咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是2421-2430 订阅
排序:
Seeing isn’t believing: Towards more robust adversarial attack against real world object detectors
arXiv
收藏 引用
arXiv 2018年
作者: Zhao, Yue Zhu, Hong Liang, Ruigang Shen, Qintao Zhang, Shengzhi Chen, Kai SKLOIS Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Department of Computer Science Metropolitan College Boston University United States
Recently Adversarial Examples (AEs) that deceive deep learning models have been a topic of intense research interest. Compared with the AEs in the digital space, the physical adversarial attack is considered as a more... 详细信息
来源: 评论
Cluster-Aware Kronecker Supported Data Collection for Sensory Data
Cluster-Aware Kronecker Supported Data Collection for Sensor...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Siguang Chen Zhihao Wang Kewei Sha Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and Telecommunications Nanjing China Department of Computer Science & Cyber Security Institute University of Houston-Clear Lake Houston TX
Although current proposed compression schemes achieve a better performance compared with traditional data compression schemes, they have not fully exploited the spatial and temporal correlations among the data. Well-d... 详细信息
来源: 评论
Contract-Based Content Delivery in 5G Converged Networks
收藏 引用
China Communications 2017年 第12期14卷 120-133页
作者: Xiaoyuan Lu Yiqing Li Xiaoying Gan Yanwei Xu Jun Yao School of Computer Science Fudan University Shanghai China Dept. of Electronics Engineering Shanghai Jiao Tong University Shanghai 200240 China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China Shanghai Engineering Research Center for Broadband Technologies & Applications China Philips Lighting Research China
Mobile broadcasting services provided by converged networks do aid in satisfying users' demands for popular multimedia content while unicasting services offer personalized experiences for *** analyze hybrid broadc... 详细信息
来源: 评论
Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks
arXiv
收藏 引用
arXiv 2018年
作者: Epiphaniou, Gregory Karadimas, Petros Ismail, Dhouha Kbaier Ben Al-Khateeb, Haider Dehghantanha, Ali Choo, Kim-Kwang Raymond School of Computer Science and Technology University of Bedfordshire United Kingdom School of Engineering University of Glasgow Scotland United Kingdom School of Computer Science and Engineering University of Salford United Kingdom Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX United States
—The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in physical-layer key agreement, non... 详细信息
来源: 评论
Gated fusion network for single image dehazing
arXiv
收藏 引用
arXiv 2018年
作者: Ren, Wenqi Ma, Lin Zhang, Jiawei Pan, Jinshan Cao, Xiaochun Liu, Wei Yang, Ming-Hsuan IIE Cas Tencent Ai Lab City University of Hong Kong Nanjing University of Science and Technology School of Cyber Security University of Chinese Academy of Sciences University of California Electrical Engineering and Computer Science Merced United States
In this paper, we propose an efficient algorithm to directly restore a clear image from a hazy input. The proposed algorithm hinges on an end-to-end trainable neural network that consists of an encoder and a decoder. ... 详细信息
来源: 评论
MCP: A multi-component learning machine to predict protein secondary structure
arXiv
收藏 引用
arXiv 2018年
作者: Khalatbari, Leila Kangavari, M.R. Hosseini, Saeid Yin, Hongzhi Cheung, Ngai-Man School of Computer Engineering Iran University of Science and Technology Tehran Iran ST Electronics SUTD Cyber Security Laboratory Singapore University of Technology and Design Singapore School of Information Technology and Electrical Engineering University of Queensland Brisbane Australia
The Gene or DNA sequence in every cell does not control genetic prop-erties on its own Rather, this is done through translation of DNA into protein and subsequent formation of a certain 3D structure. The biological fu... 详细信息
来源: 评论
Towards a cyber defense framework for SCADA systems based on power consumption monitoring  50
Towards a cyber defense framework for SCADA systems based on...
收藏 引用
50th Annual Hawaii International Conference on System sciences, HICSS 2017
作者: Hernández, Jarilyn M. Chen, Qian Calhoun, Chelsea Sykes, Summer Nichols, Jerey A. Lane Dept. of Computer Science and Electrical Engineering West Virginia University United States Department of Engineering Computer Science Technology Savannah State University Cyber and Information Security Research Group Oak Ridge National Laboratory
Supervisory control and data acquisition (SCADA) systems are industrial automation systems that remotely monitor and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attacke... 详细信息
来源: 评论
IoTChain: A three-tier blockchain-based IoT security architecture
arXiv
收藏 引用
arXiv 2018年
作者: Bao, Zijian Shi, Wenbo He, Debiao Choo, Kim-Kwang Raymond Department of Computer Science and Engineering Northeastern University Shenyang China School of Computer and Communication Engineering Northeastern University Qinhuangdao China State Key Lab of Software Engineering Computer School Wuhan University Wuhan China Department of Information Systems and Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX78249 United States
There has been increasing interest in the potential of blockchain in enhancing the security of devices and systems, such as Internet of Things (IoT). In this paper, we present a blockchain-based IoT security architect... 详细信息
来源: 评论
CBEAT: Chrome Browser Extension Analysis Tool  5th
CBEAT: Chrome Browser Extension Analysis Tool
收藏 引用
5th International Symposium on security in Computing and Communications, SSCC 2017
作者: Roy, Sudakshina Singha Jevitha, K.P. TIFAC CORE in Cyber Security Amrita School of Engineering Coimbatore India Amrita Vishwa Vidyapeetham Amrita University Coimbatore India Department of Computer Science and Engineering Amrita School of Engineering Coimbatore India
With exponential increased usage of browser extensions for smooth and effortless browsing experience, preventing exposure of user’s private and sensitive data for malicious intent becomes a perpetual challenging task... 详细信息
来源: 评论
A Blockchain-based Architecture Framework for Secure Sharing of Personal Health Data
A Blockchain-based Architecture Framework for Secure Sharing...
收藏 引用
International Conference on e-health Networking, Applications and Services (HealthCom)
作者: Sandro Amofa Emmanuel Boateng Sifah Kwame O.-B Obour Agyekum Smahi Abla Qi Xia James C. Gee Jianbin Gao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China Department of Radiology University of Pennsylvania Philadelphia USA School of Resource and Enviroment University of Electronic Science and Technology of China
Health information exchanges have been popular for some time with their advantages known and widely researched. In spite of their utility in increasing provider efficiency and decreasing administrative costs, one chal... 详细信息
来源: 评论