...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Yuan Wang Yake Wei Qin Wu Hao Yang Jingwei Li College of Computer Science and Information Engineering Tianjin University of Science and Technology Population and Precision Health Care (Tianjin) Ltd Center for Cyber Security University of Electronic Science and Technology of China Department of critical care medicine Sichuan University State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences
Acute Kidney Injury (AKI), a common disease in Intensive Care Unit (ICU) patients, is related to high cost, morbidity and mortality. The early prediction of AKI is critical for improving patients' outcome. However... 详细信息
来源: 评论