咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2381-2390 订阅
排序:
Adding Continuous Proactive Forensics to Android  5th
Adding Continuous Proactive Forensics to Android
收藏 引用
5th International Symposium on security in Computing and Communications, SSCC 2017
作者: Rao, Karthik M. Aiyyappan, P.S. Mateti, Prabhaker TIFAC-CORE in Cyber Security Amrita Vishwa Vidyapeetham EttimadaiTN641105 India Department of Computer Science and Engineering Wright State University DaytonOH45435 United States
Criminals and terrorists have become good at using the smartphones. The traditional reactive forensics responds only after an incident. Smartphone OS should include proactive forensics support (pfs), that deals with p... 详细信息
来源: 评论
Automatic feature construction for network intrusion detection  11th
Automatic feature construction for network intrusion detecti...
收藏 引用
11th International Conference on Simulated Evolution and Learning, SEAL 2017
作者: Tran, Binh Picek, Stjepan Xue, Bing School of Engineering and Computer Science Victoria University of Wellington 600 Wellington6140 New Zealand Cyber Security Research Group Delft University of Technology Mekelweg 2 Delft Netherlands
The notion of cyberspace became impossible to separate from the notions of cyber threat and cyberattack. Since cyberattacks are getting easier to run, they are also becoming more serious threats from the economic dama... 详细信息
来源: 评论
Modeling Multi-turn conversation with deep utterance aggregation
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Zhuosheng Li, Jiangtong Zhu, Pengfei Zhao, Hai Liu, Gongshen Department of Computer Science and Engineering Shanghai Jiao Tong University Key Lab. of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University Shanghai200240 College of Zhiyuan Shanghai Jiao Tong University School of Cyber Security Shanghai Jiao Tong University School of Computer Science and Software Engineering East China Normal University
Multi-turn conversation understanding is a major challenge for building intelligent dialogue systems. This work focuses on retrieval-based response matching for multi-turn conversation whose related work simply concat... 详细信息
来源: 评论
Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities
arXiv
收藏 引用
arXiv 2018年
作者: Guan, Zhitao Si, Guanlin Zhang, Xiaosong Wu, Longfei Guizani, Nadra Du, Xiaojiang Ma, Yinglong School of Control and Computer Engineering North China Electric Power University Beijing102206 China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China Department of mathematics and Computer Science Fayetteville State University FayettevilleNC United States School of Electrical and Computer Engineering Purdue University West LafayetteIN United States Department of Computer and Information Sciences Temple University PhiladelphiaPA United States
Intelligence is one of the most important aspects in the development of our future communities. Ranging from smart home, smart building, to smart city, all these smart infrastructures must be supported by intelligent ... 详细信息
来源: 评论
URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls
URefFlow: A Unified Android Malware Detection Model Based on...
收藏 引用
IEEE International Performance Computing and Communications Conference
作者: Chao Liu Jianan Li Min Yu Gang Li Bo Luo Kai Chen Jianguo Jiang Weiqing Huang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Information Technology Deakin University VIC Australia Department of Electrical Engineering and Computer Science University of Kansas Lawrence Kansas City USA
In Android malware detection, sensitive data-flows provide more accurate information on the application's behavior than regular features such as signatures and permissions. Currently, Android static taint analysis... 详细信息
来源: 评论
Cryptanalysis of two strongly unforgeable identity-based signatures in the standard model
收藏 引用
International Journal of Network security 2018年 第6期20卷 1194-1199页
作者: Yang, Wenjie Chen, Min-Rong Zeng, Guo-Qiang College of Cyber Security College of Information Science and Technology Jinan University China School of Computer South China Normal University Guangzhou510631 China National-Local Joint Engineering Laboratory of Digitalize Electrical Design Technology Wenzhou University China
The strong unforgeability of digital signature means that no attacker can forge a valid signature on a message, even given some previous signatures on the message, which has been widely accepted as a common security r... 详细信息
来源: 评论
Privacy-preserving mobile crowdsensing for located-based applications
Privacy-preserving mobile crowdsensing for located-based app...
收藏 引用
2017 IEEE International Conference on Communications, ICC 2017
作者: Ni, Jianbing Zhang, Kuan Lin, Xiaodong Xia, Qi Shen, Xuemin Sherman Department of Electrical and Computer Engineering University of Waterloo Canada Faculty of Business and Information Technology University of Ontario Institute of Technology Canada Center of Cyber Security University of Electronic Science and Technology of China China
Mobile crowdsensing is a new paradigm which explores the mobility and intelligence of mobile users to collect high-quality data from social events and phenomena for conducting complex sensing tasks. Nevertheless, priv... 详细信息
来源: 评论
Political corporate governance of ICT: Essential for national service delivery and security  16
Political corporate governance of ICT: Essential for nationa...
收藏 引用
16th European Conference on cyber Warfare and security, ECCWS 2017
作者: Van Der Walt, Tersia Von Solms, Sebastiaan Centre for Cyber Security Academy for Computer Science and Software Engineering University of Johannesburg South Africa Government Chief Information Office Department of Public Service and Administration South African Government South Africa
In any developing country, delivering of proper services to the people of the country, on a national level by the incumbent Government, is crucial to the social and economic development and stability and security of t... 详细信息
来源: 评论
CommanderSong: A systematic approach for practical adversarial voice recognition
arXiv
收藏 引用
arXiv 2018年
作者: Yuan, Xuejing Chen, Yuxuan Zhao, Yue Long, Yunhui Liu, Xiaokang Chen, Kai Zhang, Shengzhi Huang, Heqing Wang, XiaoFeng Gunter, Carl A. SKLOIS Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Department of Computer Science Florida Institute of Technology United States Department of Computer Science University of Illinois at Urbana-Champaign United States Department of Computer Science Metropolitan College Boston University United States School of Informatics and Computing Indiana University Bloomington United States
The popularity of automatic speech recognition (ASR) systems, like Google Assistant, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since... 详细信息
来源: 评论
CloudMe forensics: A case of big-data investigation
arXiv
收藏 引用
arXiv 2018年
作者: Teing, Yee-Yang Dehghantanha, Ali Choo, Kim-Kwang Raymond Department of Computer Science Faculty of Computer Science and Technology Universiti Putra Malaysia Serdang Selangor43400 Malaysia School of Computing Science and Engineering University of Salford Salford Greater ManchesterM5 4WT United Kingdom Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
—The issue of increasing volume, variety and velocity of has been an area of concern in cloud forensics. The high volume of data will, at some point, become computationally exhaustive to be fully extracted and analys... 详细信息
来源: 评论