咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2411-2420 订阅
排序:
A Visualization Method Based on Graph Database in security Logs Analysis
A Visualization Method Based on Graph Database in Security L...
收藏 引用
2017 6th International Conference on Advanced Materials and computer science(ICAMCS 2017)
作者: Xinyu Tang Chunguang Ma Min Yu Chao Liu College of Computer Science and Technology Harbin Engineering University Institution of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Network security logs can provide evidence for forensic investigators. However, the network logs are facing the problems of high repetition rate, high false alarm rate, uniform format and so on, which make it difficul... 详细信息
来源: 评论
Video deblurring via semantic segmentation and pixel-wise non-linear kernel
arXiv
收藏 引用
arXiv 2017年
作者: Ren, Wenqi Pan, Jinshan Cao, Xiaochun Yang, Ming-Hsuan IIE CAS Tencent AI Lab School of Computer Science and Engineering Nanjing University of Science and Technology School of Cyber Security University of Chinese Academy of Sciences Electrical Engineering and Computer Science University of California Merced United States
Video deblurring is a challenging problem as the blur is complex and usually caused by the combination of camera shakes, object motions, and depth variations. Optical flow can be used for kernel estimation since it pr... 详细信息
来源: 评论
Information Leakage in Encrypted Deduplication via Frequency Analysis
Information Leakage in Encrypted Deduplication via Frequency...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jingwei Li Chuan Qin Patrick P. C. Lee Xiaosong Zhang University of Electronic Science and Technology of China Chengdu CN Department of Computer Science and Engineering The Chinese University of Hong Kong Center for Cyber Security University of Electronic Science and Technology of China
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a determinist... 详细信息
来源: 评论
Detecting Malicious PDF Files Using Semi-Supervised Learning Method
Detecting Malicious PDF Files Using Semi-Supervised Learning...
收藏 引用
2017 5th International Conference on Advanced computer science Applications and Technologies(ACSAT 2017)
作者: Di Feng Min Yu Yongjian Wang Chao Liu Chunguang Ma Institution of Information Engineering Chinese Academy of Sciences College of Computer Science and Technology Harbin Engineering University School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Information Network Security of Ministry of Public Security the Third Research Institute of Ministry of Public Security
With the increase in popularity of Portable Document Format(PDF) documents and increasing vulnerability of PDF users, effective detection of malicious PDF documents has become as a more and more significant issue. In ... 详细信息
来源: 评论
Coherence-based Automated Essay Scoring using Self-Attention
Coherence-based Automated Essay Scoring using Self-Attention
收藏 引用
第十七届全国计算语言学学术会议暨第六届基于自然标注大数据的自然语言处理国际学术研讨会(CCL 2018)
作者: Xia Li Minping Chen Jianyun Nie Zhenxing Liu Ziheng Feng Yingdan Cai Key Laboratory of Language Engineering and Computing Guangdong university of foreign studies Guangzh School of Information Science and Technology/School of Cyber Security Guangdong university of foreig Department of Computer Science and Operations Research University of montreal MontrealCanada
Automated essay scoring aims to score an essay automatically without any human *** methods heavily rely on manual feature engi-neering,making it expensive to extract the *** recent studies used neural-network-based sc... 详细信息
来源: 评论
Preface
Advances in Intelligent Systems and Computing
收藏 引用
Advances in Intelligent Systems and Computing 2019年 842卷 v-vi页
作者: Abawajy, Jemal Choo, Kim-Kwang Raymond Islam, Rafiqul Xu, Zheng Atiquzzaman, Mohammed Faculty of Science Engineering and Built Environment Deakin University Geelong GeelongVIC Australia Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX United States School of Computing and Mathematics Charles Sturt University AlburyNSW Australia Shanghai University Shanghai Shi China School of Computer Science University of Oklahoma NormanOK United States
来源: 评论
Three Layer Game Theoretic Decision Framework for cyber-Investment and cyber-Insurance  8th
Three Layer Game Theoretic Decision Framework for Cyber-Inve...
收藏 引用
8th International Conference on Decision and Game Theory for security, GameSec 2017
作者: Tosh, Deepak K. Vakilinia, Iman Shetty, Sachin Sengupta, Shamik Kamhoua, Charles A. Njilla, Laurent Kwiat, Kevin Department of Computer Science Norfolk State University NorfolkVA United States Department of Computer Science and Engineering University of Nevada RenoNV United States Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Network Security Branch Army Research Laboratory AdelphiMD United States Cyber Assurance Branch Air Force Research Laboratory RomeNY United States
cyber-threat landscape has become highly complex, due to which isolated attempts to understand, detect, and resolve cybersecurity issues are not feasible in making a time constrained decisions. Introduction of cyber-t... 详细信息
来源: 评论
Hierarchical bloom filter trees for approximate matching
arXiv
收藏 引用
arXiv 2017年
作者: Lillis, David Breitinger, Frank Scanlon, Mark Forensics and Security Research Group School of Computer Science University College Dublin Cyber Forensics Research and Education Group Tagliatela College of Engineering University of New Haven
Bytewise approximate matching algorithms have in recent years shown significant promise in detecting files that are similar at the byte level. This is very useful for digital forensic investigators, who are regularly ... 详细信息
来源: 评论
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
On the design of a secure user authentication and key agreem...
收藏 引用
作者: Kumari, Saru Das, Ashok Kumar Wazid, Mohammad Li, Xiong Wu, Fan Choo, Kim-Kwang Raymond Khan, Muhammad Khurram Department of Mathematics Chaudhary Charan Singh University MeerutUttar Pradesh250 005 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411 201 China Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science and Engineering Xiamen Institute of Technology Xiamen361021 China Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Computer Science China University of Geosciences Wuhan China School of Information Technology & Mathematical Sciences University of South Australia AdelaideSA Australia Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
A wireless sensor network (WSN) typically consists of a large number of resource-constrained sensor nodes and several control or gateway nodes. Ensuring the security of the asymmetric nature of WSN is challenging, and... 详细信息
来源: 评论
A robust authentication protocol with privacy protection for wireless sensor networks
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2017年 10155 LNCS卷 30-44页
作者: Li, Xiong Niu, Jianwei Raymond Choo, Kim-Kwang School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing100191 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
As a typical application of Internet of Things (IoT), wireless sensor networks (WSNs) have been widely used in many fields, such as remote healthcare, to gather data of monitoring area. However, due to open nature of ... 详细信息
来源: 评论