咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是2461-2470 订阅
排序:
Greening cloud-enabled big data Storage forensics: Syncany as a case study
arXiv
收藏 引用
arXiv 2018年
作者: Teing, Yee-Yang Dehghantanha, Ali Choo, Kim-Kwang Raymond Abdullah, Mohd Taufik Muda, Zaiton Department of Computer Science Faculty of Computer Science and Technology Universiti Putra Malaysia Serdang Selangor43400 Malaysia School of Computing Science and Engineering University of Salford Salford Greater ManchesterM5 4WT United Kingdom Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States Information Assurance Research Group University of South Australia AdelaideSA5001 Australia
—The pervasive nature of cloud-enabled big data storage solutions introduces new challenges in the identification, collection, analysis, preservation and archiving of digital evidences. Investigation of such complex ... 详细信息
来源: 评论
V-Chain: A Blockchain-Based Car Lease Platform
V-Chain: A Blockchain-Based Car Lease Platform
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Kwame O.-B Obour Agyekum Qi Xia Emmanuel Boateng Sifah Sandro Amofa Kingsley Nketia Acheampong Jianbin Gao Ruidong Chen Hu Xia James C. Gee Xiaojiang Du Mohsen Guizani School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Resource and Environment University of Electronic Science and Technology of China Chengdu China Mr. Ray Co. Ltd. Chengdu and with Youe Data Co. Ltd. Beijing China School of Computer Science and Engineering Chengdu and Youe Data Co. Ltd. Beijing China Department of Radiology University of Pennsylvania Chengdu Philadelphia PA China Department of Computer and Information Sciences Temple University Philadelphia PA USA Electrical and Computer Engineering Department University of Idaho Moscow USA
Significant improvements have been made in the way several businesses are conducted due to the influx of blockchain technology, which is a paradigm shift in research these days. Because of the several benefits this te... 详细信息
来源: 评论
MBSA: a lightweight and flexible storage architecture for virtual machines
MBSA: a lightweight and flexible storage architecture for vi...
收藏 引用
作者: Chen, Xian Chen, Wenzhi Lu, Zhongyong Zhang, Yu Chang, Rui Hassan, Mohammad Mehedi Alelaiwi, Abdulhameed Xiang, Yang College of Computer Science and Technology Zhejiang University Hangzhou China State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia Centre for Cyber Security Research Deakin University BurwoodVIC Australia
With the advantages of extremely high access speed, low energy consumption, nonvolatility, and byte addressability, nonvolatile memory (NVM) device has already been setting off a revolution in storage field. Conventio... 详细信息
来源: 评论
Closed-form word error rate analysis for successive interference cancellation decoders
arXiv
收藏 引用
arXiv 2018年
作者: Wen, Jinming Wu, Keyu Tellambura, Chintha Fan, Pingzhi College of Information Science and Technology College of Cyber Security Jinan University Guangzhou510632 China School of Electronic Science National University of Defense Technology Changsha410073 China Department of Electrical and Computer Engineering University of Alberta EdmontonT6G 2V4 Canada Institute of Mobile Communications Southwest Jiaotong University Chengdu610031 China
We consider the estimation of an integer vector x^ ∈ Zn from the linear observation y = Ax^ + v, where A ∈ Rm×n is a random matrix with independent and identically distributed (i.i.d.) standard Gaussian N (0, 1... 详细信息
来源: 评论
Concolic Execution on Small-Size Binaries: Challenges and Empirical Study
Concolic Execution on Small-Size Binaries: Challenges and Em...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Hui Xu Yangfan Zhou Yu Kang Michael R. Lyu Dept. of Computer Science The Chinese University of Hong Kong School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China
Concolic execution has achieved great success in many binary analysis tasks. However, it is still not a primary option for industrial usage. A well-known reason is that concolic execution cannot scale up to large-size... 详细信息
来源: 评论
Mobile Social Network Forensic Analysis Based on Visualization Method
Mobile Social Network Forensic Analysis Based on Visualizati...
收藏 引用
2017 6th International Conference on Advanced Materials and computer science(ICAMCS 2017)
作者: Jiating Li Chunguang Ma Min Yu Chao Liu College of Computer Science and Technology Harbin Engineering University Institution of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Nowadays, so much personal information is stored in the mobile phone, especially in mobile social network. Due to the large amount of data in the mobile phone, it is very difficult to extract and analyze the evidence ... 详细信息
来源: 评论
A Visualization Method Based on Graph Database in security Logs Analysis
A Visualization Method Based on Graph Database in Security L...
收藏 引用
2017 6th International Conference on Advanced Materials and computer science(ICAMCS 2017)
作者: Xinyu Tang Chunguang Ma Min Yu Chao Liu College of Computer Science and Technology Harbin Engineering University Institution of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Network security logs can provide evidence for forensic investigators. However, the network logs are facing the problems of high repetition rate, high false alarm rate, uniform format and so on, which make it difficul... 详细信息
来源: 评论
Video deblurring via semantic segmentation and pixel-wise non-linear kernel
arXiv
收藏 引用
arXiv 2017年
作者: Ren, Wenqi Pan, Jinshan Cao, Xiaochun Yang, Ming-Hsuan IIE CAS Tencent AI Lab School of Computer Science and Engineering Nanjing University of Science and Technology School of Cyber Security University of Chinese Academy of Sciences Electrical Engineering and Computer Science University of California Merced United States
Video deblurring is a challenging problem as the blur is complex and usually caused by the combination of camera shakes, object motions, and depth variations. Optical flow can be used for kernel estimation since it pr... 详细信息
来源: 评论
Information Leakage in Encrypted Deduplication via Frequency Analysis
Information Leakage in Encrypted Deduplication via Frequency...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jingwei Li Chuan Qin Patrick P. C. Lee Xiaosong Zhang University of Electronic Science and Technology of China Chengdu CN Department of Computer Science and Engineering The Chinese University of Hong Kong Center for Cyber Security University of Electronic Science and Technology of China
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a determinist... 详细信息
来源: 评论
Detecting Malicious PDF Files Using Semi-Supervised Learning Method
Detecting Malicious PDF Files Using Semi-Supervised Learning...
收藏 引用
2017 5th International Conference on Advanced computer science Applications and Technologies(ACSAT 2017)
作者: Di Feng Min Yu Yongjian Wang Chao Liu Chunguang Ma Institution of Information Engineering Chinese Academy of Sciences College of Computer Science and Technology Harbin Engineering University School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Information Network Security of Ministry of Public Security the Third Research Institute of Ministry of Public Security
With the increase in popularity of Portable Document Format(PDF) documents and increasing vulnerability of PDF users, effective detection of malicious PDF documents has become as a more and more significant issue. In ... 详细信息
来源: 评论