咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 310 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 693 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 434 篇 工学
    • 348 篇 计算机科学与技术...
    • 285 篇 软件工程
    • 105 篇 信息与通信工程
    • 92 篇 电气工程
    • 65 篇 控制科学与工程
    • 62 篇 生物工程
    • 38 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 17 篇 安全科学与工程
  • 163 篇 理学
    • 82 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 106 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 35 篇 法学
    • 18 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 30 篇 machine learning
  • 29 篇 security
  • 28 篇 feature extracti...
  • 27 篇 deep learning
  • 23 篇 privacy
  • 20 篇 blockchain
  • 18 篇 cloud computing
  • 16 篇 internet of thin...
  • 14 篇 scalability
  • 14 篇 accuracy
  • 14 篇 training
  • 13 篇 deep neural netw...
  • 13 篇 computational mo...
  • 12 篇 support vector m...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 12 篇 cryptography
  • 11 篇 wireless sensor ...
  • 11 篇 semantics
  • 11 篇 protocols

机构

  • 46 篇 school of comput...
  • 46 篇 school of cyber ...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 25 篇 national enginee...
  • 25 篇 institute of inf...
  • 24 篇 hubei engineerin...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 engineering rese...
  • 23 篇 cluster and grid...
  • 18 篇 school of softwa...
  • 16 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 16 篇 hubei engineerin...
  • 16 篇 school of inform...
  • 15 篇 center for cyber...
  • 15 篇 school of cyber ...
  • 14 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 32 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 taher m. ghazal
  • 18 篇 hu shengshan
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 15 篇 deqing zou
  • 15 篇 ahmed amjed abba...
  • 13 篇 liu daizong
  • 13 篇 zhang leo yu
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 xu zichuan
  • 9 篇 nurhizam safie m...

