咨询与建议

限定检索结果

文献类型

  • 1,617 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,252 篇 计算机科学与技术...
    • 1,047 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 608 篇 理学
    • 298 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 60 篇 化学
  • 413 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 127 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 101 篇 machine learning
  • 98 篇 security
  • 83 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 60 篇 predictive model...
  • 58 篇 support vector m...
  • 50 篇 artificial intel...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 47 篇 convolutional ne...
  • 44 篇 reliability
  • 44 篇 semantics
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,929 篇 英文
  • 666 篇 其他
  • 17 篇 中文
检索条件"机构=Computer Science and Engineering with Specialization in Cyber Security"
2602 条 记 录,以下是311-320 订阅
排序:
NEST: Strong Key-Insulated Password-Based Shared-Custodial Blockchain Wallets  20th
NEST: Strong Key-Insulated Password-Based Shared-Custodial B...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Gao, Birou Zhang, Rui Xiao, Yuting Zou, Huan Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Technology Dongguan University of Technology Guangdong China Information Security Center China Mobile Communication Corporation Beijing China
Blockchain wallets protect users’ assets by securely storing keys. Research has explored various aspects, including BIP32 for key derivation in cold/hot settings and PDPKS further enhancing key insulation. However, m... 详细信息
来源: 评论
security and Threat Detection through Cloud-Based Wazuh Deployment  1
Security and Threat Detection through Cloud-Based Wazuh Depl...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Moiz, Syed Majid, Abdul Basit, Abdul Ebrahim, Mansoor Abro, Abdul Ahad Naeem, Mehwish Iqra University Dept. of Computer Science Karachi Pakistan Dept. of Cyber Security Karachi Pakistan Indus University Dept. of Computer Science Karachi Pakistan Iqra University Dept. of Software Engineering Karachi Pakistan University Libre de Bruxelles Brussels Belgium
In today's interconnected business landscape, security is the cornerstone of all organizations, irrespective of their size or industry. This research emphasizes the critical need to safeguard organizational assets... 详细信息
来源: 评论
Deep Learning Cost-Effective Evaluation Metrics
Deep Learning Cost-Effective Evaluation Metrics
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Zhao, Jian Zhao, Zisong Shi, Lijuan Kuang, Zhejun Wang, Runmin Li, Haixia College of Cyber Security Changchun University Changchun China College of Electronic Information Engineering Changchun University Changchun China College of Computer Science and Technology Changchun University Changchun China
Deep learning has been a driving force behind recent breakthroughs in artificial intelligence. In particular, neural networks have shown great promise in handling a wide range of tasks. With the improvement of perform... 详细信息
来源: 评论
The mass,fake news,and cognition security
收藏 引用
Frontiers of computer science 2021年 第3期15卷 1-13页
作者: Bin GUO Yasan DING Yueheng SUN Shuai MA Ke LI Zhiwen YU School of Computer Science Northwestern Polytechnical UniversityXi'an 710072China School of Cyber Security Tianjin UniversityTianjin 300350China School of Computer Science and Engineering Beihang UniversityBeijing 100191China
The widespread fake news in social networks is posing threats to social stability,economic development,and political democracy,*** studies have explored the effective detection approaches of online fake news,while few... 详细信息
来源: 评论
ML-assisted security for Anomaly Detection in Industrial IoT (IIoT) Applications  2
ML-assisted Security for Anomaly Detection in Industrial IoT...
收藏 引用
2nd International Conference on Smart Technologies for Smart Nation, SmartTechCon 2023
作者: Konatham, Bharath Reedy Simra, Tabassum Ghimire, Ashutosh Amsaad, Fathi Ibrahem, Mohamed I. Jhanjhi, N.Z. Department of Computer Science and Engineering Wright State University DaytonOH United States Department of Cyber Security Engineering George Mason University FairfaxVA United States School of Computer Science SCS Taylor’s University Subang Jaya47500 Malaysia
The industrial Internet of Things (IIoT) uses intelligent sensors and actuators, etc., to facilitate the application of IoT in different industries. This paper presents a comparative analysis using several machine lea... 详细信息
来源: 评论
Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates  24
Forward and Backward Private Searchable Symmetric Encryption...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Yin, Zhiming Li, Xiong Choo, Kim-Kwang Raymond Liu, Yuzhen Liang, Wei School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249-0631 United States
In dynamic searchable symmetric encryption, clients can search and update encrypted data stored on the server (assumed to be semi-honest). In such schemes, forward privacy guarantees that prior queries are not related... 详细信息
来源: 评论
Blockchain-Enabled DNS: Enhancing security and Mitigating Attacks in Domain Name Systems  6
Blockchain-Enabled DNS: Enhancing Security and Mitigating At...
收藏 引用
6th International Conference on Signal Processing and Information security, ICSPIS 2023
作者: Shah, Kaushal Padhya, Mukti Sharma, Sachin Pandit DeenDayal Energy University School of Technology Department of Computer Science and Engineering Gandhinagar India National Forensic Sciences University School of Cyber Security and Digital Forensics Gandhinagar India
The importance of Internet security is increasing as businesses expand through digitalization. Like in the physical world, data transmitted over the Internet must be safeguarded to ensure confidentiality, integrity, a... 详细信息
来源: 评论
Machine Learning for Climate Change Impact Assessment and Adaptation Planning  2
Machine Learning for Climate Change Impact Assessment and Ad...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Balakrishnan, T. Suresh Krishnan, Prabhakar Ebenezar, U. Samson Mohammed Nizarudeen, M. Kamal, N. Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri-Campus India Saveetha Institute of Medical and Technical Sciences Saveetha University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Care College of Engineering Department of Computer Science and Engineering Tamil Nadu Trichy India Grt Institute of Engineering and Technology Dept. of Computer Science and Engineering Tamil Nadu Tiruttani India
The presented research introduces a new advanced data analytics methodology for climate change impact assessment and adaptive planning that utilizes machine learning and deep-learning techniques. Quantitative analysis... 详细信息
来源: 评论
Guarding Voices, Protecting Homes: A Comprehensive Case Study on Voice Assistant security in Smart Living  12
Guarding Voices, Protecting Homes: A Comprehensive Case Stud...
收藏 引用
12th International Symposium on Digital Forensics and security, ISDFS 2024
作者: Rehman, Fazalur Hashmi, Joudat Abdullah, Moiz Zaman, Hafsah School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan College of Engineering Georgia Tech University Department of Analytics United States Air University Faculty of Computing and Artificial Intelligence Department of Cyber Security Islamabad Pakistan
The evolution of technologies in the last decades has transformed the whole human interaction experience with the digital world. Integrated into users' home voice assistant devices has rationalized personal intera... 详细信息
来源: 评论
Predicting the Prices of the Used Cars using Machine Learning for Resale
Predicting the Prices of the Used Cars using Machine Learnin...
收藏 引用
IEEE Students' Conference on Electrical, Electronics and computer science (SCEECS)
作者: B Hemendiran P N Renjith Department of Computer Science and Engineering specialization in Cyber physical Systems VIT University Chennai Department of Computer Science and Engineering VIT University Chennai India
In this paper, we discuss the use of machine learning models that can accurately forecast the price of a used car based on its attributes and features. In this study, we look at applying supervised machine learning mo... 详细信息
来源: 评论