咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2401-2410 订阅
排序:
Structural transition in interdependent networks with regular interconnections
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Xiangrong Kooij, Robert E. Moreno, Yamir van Mieghem, Piet Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands iTrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore Singapore University of Zaragoza Zaragoza50009 Spain Department of Theoretical Physics University of Zaragoza Zaragoza50009 Spain ISI Foundation Turin Italy
Networks are often made up of several layers that exhibit diverse degrees of interdependencies. A multilayer interdependent network consists of a set of graphs G that are interconnected through a weighted interconnect... 详细信息
来源: 评论
Matrix Factorization Recommendation Algorithm Based on User Characteristics
Matrix Factorization Recommendation Algorithm Based on User ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Hongtao Liu Ouyang Mao Chen Long Xueyan Liu Zhenjia Zhu School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Economics and Management Chongqing University of Posts and Telecommunications Chongqing China School of Software Engineering Shenzhen Institute of Information Technology Shenzhen China
Matrix Factorization is a popular and successful method. It is already a common model method for collaborative filtering in recommendation systems. As most of the scoring matrix is sparse and the dimensions are increa... 详细信息
来源: 评论
Effective Similarity Measures of Collaborative Filtering Recommendations Based on User Ratings Habits
Effective Similarity Measures of Collaborative Filtering Rec...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Hongtao Liu Lulu Guo Long Chen Xueyan Liu Zhenjia Zhu School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Economics and Management Chongqing University of Posts and Telecommunications Chongqing China School of Software Engineering Shenzhen Institute of Information Technology Shenzhen China
The core of the recommendation system is the recommendation algorithm, especially the application of collaborative filtering recommendation algorithm is the most widely used. With the rapid increase of data sparsity. ... 详细信息
来源: 评论
Low-resolution face recognition in the wild via selective knowledge distillation
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Shiming Zhao, Shengwei Li, Chenyu Li, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security at University of Chinese Academy of Sciences China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China
Typically, the deployment of face recognition models in the wild needs to identify low-resolution faces with extremely low computational cost. To address this problem, a feasible solution is compressing a complex face... 详细信息
来源: 评论
Greening cloud-enabled big data Storage forensics: Syncany as a case study
arXiv
收藏 引用
arXiv 2018年
作者: Teing, Yee-Yang Dehghantanha, Ali Choo, Kim-Kwang Raymond Abdullah, Mohd Taufik Muda, Zaiton Department of Computer Science Faculty of Computer Science and Technology Universiti Putra Malaysia Serdang Selangor43400 Malaysia School of Computing Science and Engineering University of Salford Salford Greater ManchesterM5 4WT United Kingdom Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States Information Assurance Research Group University of South Australia AdelaideSA5001 Australia
—The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences. Investigation of such complex ... 详细信息
来源: 评论
V-Chain: A Blockchain-Based Car Lease Platform
V-Chain: A Blockchain-Based Car Lease Platform
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Kwame O.-B Obour Agyekum Qi Xia Emmanuel Boateng Sifah Sandro Amofa Kingsley Nketia Acheampong Jianbin Gao Ruidong Chen Hu Xia James C. Gee Xiaojiang Du Mohsen Guizani School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Resource and Environment University of Electronic Science and Technology of China Chengdu China Mr. Ray Co. Ltd. Chengdu and with Youe Data Co. Ltd. Beijing China School of Computer Science and Engineering Chengdu and Youe Data Co. Ltd. Beijing China Department of Radiology University of Pennsylvania Chengdu Philadelphia PA China Department of Computer and Information Sciences Temple University Philadelphia PA USA Electrical and Computer Engineering Department University of Idaho Moscow USA
Significant improvements have been made in the way several businesses are conducted due to the influx of blockchain technology, which is a paradigm shift in research these days. Because of the several benefits this te... 详细信息
来源: 评论
MBSA: a lightweight and flexible storage architecture for virtual machines
MBSA: a lightweight and flexible storage architecture for vi...
收藏 引用
作者: Chen, Xian Chen, Wenzhi Lu, Zhongyong Zhang, Yu Chang, Rui Hassan, Mohammad Mehedi Alelaiwi, Abdulhameed Xiang, Yang College of Computer Science and Technology Zhejiang University Hangzhou China State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia Centre for Cyber Security Research Deakin University BurwoodVIC Australia
With the advantages of extremely high access speed, low energy consumption, nonvolatility, and byte addressability, nonvolatile memory (NVM) device has already been setting off a revolution in storage field. Conventio... 详细信息
来源: 评论
Closed-form word error rate analysis for successive interference cancellation decoders
arXiv
收藏 引用
arXiv 2018年
作者: Wen, Jinming Wu, Keyu Tellambura, Chintha Fan, Pingzhi College of Information Science and Technology College of Cyber Security Jinan University Guangzhou510632 China School of Electronic Science National University of Defense Technology Changsha410073 China Department of Electrical and Computer Engineering University of Alberta EdmontonT6G 2V4 Canada Institute of Mobile Communications Southwest Jiaotong University Chengdu610031 China
We consider the estimation of an integer vector x^ ∈ Zn from the linear observation y = Ax^ + v, where A ∈ Rm×n is a random matrix with independent and identically distributed (i.i.d.) standard Gaussian N (0, 1... 详细信息
来源: 评论
Concolic Execution on Small-Size Binaries: Challenges and Empirical Study
Concolic Execution on Small-Size Binaries: Challenges and Em...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Hui Xu Yangfan Zhou Yu Kang Michael R. Lyu Dept. of Computer Science The Chinese University of Hong Kong School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China
Concolic execution has achieved great success in many binary analysis tasks. However, it is still not a primary option for industrial usage. A well-known reason is that concolic execution cannot scale up to large-size... 详细信息
来源: 评论
Mobile Social Network Forensic Analysis Based on Visualization Method
Mobile Social Network Forensic Analysis Based on Visualizati...
收藏 引用
2017 6th International Conference on Advanced Materials and computer science(ICAMCS 2017)
作者: Jiating Li Chunguang Ma Min Yu Chao Liu College of Computer Science and Technology Harbin Engineering University Institution of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Nowadays, so much personal information is stored in the mobile phone, especially in mobile social network. Due to the large amount of data in the mobile phone, it is very difficult to extract and analyze the evidence ... 详细信息
来源: 评论