语言

  • 653 篇 英文
  • 36 篇 其他
  • 4 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
693 条 记 录,以下是641-650 订阅
排序:
How to make the cramer-shoup cryptosystem secure against linear related-key attacks  12th
How to make the cramer-shoup cryptosystem secure against lin...
收藏 引用
12th International Conference on Information security and cryptology, INSCRYPT 2016
作者: Qin, Baodong Han, Shuai Chen, Yu Liu, Shengli Wei, Zhuo School of Computer Science and Technology Southwest University of Science and Technology Mianyang621010 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Huawei Singapore Research Center Singapore Singapore
Related-key attacks allow an adversary to change the key stored in the memory of a physical device via tampering or other means, and subsequently observe the outcomes of the cryptosystem under these modified keys. Cra... 详细信息
来源: 评论
Low-resolution face recognition in the wild via selective knowledge distillation
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Shiming Zhao, Shengwei Li, Chenyu Li, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security at University of Chinese Academy of Sciences China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China
Typically, the deployment of face recognition models in the wild needs to identify low-resolution faces with extremely low computational cost. To address this problem, a feasible solution is compressing a complex face... 详细信息
来源: 评论
V-Chain: A Blockchain-Based Car Lease Platform
V-Chain: A Blockchain-Based Car Lease Platform
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Kwame O.-B Obour Agyekum Qi Xia Emmanuel Boateng Sifah Sandro Amofa Kingsley Nketia Acheampong Jianbin Gao Ruidong Chen Hu Xia James C. Gee Xiaojiang Du Mohsen Guizani School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Resource and Environment University of Electronic Science and Technology of China Chengdu China Mr. Ray Co. Ltd. Chengdu and with Youe Data Co. Ltd. Beijing China School of Computer Science and Engineering Chengdu and Youe Data Co. Ltd. Beijing China Department of Radiology University of Pennsylvania Chengdu Philadelphia PA China Department of Computer and Information Sciences Temple University Philadelphia PA USA Electrical and Computer Engineering Department University of Idaho Moscow USA
Significant improvements have been made in the way several businesses are conducted due to the influx of blockchain technology, which is a paradigm shift in research these days. Because of the several benefits this te... 详细信息
来源: 评论
Concolic Execution on Small-Size Binaries: Challenges and Empirical Study
Concolic Execution on Small-Size Binaries: Challenges and Em...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Hui Xu Yangfan Zhou Yu Kang Michael R. Lyu Dept. of Computer Science The Chinese University of Hong Kong School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China
Concolic execution has achieved great success in many binary analysis tasks. However, it is still not a primary option for industrial usage. A well-known reason is that concolic execution cannot scale up to large-size... 详细信息
来源: 评论
Information Leakage in Encrypted Deduplication via Frequency Analysis
Information Leakage in Encrypted Deduplication via Frequency...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jingwei Li Chuan Qin Patrick P. C. Lee Xiaosong Zhang University of Electronic Science and Technology of China Chengdu CN Department of Computer Science and Engineering The Chinese University of Hong Kong Center for Cyber Security University of Electronic Science and Technology of China
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a determinist... 详细信息
来源: 评论
Three Layer Game Theoretic Decision Framework for cyber-Investment and cyber-Insurance  8th
Three Layer Game Theoretic Decision Framework for Cyber-Inve...
收藏 引用
8th International Conference on Decision and Game Theory for security, GameSec 2017
作者: Tosh, Deepak K. Vakilinia, Iman Shetty, Sachin Sengupta, Shamik Kamhoua, Charles A. Njilla, Laurent Kwiat, Kevin Department of Computer Science Norfolk State University NorfolkVA United States Department of Computer Science and Engineering University of Nevada RenoNV United States Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Network Security Branch Army Research Laboratory AdelphiMD United States Cyber Assurance Branch Air Force Research Laboratory RomeNY United States
cyber-threat landscape has become highly complex, due to which isolated attempts to understand, detect, and resolve cybersecurity issues are not feasible in making a time constrained decisions. Introduction of cyber-t... 详细信息
来源: 评论
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
On the design of a secure user authentication and key agreem...
收藏 引用
作者: Kumari, Saru Das, Ashok Kumar Wazid, Mohammad Li, Xiong Wu, Fan Choo, Kim-Kwang Raymond Khan, Muhammad Khurram Department of Mathematics Chaudhary Charan Singh University MeerutUttar Pradesh250 005 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411 201 China Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science and Engineering Xiamen Institute of Technology Xiamen361021 China Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Computer Science China University of Geosciences Wuhan China School of Information Technology & Mathematical Sciences University of South Australia AdelaideSA Australia Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
A wireless sensor network (WSN) typically consists of a large number of resource-constrained sensor nodes and several control or gateway nodes. Ensuring the security of the asymmetric nature of WSN is challenging, and... 详细信息
来源: 评论
Infection tracing in smart hospitals  12
Infection tracing in smart hospitals
收藏 引用
12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2016
作者: Qathrady, Mimonah Al Helmy, Ahmed Almuzaini, Khalid Computer and Information Science and Engineering Department University of Florida GainesvilleFL United States National Center for Cyber Security Technology King Abdulaziz City for Science and Technology Riyadh Saudi Arabia
Many disease infection cases are acquired and spread in hospital settings. Early detection of such infection cases is necessary to identify population at risk accurately and effectively. This paper introduces a system... 详细信息
来源: 评论
Bandwidth-aware delayed repair in distributed storage systems  24
Bandwidth-aware delayed repair in distributed storage system...
收藏 引用
24th IEEE/ACM International Symposium on Quality of Service, IWQoS 2016
作者: Shen, Jiajie Gu, Jiazhen Zhou, Yangfan Wang, Xin School of Computer Science Fudan University Shanghai China The State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China
In data storage systems, data are typically stored in redundant storage nodes to ensure storage reliability. When storage nodes fail, with the help of the redundant nodes, the lost data can be restored in new storage ... 详细信息
来源: 评论
Study on Demand Response of Residential Power Customer
Study on Demand Response of Residential Power Customer
收藏 引用
Workshop 7 2016
作者: Xiu Cao Haiyong Jiang Lei Huang Xueping Wang Xuqi Zhang School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model(MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electric... 详细信息
来源: 评论