咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是2371-2380 订阅
排序:
TEAGS: Time-aware text embedding approach to generate subgraphs
arXiv
收藏 引用
arXiv 2019年
作者: Hosseini, Saeid Najafipour, Saeed Cheung, Ngai-Man Yin, Hongzhi Kangavari, Mohammad Reza Zhou, Xiaofang ST Electronics - SUTD Cyber Security Lab. Singapore University of Technology and Design Singapore School of Information Technology and Electrical Engineering University of Queensland Brisbane Australia Computational Cognitive Model Research Lab. School of Computer Engineering Iran University of Science and Technology Iran
Given a graph over which the contagions (e.g. virus, gossip) propagate, leveraging subgraphs with highly correlated nodes is beneficial to many applications. Yet, challenges abound. First, the propagation pattern betw... 详细信息
来源: 评论
Stance-In-Depth Deep Neural Approach to Stance Classification
收藏 引用
Procedia computer science 2018年 132卷 1646-1653页
作者: Gayathri Rajendran Bhadrachalam Chitturi Prabaharan Poornachandran Dept. of Computer Science and Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Amritapuri Kerala India Amrita Center for Cyber Security & Networks
Understanding the user intention from text is a problem of growing interest. The social media like Twitter, Facebook etc. extract user intention to analyze the behaviour of a user which in turn is employed for bot rec... 详细信息
来源: 评论
A blockchain-based framework for detecting malicious mobile applications in app stores
arXiv
收藏 引用
arXiv 2019年
作者: Homayoun, Sajad Dehghantanha, Ali Parizi, Reza M. Choo, Kim-Kwang Raymond Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran School of Computer Science University of Guelph Ontario Canada Department of Software Engineering Game Development Kennesaw State University MariettaGA30060 United States Department of Information Systems Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX78249 United States
The dramatic growth in smartphone malware shows that malicious program developers are shifting from traditional PC systems to smartphone devices. Therefore, security researchers are also moving towards proposing novel... 详细信息
来源: 评论
Automated verification of noninterference property  20th
Automated verification of noninterference property
收藏 引用
20th International Conference on Information and Communications security, ICICS 2018
作者: Zhang, Fan Zhang, Cong Xu, Mingdi Liu, Xiaoli Hu, Fangning Chao, HanChieh Mathematics and Computer Science School Wuhan Polytechnic University Wuhan China School of Computer Science and Electrical Engineering Jacobs University Bremen Bremen Germany Wuhan Digital and Engineering Institute Wuhan China College of Information Science and Technology/College of Cyber Security Jinan University Guangzhou510632 China Department of Electrical Engineering National Dong Hwa University Hualien Taiwan Department of Computer Science and Information Engineering National Ilan University Ilan Taiwan
Noninterference is an important information flow model that is widely applied in building secure information systems. Although the noninterference model itself has been thoroughly investigated, verifying the noninterf... 详细信息
来源: 评论
Model for efficient development of security audit criteria  17
Model for efficient development of security audit criteria
收藏 引用
17th European Conference on cyber Warfare and security, ECCWS 2018
作者: Kelo, Tomi Eronen, Juhani Rousku, Kimmo Department of Pervasive Computing Tampere University of Technology Finland Department of Computer Science and Engineering University of Oulu Finland National Cyber Security Centre Finland Finnish Communications Regulatory Authority Finland Population Register Centre Finland
cyber-attacks have grown in importance to become a matter of national security. A growing number of states and organisations around the world have been developing defensive and offensive capabilities for cyber warfare... 详细信息
来源: 评论
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection
arXiv
收藏 引用
arXiv 2019年
作者: Zhao, Lingchen Hu, Shengshan Wang, Qian Jiang, Jianlin Shen, Chao Luo, Xiangyang School of Cyber Science and Engineering Wuhan University Wuhan Hubei430072 China School of Computer Science Wuhan University Wuhan Hubei430072 China School of Cyberspace Security Xian Jiaotong University Xi’an Shaanxi710049 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450002 China
Collaborative learning allows multiple clients to train a joint model without sharing their data with each other. Each client performs training locally and then submits the model updates to a central server for aggreg... 详细信息
来源: 评论
Erratum to “Quantifying the need for supervised machine learning in conducting live forensics analysis of emergent configurations (ECO) in IoT environments” [Forensic Sci. Int.: Rep. 2 (2020) 100122]
收藏 引用
Forensic science International: Reports 2020年 2卷 100135-100135页
作者: Kebande, Victor R. Ikuesan, Richard A. Karie, Nickson M. Alawadi, Sadi Choo, Kim-Kwang Raymond Al-Dhaqm, Arafat Department of Computer Science Malmö University Sweden Cyber and Network Security Department Science and Technology Division Community College of Qatar Qatar School of Science Edith Cowan University Australia Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249-0631 USA School of Computing Faculty of Engineering Universiti Teknologi Malysia Johor Malaysia
来源: 评论
Relation Structure-Aware Heterogeneous Graph Neural Network
Relation Structure-Aware Heterogeneous Graph Neural Network
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Shichao Zhu Chuan Zhou Shirui Pan Xingquan Zhu Bin Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Faculty of Information Technology Monash University Melbourne Australia Dept. of Computer & Electrical Engineering and Computer Science Florida Atlantic University Boca Raton USA Xiaomi AI Lab Beijing China
Heterogeneous graphs with different types of nodes and edges are ubiquitous and have immense value in many applications. Existing works on modeling heterogeneous graphs usually follow the idea of splitting a heterogen...
来源: 评论
E-trade Management System Architecture
E-trade Management System Architecture
收藏 引用
IEEE International Conference on Advanced Trends in Information Theory (ATIT)
作者: Oleg Pursky Anna Selivanova Oleksander Kharchenko Pavlo Demidov Volodymyr Kulazhenko department of computer science Kyiv national university of trade and economics Kyiv Ukraine department of software engineering and cyber security Kyiv national university of trade and economics Kyiv Ukraine department of cybernetics and system analysis Kyiv national university of trade and economics Kyiv Ukraine
In this work we present the model for construction of e-trade management system architecture which consists of two basic blocks: the landing Web-pages management unit of the online store is responsible for interacting... 详细信息
来源: 评论
Coherence-based automated essay scoring using self-attention  17th
Coherence-based automated essay scoring using self-attention
收藏 引用
17th China National Conference on Computational Linguistics, CCL 2018 and 6th International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2018
作者: Li, Xia Chen, Minping Nie, Jianyun Liu, Zhenxing Feng, Ziheng Cai, Yingdan Key Laboratory of Language Engineering and Computing Guangdong University of Foreign Studies Guangzhou China School of Information Science and Technology/School of Cyber Security Guangdong University of Foreign Studies Guangzhou China Department of Computer Science and Operations Research University of Montreal Montreal Canada
Automated essay scoring aims to score an essay automatically without any human assistance. Traditional methods heavily rely on manual feature engineering, making it expensive to extract the features. Some recent studi... 详细信息
来源: 评论