咨询与建议

限定检索结果

文献类型

  • 3,176 篇 会议
  • 2,189 篇 期刊文献
  • 33 册 图书

馆藏范围

  • 5,398 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,283 篇 工学
    • 2,607 篇 计算机科学与技术...
    • 2,225 篇 软件工程
    • 834 篇 信息与通信工程
    • 479 篇 控制科学与工程
    • 463 篇 电气工程
    • 457 篇 生物工程
    • 265 篇 电子科学与技术(可...
    • 204 篇 机械工程
    • 195 篇 生物医学工程(可授...
    • 190 篇 网络空间安全
    • 176 篇 光学工程
    • 149 篇 安全科学与工程
    • 128 篇 交通运输工程
    • 125 篇 化学工程与技术
    • 112 篇 仪器科学与技术
    • 105 篇 动力工程及工程热...
  • 1,444 篇 理学
    • 743 篇 数学
    • 487 篇 生物学
    • 281 篇 物理学
    • 256 篇 统计学(可授理学、...
    • 144 篇 系统科学
    • 133 篇 化学
  • 869 篇 管理学
    • 531 篇 管理科学与工程(可...
    • 377 篇 图书情报与档案管...
    • 240 篇 工商管理
  • 252 篇 法学
    • 166 篇 社会学
  • 202 篇 医学
    • 167 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 101 篇 公共卫生与预防医...
  • 102 篇 经济学
    • 102 篇 应用经济学
  • 49 篇 农学
  • 42 篇 教育学
  • 25 篇 军事学
  • 10 篇 文学
  • 8 篇 艺术学
  • 1 篇 历史学

主题

  • 227 篇 accuracy
  • 208 篇 deep learning
  • 197 篇 feature extracti...
  • 178 篇 training
  • 160 篇 security
  • 145 篇 computational mo...
  • 143 篇 machine learning
  • 127 篇 privacy
  • 125 篇 blockchain
  • 115 篇 internet of thin...
  • 107 篇 real-time system...
  • 103 篇 semantics
  • 101 篇 data models
  • 87 篇 predictive model...
  • 81 篇 cloud computing
  • 78 篇 optimization
  • 76 篇 convolutional ne...
  • 74 篇 federated learni...
  • 73 篇 reinforcement le...
  • 73 篇 data privacy

机构

  • 267 篇 school of comput...
  • 228 篇 school of cyber ...
  • 218 篇 school of cyber ...
  • 210 篇 school of cyber ...
  • 171 篇 institute of inf...
  • 115 篇 school of cyber ...
  • 114 篇 school of cyber ...
  • 91 篇 school of comput...
  • 89 篇 school of comput...
  • 86 篇 school of cyber ...
  • 72 篇 school of comput...
  • 70 篇 school of cyber ...
  • 69 篇 school of cyber ...
  • 63 篇 school of comput...
  • 52 篇 school of comput...
  • 52 篇 wuhan university...
  • 51 篇 school of cyber ...
  • 50 篇 school of cyber ...
  • 49 篇 college of cyber...
  • 45 篇 school of comput...

作者

  • 53 篇 cao xiaochun
  • 44 篇 ma jianfeng
  • 44 篇 zhou pan
  • 43 篇 jianfeng ma
  • 41 篇 muhaidat sami
  • 40 篇 choo kim-kwang r...
  • 37 篇 huang qingming
  • 37 篇 hai jin
  • 36 篇 mohana
  • 33 篇 liu yang
  • 33 篇 hu shengshan
  • 33 篇 wang qian
  • 29 篇 wang guojun
  • 28 篇 sofotasios pasch...
  • 28 篇 luan tom h.
  • 28 篇 xu qianqian
  • 27 篇 bariah lina
  • 27 篇 jin hai
  • 25 篇 peng hao
  • 25 篇 gui jie

