咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是171-180 订阅
排序:
Accurate segmentation based on heuristic shape attention for occlusal tooth on CBCT  11
Accurate segmentation based on heuristic shape attention for...
收藏 引用
11th International Conference on Information Technology: IoT and Smart City, ICIT 2023
作者: Cai, Jiancheng Zou, Zheng Wu, Yi Liu, Shijian Liao, Shenghui College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Computer Science and Mathematics Fujian University of Technology Fuzhou China School of Computer Science and Engineering Central South University Changsha China
Accurate occlusal tooth segmentation for dental CBCT is essential for traumatic occlusal force diagnosis. As tiny multi-objects, adhesion from surrounding touching would largely hinder the correct detection. Especiall... 详细信息
来源: 评论
AntiMal: an Approach of Malware Detection Employing Swin Transformer  13
AntiMal: an Approach of Malware Detection Employing Swin Tra...
收藏 引用
13th International Conference on Communication and Network security, ICCNS 2023
作者: Lyu, Chenxi Yao, Yinan Guo, Xiaodong Huang, Zihong Dong, Chen Zhang, Yuanyuan Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China Department of Computer Science and Engineering University of South Florida FL United States
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t... 详细信息
来源: 评论
Perception System of Autonomous Vehicles: Sophisticated Attacks, Defense Strategies, and Future Directions  15
Perception System of Autonomous Vehicles: Sophisticated Atta...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Neethu, M.R. Remyakrishnan, P. Mukesh, Sa Barath Kumar, J. Royal, Ala Manas Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore641112 India Amrita Vishwa Vidyapeetham TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore641112 India
The advent of autonomous vehicles marks a significant milestone in the evolution of automotive technologies. Central to the operation of autonomous vehicles is the perception system that interprets the surroundings an... 详细信息
来源: 评论
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles
收藏 引用
China Communications 2023年 第3期20卷 69-85页
作者: Wenxian Jiang Mengjuan Chen Jun Tao School of Cyber Science and Engineering Southeast UniversityNanjing 211189China College of Computer Science and Technology Huaqiao UniversityXiamen 361021China Key Lab of CNII MOESoutheast UniversityNanjing 211189China Purple Mountain Laboratories:Networking Communications and Security Nanjing 211111China
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic ***,the main concerns have been raised about the security an... 详细信息
来源: 评论
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud  16
Volume Hiding Conjunctive Searchable Symmetric Encryption ov...
收藏 引用
16th International Conference on cyber-Enabled Distributed Computing and Knowledge Discover, cyberC 2024
作者: Deng, Qinghua Chen, Lanxiang Zhu, Yizhao Mu, Yi City University of Macau Faculty of Data Science 999078 China Hanshan Normal University School of Computer and Information Engineering Chaozhou521041 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China
Symmetric searchable encryption (SSE) is crucial for promoting cloud storage. It enables users to encrypt private data and outsource it to untrusted servers while retaining query capabilities. To prevent the cloud fro... 详细信息
来源: 评论
Enhanced Prediction of Swimmer Fitness Using Modified Resilient PSO Algorithm
收藏 引用
Transactions of the Indian National Academy of engineering 2024年 第4期9卷 903-915页
作者: Geetha Poornima, K. Krishna Prasad, K. Institute of Computer Science and Information Science Srinivas University Mangalore India Cyber Security and Cyber Forensics in the Institute of Engineering and Technology Srinivas University Mangalore India
Sports develop both physical and mental growth of an individual. In order to enhance the physical and mental health effectively and effortlessly, swimming is considered to be one of the healthier activities, in develo...
来源: 评论
A Payment Channel Network Fee Allocation Strategy Integrating Auction Theory
A Payment Channel Network Fee Allocation Strategy Integratin...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Zhang, Jingjing Xiao, Shanbin Wu, Weigang Zhou, Jieying Guangdong University of Foreign Studies School of Cyber Security Guangzhou China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China
The payment channel network is an auspicious approach to improve the blockchain scalability, by allowing multi-hop off-chain payments between any two nodes. Therefore, a good incentive mechanism is very important to e... 详细信息
来源: 评论
Knowledge-based recommendation with contrastive learning
收藏 引用
High-Confidence Computing 2023年 第4期3卷 41-46页
作者: Yang He Xu Zheng Rui Xu Ling Tian School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China Kash Institute of Electronics and Information Industry Kashgar 844199China China Electronic Technology Cyber Security Co. Ltd.Chengdu 610041China Cyberspace Security Key Laboratory of Sichuan Province Chengdu 610041China
Knowledge Graphs(KGs)have been incorporated as external information into recommendation systems to ensure the high-confidence ***,Contrastive Learning(CL)framework has been widely used in knowledge-based recommendatio... 详细信息
来源: 评论
Malicious Traffic Detection with Noise Labels Based on Cross-Modal Consistency
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第2期6卷 148-151页
作者: Yuan, Qingjun Niu, Weina Wang, Yongjuan Gou, Gaopeng Lu, Bin Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518110 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to b... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Mahdi, Ali Jafer Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq AI-Zahraa University for Women Department of Scientific Affairs Bangi43600 Malaysia College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Innovative grid technology leverages Information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home... 详细信息
来源: 评论