咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2391-2400 订阅
排序:
Stop annoying me! an empirical investigation of the usability of app privacy notifications  17
Stop annoying me! an empirical investigation of the usabilit...
收藏 引用
29th Australian computer-Human Interaction Conference, OzCHI 2017
作者: Micallef, Nicholas Just, Mike Baillie, Lynne Alharby, Maher Australian Centre for Cyber Security School of Engineering and Information Technology University of New South Wales Canberra Australia School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh United Kingdom College of Computer Science and Engineering Taibah University Medina Saudi Arabia
Privacy nudges are a "soft-paternalistic" method to nudge (instead of force) users to make more informed privacy decisions. While previous work has shown that privacy nudges are effective in encouraging user... 详细信息
来源: 评论
Full disclosure attack on ultralightweight mutual authentication protocol: Sasi  10
Full disclosure attack on ultralightweight mutual authentica...
收藏 引用
10th International Conference on Chaotic Modeling and Simulation, CHAOS 2017
作者: Aamir, Rizwan Khan, Liaquat Ali Mujahid, Umar Najam-Ul-Islam, M. Department of Computer Science Bahria University Islamabad Pakistan Department of Avionics Engineering Air University Islamabad Pakistan Department of Cyber Security Gwinnett-Tech Georgia United States Department of Electrical Engineering Bahria University Islamabad Pakistan
RFID is one of the most growing identification schemes in the field of ubiquitous computing. Unique identification and non-line of sight capabilities result in rapid deployment of this technology as compared to other ... 详细信息
来源: 评论
cyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction
CyberPDF: Smart and Secure Coordinate-based Automated Health...
收藏 引用
IEEE International Conference on Connected Health: Applications, Systems and engineering Technologies (CHASE)
作者: Reza M. Parizi Liang Guo Yao Bian Amin Azmoodeh Ali Dehghantanha Kim-Kwang Raymond Choo Department of Software Engineering and Game Development Kennesaw State University Marietta GA USA NYC New York Institute of Technology NY USA Department of Computer Science & Engineering Shiraz University Shiraz Iran Department of Computer Science & Engineering Shiraz University Shiraz Iran Shiraz University Shiraz Fars IR Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio Texas USA
Data extraction from files is a prevalent activity in today's electronic health record systems which can be laborious. When document analysis is repetitive (e.g., processing a series of files with the same layout ... 详细信息
来源: 评论
Persistent fault analysis on block ciphers
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2018年 第3期2018卷 150-172页
作者: Zhang, Fan Lou, Xiaoxuan Zhao, Xinjie Bhasin, Shivam He, Wei Ding, Ruyi Qureshi, Samiya Ren, Kui College of Information Science and Electronic Engineering Zhejiang University China Institute of Cyber Security Research Zhejiang University China College of Computer Science and Technology Zhejiang University China The Institute of North Electronic Equipment China Nanyang Technological University Singapore Shield Laboratory Huawei International Pte. Ltd Singapore Georgia Institute of Technology GA United States
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is propos... 详细信息
来源: 评论
Anomaly Detection Based on PMF Encoding and Adversarially Learned Inference
收藏 引用
Journal of Physics: Conference Series 2019年 第5期1187卷
作者: Lin Zhang Wentai Yang Hua Gan Meng Li Xiaoming Wang Gang Liang Chengdu City Electric Power Engineering Design Company Chengdu Sichuan 610065 China College of Computer Science Sichuan University Chengdu Sichuan 610065 China College of Cyber-security Sichuan University Chengdu Sichuan 610065 China
In order to solve the problem of increasing the dimension and sparse feature space caused by the categorization coding method in the existing abnormal traffic detection problem, a coding method based on Probability Ma...
来源: 评论
Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing
arXiv
收藏 引用
arXiv 2018年
作者: Ni, Jianbing Zhang, Kuan Xia, Qi Lin, Xiaodong Shen, Xuemin [Sherman] Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L3G1 Canada Department of Electrical and Computer Engineering University of Nebraska-Lincoln OmahaNE68182 United States Department of Physics and Computer Science Wilfrid Laurier University WaterlooONN2L3C5 Canada Center of Cyber Security University of Electronic Science and Technology of China Chengdu611731 China
Mobile crowdsensing engages a crowd of individuals to use their mobile devices to cooperatively collect data about social events and phenomena for special interest customers. It can reduce the cost on sensor deploymen... 详细信息
来源: 评论
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
arXiv
收藏 引用
arXiv 2018年
作者: Zhou, Wei Jia, Yan Yao, Yao Zhu, Lipeng Guan, Le Mao, Yuhang Liu, Peng Zhang, Yuqing National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China School of Cyber Engineering Xidian University China Department of Computer Science University of Georgia United States College of Information Sciences and Technology Pennsylvania State University United States State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
A smart home connects tens of home devices to the Internet, where an IoT cloud runs various home automation applications. While bringing unprecedented convenience and accessibility, it also introduces various security... 详细信息
来源: 评论
CollabLoc: Privacy-preserving multi-modal localization via collaborative information fusion
arXiv
收藏 引用
arXiv 2017年
作者: Sadhu, Vidyasagar Pompili, Dario Zonouz, Saman Sritapan, Vincent Department of Electrical and Computer Engineering Cyber Security Division Rutgers University Department of Homeland Security Science & Technology Directorate
Mobile phones provide an excellent opportunity for building context-aware applications. In particular, location-based services are important context-aware services that are more and more used for enforcing security po... 详细信息
来源: 评论
CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion
CollabLoc: Privacy-Preserving Multi-Modal Localization via C...
收藏 引用
International Conference on computer Communication and Networks
作者: Vidyasagar Sadhu Dario Pompili Saman Zonouz Vincent Sritapan Department of Electrical and Computer Engineering Rutgers University Cyber Security Division Department of Homeland Security Science & Technology Directorate
Mobile phones provide an excellent opportunity for building context-aware applications. In particular, location-based services are important context-aware services that are more and more used for enforcing security po... 详细信息
来源: 评论
An Extended Exploration to the Epidemic Containment Game
An Extended Exploration to the Epidemic Containment Game
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Jia-Hao Xu Zhen Wang Guang-Hai Cui Yi-Zhi Ren Hong Ding Kim-Kwang Raymond Choo School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China School of Cyberspace Hangzhou Dianzi University Hangzhou China School of Information and Electrical Engineering Ludong University Yantai China Department of Information Systems and Cyber Security The University of Texas at San Antonio San Antonio TX USA
The epidemic containment game is a formulation to describe voluntary vaccination behaviors before epidemic spreading. This game relies on the characterization of the susceptible-infected- susceptible (SIS) model in te... 详细信息
来源: 评论