咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是191-200 订阅
排序:
A Lossless Relational Data Watermarking Scheme Based on Uneven Partitioning  20th
A Lossless Relational Data Watermarking Scheme Based on Une...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Xu, Wenhao Xian, Hequn College of Computer Science and Technology Qingdao University Qingdao266071 China Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing100085 China Cryptograph and Cyber Security Whampoa Institute Guangzhou510000 China
In modern relational databases, data security and integrity are crucial, particularly in large-scale, unevenly distributed big data environments. This paper proposes a lossless relational data watermarking scheme base... 详细信息
来源: 评论
An Industrial Robot Path Planning Method Based on Improved Whale Optimization Algorithm  1
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Huang, Peixin Dong, Chen Chen, Zhenyi Zhen, Zihang Jiang, Lei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fuzhou China Department of Computer Science and Engineering University of South Florida TampaFL33620 United States College of Computer and Cyber Security Fujian Normal University Fuzhou350007 China
With the development of technology, robots are gradually being used more and more widely in various fields. Industrial robots need to perform path planning in the course of their tasks, but there is still a lack of a ... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, Issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
PtrProxy:Efficient Code Re-Randomization on AArch64 Platform
收藏 引用
China Communications 2025年 第6期22卷 64-82页
作者: Luo Chenke Fu Jianming Ming Jiang Xie Mengfei Peng Guojun Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China Department of Computer Science Tulane UniversityNew OrleansLA 70118 USA
Memory-unsafe programming languages,such as C/C++,are often used to develop system programs,rendering the programs susceptible to a variety of memory corruption *** these threats,just-in-time return-oriented programmi... 详细信息
来源: 评论
Accurate segmentation based on heuristic shape attention for occlusal tooth on CBCT  11
Accurate segmentation based on heuristic shape attention for...
收藏 引用
11th International Conference on Information Technology: IoT and Smart City, ICIT 2023
作者: Cai, Jiancheng Zou, Zheng Wu, Yi Liu, Shijian Liao, Shenghui College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Computer Science and Mathematics Fujian University of Technology Fuzhou China School of Computer Science and Engineering Central South University Changsha China
Accurate occlusal tooth segmentation for dental CBCT is essential for traumatic occlusal force diagnosis. As tiny multi-objects, adhesion from surrounding touching would largely hinder the correct detection. Especiall... 详细信息
来源: 评论
AntiMal: an Approach of Malware Detection Employing Swin Transformer  13
AntiMal: an Approach of Malware Detection Employing Swin Tra...
收藏 引用
13th International Conference on Communication and Network security, ICCNS 2023
作者: Lyu, Chenxi Yao, Yinan Guo, Xiaodong Huang, Zihong Dong, Chen Zhang, Yuanyuan Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China Department of Computer Science and Engineering University of South Florida FL United States
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t... 详细信息
来源: 评论
Perception System of Autonomous Vehicles: Sophisticated Attacks, Defense Strategies, and Future Directions  15
Perception System of Autonomous Vehicles: Sophisticated Atta...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Neethu, M.R. Remyakrishnan, P. Mukesh, Sa Barath Kumar, J. Royal, Ala Manas Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore641112 India Amrita Vishwa Vidyapeetham TIFAC-CORE in Cyber Security Amrita School of Engineering Coimbatore641112 India
The advent of autonomous vehicles marks a significant milestone in the evolution of automotive technologies. Central to the operation of autonomous vehicles is the perception system that interprets the surroundings an... 详细信息
来源: 评论
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles
收藏 引用
China Communications 2023年 第3期20卷 69-85页
作者: Wenxian Jiang Mengjuan Chen Jun Tao School of Cyber Science and Engineering Southeast UniversityNanjing 211189China College of Computer Science and Technology Huaqiao UniversityXiamen 361021China Key Lab of CNII MOESoutheast UniversityNanjing 211189China Purple Mountain Laboratories:Networking Communications and Security Nanjing 211111China
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic ***,the main concerns have been raised about the security an... 详细信息
来源: 评论
A Payment Channel Network Fee Allocation Strategy Integrating Auction Theory
A Payment Channel Network Fee Allocation Strategy Integratin...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Zhang, Jingjing Xiao, Shanbin Wu, Weigang Zhou, Jieying Guangdong University of Foreign Studies School of Cyber Security Guangzhou China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China
The payment channel network is an auspicious approach to improve the blockchain scalability, by allowing multi-hop off-chain payments between any two nodes. Therefore, a good incentive mechanism is very important to e... 详细信息
来源: 评论
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud  16
Volume Hiding Conjunctive Searchable Symmetric Encryption ov...
收藏 引用
16th International Conference on cyber-Enabled Distributed Computing and Knowledge Discover, cyberC 2024
作者: Deng, Qinghua Chen, Lanxiang Zhu, Yizhao Mu, Yi City University of Macau Faculty of Data Science 999078 China Hanshan Normal University School of Computer and Information Engineering Chaozhou521041 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China
Symmetric searchable encryption (SSE) is crucial for promoting cloud storage. It enables users to encrypt private data and outsource it to untrusted servers while retaining query capabilities. To prevent the cloud fro... 详细信息
来源: 评论