语言

  • 4,381 篇 英文
  • 994 篇 其他
  • 53 篇 中文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Computer Science and Cyber Engineering"
5398 条 记 录,以下是1-10 订阅
排序:
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
science China(Information sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA School of Cyber Engineering Xidian University School of Computer Science and Technology Xidian University Department of Computer and Information Science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 评论
SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 90-100页
作者: Wenbin YANG Xueluan GONG Yanjiao CHEN Qian WANG Jianshuo DONG School of Cyber Science and Engineering Wuhan University School of Computer Science Wuhan University College of Electrical Engineering Zhejiang University
With the rise of artificial intelligence and cloud computing, machine-learning-as-a-service platforms,such as Google, Amazon, and IBM, have emerged to provide sophisticated tasks for cloud applications. These propriet... 详细信息
来源: 评论
CAED: A Comprehensive Android Emulator Detection Framework with Data Augmentation
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 22847-22861页
作者: Yan, Ran Niu, Weina Hou, Qinsheng Su, YuChi Gong, Jiacheng Zhang, Xiaosong School of Computer Science and Engineering Institute for Cyber Security Chengdu611731 China Shanghai Jiao Tong University School of Cyber Science and Engineering China
Anti-emulation is crucial for Android and IoT security as it helps apps determine whether they are running on a real mobile device or in an emulation environment. This prevents apps from being analyzed, debugged, or r... 详细信息
来源: 评论
An end-to-end network for co-saliency detection in one single image
收藏 引用
science China(Information sciences) 2023年 第11期66卷 5-22页
作者: Yuanhao YUE Qin ZOU Hongkai YU Qian WANG Zhongyuan WANG Song WANG School of Cyber Science and Engineering Wuhan University School of Computer Science Wuhan University Department of Electrical Engineering and Computer Science Cleveland State University Department of Computer Science and Engineering University of South Carolina
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions a... 详细信息
来源: 评论
A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR)for double auctions
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 116-125页
作者: Xuedan Jia Liangmin Wang Ke Cheng Pujie Jing Xiangmei Song School of Computer Science and Communication Engineering Jiangsu UniversityZhenjiang 212013China School of Cyber Science and Engineering Southeast UniversityNanjing 211102China School of Computer Science and Technology Xidian UniversityXi’an 710071China
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general ***,most e-auction schemes involve a trusted auctioneer,which is not always credible in **... 详细信息
来源: 评论
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm
收藏 引用
science China(Information sciences) 2024年 第5期67卷 325-326页
作者: Teng LI Weiguo LIN Ruichen MA Zhuo MA Yulong SHEN Jianfeng MA School of Cyber Engineering Xidian University School of Computer Science and Technology Xidian University
As mission scenarios grow more complex, the role of a single unmanned aerial vehicle(UAV) is limited. The UAV swarm,surpassing the single UAV, dynamically establishes temporary communication networks, ensuring high tr... 详细信息
来源: 评论
LT-DBFT: A Hierarchical Blockchain Consensus Using Location and Trust in IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19574-19589页
作者: Wang, Yang Xing, Xiaofei Li, Peiqiang Wang, Guojun Guangzhou University School of Computer Science and Cyber Engineering Guangzhou510006 China Guangzhou University School of Computer Science and Network Engineering Guangzhou510006 China
The exponential growth of IoT devices has led to the proposal of edge computing for data processing. The decentralized nature of edge computing servers and IoT devices makes blockchain ideal for connecting IoT users a... 详细信息
来源: 评论
Formal Verification of Data Modifications in Cloud Block Storage Based on Separation Logic
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 112-127页
作者: Bowen ZHANG Zhao JIN Hanpin WANG Yongzhi CAO Key Laboratory of High Confidence Software Technologies (MOE) School of Computer Science Peking University School of Computer and Artificial Intelligence Zhengzhou University School of Computer Science and Cyber Engineering Guangzhou University
Cloud storage is now widely used, but its reliability has always been a major concern. Cloud block storage(CBS) is a famous type of cloud storage. It has the closest architecture to the underlying storage and can prov... 详细信息
来源: 评论
A metadata-aware detection model for fake restaurant reviews based on multimodal fusion
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 475-498页
作者: Jian, Yifei Chen, Xinyu Wang, Xiaoda Liu, Ying Chen, Xingshu Lan, Xiao Wang, Wenxian Wang, Haizhou School of Cyber Science and Engineering Sichuan University Chengdu China College of Computer Science Sichuan University Chengdu China Cyber Science Research Institute Sichuan University Chengdu China
Nowadays, online reviews have a significant impact on customers who purchase products or evaluate services, as well as merchants who do business. Unfortunately, there are a lot of fake reviews included in them, which ... 详细信息
来源: 评论
Energy consumption dynamic prediction for HVAC systems based on feature clustering deconstruction and model training adaptation
收藏 引用
Building Simulation 2024年 第9期17卷 1439-1460页
作者: Huiheng Liu Yanchen Liu Huakun Huang Huijun Wu Yu Huang School of Civil Engineering and Transportation Guangzhou UniversityGuangzhou510006China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China
The prediction of building energy consumption offers essential technical support for intelligent operation and maintenance of buildings,promoting energy conservation and low-carbon *** paper focused on the energy cons... 详细信息
来源: 评论