咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,538 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,465 篇 工学
    • 1,205 篇 计算机科学与技术...
    • 1,018 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 592 篇 理学
    • 286 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,077 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2538 条 记 录,以下是1-10 订阅
排序:
CAED: A Comprehensive Android Emulator Detection Framework with Data Augmentation
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 22847-22861页
作者: Yan, Ran Niu, Weina Hou, Qinsheng Su, YuChi Gong, Jiacheng Zhang, Xiaosong School of Computer Science and Engineering Institute for Cyber Security Chengdu611731 China Shanghai Jiao Tong University School of Cyber Science and Engineering China
Anti-emulation is crucial for Android and IoT security as it helps apps determine whether they are running on a real mobile device or in an emulation environment. This prevents apps from being analyzed, debugged, or r... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 183-211页
作者: Murad Njoum Rossilawati Sulaiman Zarina Shukur Faizan Qamar Center of Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia Computer Science and Cyber Security Faculty of Engineering and Information TechnologyBirZeit UniversityBirZeitRamallahP.O.Box 14Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t... 详细信息
来源: 评论
Literature Review on Packet Sniffing: Essential for cybersecurity & Network security  5
Literature Review on Packet Sniffing: Essential for Cybersec...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Shaw, Ranju Parveen, Suraiya Jamia Hamdard University Dept. of Computer Science Engineering with Specialization in Cyber Forensic Information Security Delhi India Faculty at Jamia Hamdard University Sest Department of Computer Science Engineering Delhi India
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t... 详细信息
来源: 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
science China(Information sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 评论
Shorter ZK-SNARKs from square span programs over ideal lattices
收藏 引用
cybersecurity 2025年 第1期8卷 208-226页
作者: Xi Lin Heyang Cao Feng‑Hao Liu Zhedong Wang Mingsheng Wang Key Laboratory of Cyberspace Security Defense Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Electrical Engineering&Computer Science Washington State UniversityPullmanWAUSA School of Cyber Science and Engineering Shanghai Jiaotong UniversityShanghaiChina
Zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARKs)are cryptographic protocols that ofer efcient and privacy-preserving means of verifying NP language relations and have drawn considerable atten‑... 详细信息
来源: 评论
GuardGrid: A Queriable and Privacy-Preserving Aggregation Scheme for Smart Grid via Function Encryption
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17622-17633页
作者: Yu, Pengfei Huang, Weicong Zhang, Ran Qian, Xinyuan Li, Hongwei Chen, Hanxiao China Electric Power Research Institute State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology Nanjing210003 China University of Electronic Science and Technology of China School of Computer Science and Engineering School of Cyber Security Chengdu611731 China
Smart grids have revolutionized electricity management by leveraging real-time consumption data, enabling more efficient power control through advanced algorithms. However, this transformation raises significant priva... 详细信息
来源: 评论
ArchSentry: Enhanced Android Malware Detection via Hierarchical Semantic Extraction
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2822-2837页
作者: Wang, Tianbo Liu, Mengyao Li, Huacheng Zhao, Lei Jiang, Changnan Xia, Chunhe Cui, Baojiang Beihang University School of Cyber Science and Technology Beijing100191 China Beihang University School of Computer Science and Engineering Beijing China Wuhan University School of Cyber Science and Engineering Wuhan China Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing China
Android malware poses a significant challenge for mobile platforms. To evade detection, contemporary malware variants use API substitution or obfuscation techniques to hide malicious activities and mask their shallow ... 详细信息
来源: 评论
Verifiable and Forward-Secure Multi-Keyword Query in Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23809-23822页
作者: Li, Hongjun He, Debiao Feng, Qi Luo, Min Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan China Wuhan University School of Cyber Science and Engineering Wuhan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu China
The Internet of Medical Things (IoMT) plays a pivotal role in modern healthcare systems, enhancing patients' medical experiences and improving the efficiency of public medical services. However, concerns regarding... 详细信息
来源: 评论
Energy Efficiency Maximization for Cooperative NOMA with Hardware Impairments
收藏 引用
China Communications 2024年 第12期21卷 80-91页
作者: Wang Zhengqiang Chang Ruifei Wan Xiaoyu Fan Zifu Duo Bin School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this... 详细信息
来源: 评论