咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是2361-2370 订阅
排序:
KT-store: A key-order and write-order hybrid key-value store with high write and range-query performance  1
收藏 引用
15th IFIP International Conference on Network and Parallel Computing, NPC 2018
作者: Wang, Haobo Yue, Yinliang He, Shuibing Wang, Weiping Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science Wuhan University Wuhan China
With the data volume increasing, key-value (KV) store plays an important role in today’s storage systems due to its flexible architecture and good scalability. There are two types of data organization in current KV s... 详细信息
来源: 评论
Understanding the Behavioral Differences Between American and German Users: A Data-Driven Study
收藏 引用
Big Data Mining and Analytics 2018年 第4期1卷 284-296页
作者: Chenxi Yang Yang Chen Qingyuan Gong Xinlei He Yu Xiao Yuhuan Huang Xiaoming Fu School of Computer Science Fudan UniversityShanghai 200433China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of EducationShanghai 200433China Department of Communications and Networking Aalto University02150 EspooFinland Faculty of European Languages and Cultures Guangdong University of Foreign StudiesGuangzhou 510420China Institute of Computer Science University of Gottingen37077 GottingenGermany
Given that the USA and Germany are the most populous countries in North America and Western Europe,understanding the behavioral differences between American and German users of online social networks is *** this work,... 详细信息
来源: 评论
SoulMate: Short-text author linking through Multi-aspect temporal-textual embedding
arXiv
收藏 引用
arXiv 2019年
作者: Najafipour, Saeed Hosseini, Saeid Hua, Wen Kangavari, Mohammad Reza Zhou, Xiaofang Computational Cognitive Model Research Lab School of Computer Engineering Iran University of Science and Technology Iran Cyber Security Lab. Singapore University of Technology and Design Singapore School of Information Technology and Electrical Engineering University of Queensland Brisbane Australia
Linking authors of short-text contents has important usages in many applications, including Named Entity Recognition (NER) and human community detection. However, certain challenges lie ahead. Firstly, the input short... 详细信息
来源: 评论
Improved upper bounds on the hermite and KZ constants
arXiv
收藏 引用
arXiv 2019年
作者: Wen, Jinming Chang, Xiao-Wen Weng, Jian College of Information Science and Technology College of Cyber Security Jinan University Guangzhou510632 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 School of Computer Science McGill University MontrealH3A 0E9 Canada
The Korkine-Zolotareff (KZ) reduction is a widely used lattice reduction strategy in communications and cryptography. The Hermite constant, which is a vital constant of lattice, has many applications, such as bounding...
来源: 评论
Backscatter-Aided Hybrid Data Offloading for Wireless Powered Edge Sensor Networks
Backscatter-Aided Hybrid Data Offloading for Wireless Powere...
收藏 引用
IEEE Global Communications Conference
作者: Yuze Zou Jing Xu Shimin Gong Yuanxiong Guo Dusit Niyato Wenqing Cheng School of Computer Science and Engineering Nanyang Technological University Singapore School of Electronic Information and Communications Huazhong University of Science and Technology China School of Intelligent Systems Engineering Sun Yat-sen University China Department of Information Systems and Cyber Security University of Texas San Antonio USA
In this paper, we consider a backscatter-aided hybrid data offloading scheme for a batteryless wireless sensor network. All sensor devices on the edge are coordinated by a hybrid access point (HAP), while also provide... 详细信息
来源: 评论
Integrating privacy enhancing techniques into blockchains using sidechains
arXiv
收藏 引用
arXiv 2019年
作者: Parizi, Reza M. Homayoun, Sajad Yazdinejad, Abbas Dehghantanha, Ali Choo, Kim-Kwang Raymond Department of Software Engineering and Game Development Kennesaw State University GA United States Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran Faculty of Computer Engineering University of Isfahan School of Computer Science University of Guelph ON Canada Department of Information Systems and Cyber Security University of Texas San AntonioTX United States
Blockchains are turning into decentralized computing platforms and are getting worldwide recognition for their unique advantages. There is an emerging trend beyond payments that blockchains could enable a new breed of... 详细信息
来源: 评论
cyber-security internals of a skoda octavia vRS: A hands on approach
arXiv
收藏 引用
arXiv 2019年
作者: Urquhart, Colin Bellekens, Xavier Tachtatzis, Christos Atkinson, Robert Seeam, Amar Hindy, Hanan Abertay University Division of Cyber-Security Dundee United Kingdom University of Strathclyde Dept. Electronic and Electrical Engineering Glasgow United Kingdom Middlesex University Dept. Computer Science Uniciti Flic-en-Flac Mauritius
The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit... 详细信息
来源: 评论
General linear group action on tensors: A candidate for post-quantum cryptography
arXiv
收藏 引用
arXiv 2019年
作者: Ji, Zhengfeng Qiao, Youming Song, Fang Yun, Aaram Centre for Quantum Software and Information School of Software Faculty of Engineering and Information Technology University of Technology SydneyNSW Australia Department of Computer Science and Engineering Texas A&M University Texas United States Department of Cyber Security Division of Software Science and Engineering Ewha Womans University Seoul Korea Republic of
Starting from the one-way group action framework of Brassard and Yung (Crypto'90), we revisit building cryptography based on group actions. Several previous candidates for one-way group actions no longer stand, du... 详细信息
来源: 评论
Building an efficient intrusion detection system based on feature selection and ensemble classifier
arXiv
收藏 引用
arXiv 2019年
作者: Zhou, Yuyang Cheng, Guang Jiang, Shanqing Dai, Mian School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Jiangsu Provincial Key Laboratory of Computer Network Technology Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsup... 详细信息
来源: 评论
Distortion-free watermarking scheme for compressed data in columnar database  15
Distortion-free watermarking scheme for compressed data in c...
收藏 引用
15th International Joint Conference on e-Business and Telecommunications, ICETE 2018
作者: Yaqub, Waheeb Kamel, Ibrahim Aung, Zeyar Center for Cyber Security New York University Abu Dhabi United Arab Emirates Department of Electrical and Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science Khalifa University of Science and Technology Masdar Institute Abu Dhabi United Arab Emirates
Digital watermarking is an effective technique for protecting various databases against data copyright infringement, piracy, and data tampering in the columnar database. Increasing deployments of various database syst... 详细信息
来源: 评论