咨询与建议

限定检索结果

文献类型

  • 1,575 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,545 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,467 篇 工学
    • 1,207 篇 计算机科学与技术...
    • 1,020 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 594 篇 理学
    • 288 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 56 篇 化学
  • 388 篇 管理学
    • 233 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 120 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 96 篇 machine learning
  • 95 篇 security
  • 80 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 57 篇 predictive model...
  • 55 篇 support vector m...
  • 49 篇 artificial intel...
  • 49 篇 data models
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,084 篇 英文
  • 454 篇 其他
  • 15 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2545 条 记 录,以下是2431-2440 订阅
排序:
GRAAD: Group anonymous and accountable D2D communication in mobile networks
arXiv
收藏 引用
arXiv 2017年
作者: Hsu, Ruei-Hau Lee, Jemin Quek, Tony Q.S. Chen, Jyh-Cheng ITrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore487372 Singapore Department of Information and Communication Engineering Daegu Gyeongbuk Institute of Science and Technology 43016 Korea Republic of Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore487372 Singapore Department of Computer Science National Chiao Tung University 300 Taiwan
Device-to-Device (D2D) communication is mainly launched by the transmission requirements between devices for specific applications such as Proximity Services in Long-Term Evolution Advanced (LTE-A) networks, and each ... 详细信息
来源: 评论
Study on Demand Response of Residential Power Customer
Study on Demand Response of Residential Power Customer
收藏 引用
Workshop 7 2016
作者: Xiu Cao Haiyong Jiang Lei Huang Xueping Wang Xuqi Zhang School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model(MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electric... 详细信息
来源: 评论
HybridFlow: A lightweight control plane for hybrid SDN in enterprise networks
HybridFlow: A lightweight control plane for hybrid SDN in en...
收藏 引用
International Workshop on Quality of Service
作者: Siyuan Huang Jin Zhao Xin Wang School of Computer Science Fudan University Shanghai China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting... 详细信息
来源: 评论
Implementation of switching circuit models as transfer functions
Implementation of switching circuit models as transfer funct...
收藏 引用
International Symposium on Circuits and Systems
作者: David Kebo Houngninou Mitchell A Thornton Department of Computer Science and Engineering SMU Dallas Texas USA Darwin Deason Institute for Cyber Security SMU Dallas Texas USA
A transfer function is a mathematical function relating the output or response of a system to the input or stimulus. It is a concise mathematical model representing the input/output behavior of a system and is widely ... 详细信息
来源: 评论
Teaching test-drive development using Dojo
Journal of Computing Sciences in Colleges
收藏 引用
Journal of Computing sciences in Colleges 2017年 第4期32卷
作者: Young Lee Dhanunjaya Bhargavan Marepalli Jeong Yang Electrical Engineering and Computer Science Department Texas A&M University-Kingsville Computing and Cyber Security Department Texas A&M University-San Antonio
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a te...
来源: 评论
Fast shortest-path queries on large-scale graphs
Fast shortest-path queries on large-scale graphs
收藏 引用
International Conference on Network Protocols
作者: Qiongwen Xu Xu Zhang Jin Zhao Xin Wang Tilman Wolf School of Computer Science Fudan University China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China Department of Electrical and Computer Engineering University of Massachusetts Amherst USA
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN contr... 详细信息
来源: 评论
PRNU based source attribution with a collection of seam-carved images
PRNU based source attribution with a collection of seam-carv...
收藏 引用
IEEE International Conference on Image Processing
作者: Samet Taspinar Manoranjan Mohanty Nasır Memon Center for Cyber Security New York University Abu Dhabi UAE Department of Computer Science and Engineering New York University New York USA
Photo Response Non-Uniformity (PRNU) noise based source attribution is a well known technique to verify the source camera of an anonymous image or video. Researchers have proposed various counter measures to PRNU base... 详细信息
来源: 评论
Complexity analysis and comparison of test paths based on DSE
Complexity analysis and comparison of test paths based on DS...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Jiawen Lu Lizhi Cai Yang Zhang Keyi Hong Laboratory of Computer Software Testing & Evaluation Shanghai Development Center of Computer Software Technology Shanghai China School of Information Science & Engineering East China University of Science and Technology Shanghai China Cyber Security Department of Shanghai Public Security Bureau Shanghai China
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on D... 详细信息
来源: 评论
Study on Demand Response of Residential Power Customer
收藏 引用
Journal of Power and Energy engineering 2016年 第7期4卷 1-7页
作者: Xiu Cao Haiyong Jiang Lei Huang Xueping Wang Xuqi Zhang School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai China Xinneng Kaibo Industrial Co. Ltd. Shanghai China
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model (MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electri... 详细信息
来源: 评论
Source camera attribution using stabilized video
Source camera attribution using stabilized video
收藏 引用
IEEE International Workshop on Information Forensics and security (WIFS)
作者: Samet Taspinar Manoranjan Mohanty Nasir Memon Center for Cyber Security New York University Abu Dhabi Abu Dhabi UAE Department of Computer Science and Engineering New York University New York USA
Although PRNU (Photo Response Non-Uniformity)-based methods have been proposed to verify the source camera of a non-stabilized video, these methods may not be adequate for stabilized videos. The use of video stabiliza... 详细信息
来源: 评论