咨询与建议

限定检索结果

文献类型

  • 2,990 篇 会议
  • 1,928 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 4,965 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,033 篇 工学
    • 2,441 篇 计算机科学与技术...
    • 2,011 篇 软件工程
    • 676 篇 信息与通信工程
    • 361 篇 控制科学与工程
    • 338 篇 电气工程
    • 293 篇 生物工程
    • 246 篇 网络空间安全
    • 205 篇 电子科学与技术(可...
    • 167 篇 机械工程
    • 138 篇 安全科学与工程
    • 128 篇 光学工程
    • 127 篇 生物医学工程(可授...
    • 101 篇 交通运输工程
    • 99 篇 化学工程与技术
    • 83 篇 建筑学
    • 82 篇 仪器科学与技术
  • 1,291 篇 理学
    • 681 篇 数学
    • 320 篇 物理学
    • 311 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 91 篇 化学
  • 769 篇 管理学
    • 443 篇 管理科学与工程(可...
    • 385 篇 图书情报与档案管...
    • 171 篇 工商管理
  • 214 篇 法学
    • 150 篇 社会学
    • 74 篇 法学
  • 129 篇 医学
    • 114 篇 临床医学
    • 103 篇 基础医学(可授医学...
  • 71 篇 经济学
    • 70 篇 应用经济学
  • 39 篇 军事学
  • 36 篇 教育学
  • 24 篇 农学
  • 16 篇 文学
  • 7 篇 艺术学

主题

  • 187 篇 feature extracti...
  • 147 篇 accuracy
  • 140 篇 security
  • 138 篇 semantics
  • 137 篇 training
  • 120 篇 deep learning
  • 116 篇 computational mo...
  • 111 篇 cryptography
  • 107 篇 privacy
  • 96 篇 data models
  • 95 篇 information secu...
  • 94 篇 machine learning
  • 93 篇 authentication
  • 85 篇 protocols
  • 80 篇 neural networks
  • 77 篇 internet of thin...
  • 72 篇 data privacy
  • 72 篇 federated learni...
  • 69 篇 servers
  • 68 篇 blockchain

机构

  • 218 篇 key laboratory o...
  • 199 篇 shandong provinc...
  • 193 篇 key laboratory o...
  • 116 篇 school of cyber ...
  • 92 篇 institute of inf...
  • 85 篇 institute of com...
  • 82 篇 school of comput...
  • 82 篇 key laboratory o...
  • 61 篇 school of comput...
  • 60 篇 department of pr...
  • 60 篇 guangdong provin...
  • 58 篇 information secu...
  • 53 篇 key laboratory o...
  • 51 篇 university of ch...
  • 51 篇 shandong fundame...
  • 49 篇 school of cyber ...
  • 48 篇 state key labora...
  • 45 篇 shandong enginee...
  • 45 篇 state key labora...
  • 44 篇 school of cyber ...

作者

  • 54 篇 ji donghong
  • 47 篇 i o zharinov
  • 44 篇 zhang huanguo
  • 44 篇 cao xiaochun
  • 43 篇 zheng wei-shi
  • 40 篇 guo li
  • 39 篇 a v shukalov
  • 35 篇 li fei
  • 35 篇 tang xiaohu
  • 33 篇 huang qingming
  • 32 篇 xie xiaohua
  • 31 篇 xu qianqian
  • 30 篇 hai jin
  • 29 篇 yichuan wang
  • 29 篇 jin hai
  • 29 篇 o o zharinov
  • 27 篇 wang lina
  • 25 篇 cheng xueqi
  • 25 篇 yang zhiyong
  • 25 篇 teng chong

语言

  • 4,681 篇 英文
  • 237 篇 其他
  • 50 篇 中文
  • 1 篇 德文
检索条件"机构=Computing and Security"
4965 条 记 录,以下是1-10 订阅
排序:
A dark web story in-depth research and study conducted on the dark web based on forensic computing and security in Malaysia
A dark web story in-depth research and study conducted on th...
收藏 引用
2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017
作者: Rafiuddin, Mohammed Farook Bin Minhas, Hamza Dhubb, Prethpal Singh Forensics Computing and Security Asia Pacific University Malaysia
The following is a research conducted on the Dark Web to study and identify the ins and outs of the dark web, what the dark web is all about, the various methods available to access the dark web and many others. The r... 详细信息
来源: 评论
Research on theory and key technology of trusted computing platform security testing and evaluation
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 434-453页
作者: ZHANG HuanGuo1,2, YAN Fei1,2, FU JianMing1,2, XU MingDi1,2, YANG Yang1,2, HE Fan1,2 & ZHAN Jing1,2 1School of Computer, Wuhan University, Wuhan 430072, China 2Key Laboratory of Aerospace Information security and Trusted computing, Ministry of Education, Wuhan 430072, China School of Computer Wuhan University Wuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China
Trusted computing has become a new trend in the area of international information security, and the products of trusted computing platform begin to be used in application. Users will not use the products of informatio... 详细信息
来源: 评论
Fairness is essential for robustness:fair adversarial training by identifying and augmenting hard examples
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 1-13页
作者: Ningping MOU Xinli YUE Lingchen ZHAO Qian WANG Key Laboratory of Aerospace Information Security and Trusted Computing(Ministry of Education) School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Adversarial training has been widely considered the most effective defense against adversarial ***,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,... 详细信息
来源: 评论
Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G Networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第2期27卷 748-781页
作者: Zhu, Xiaoqiang Liu, Jiqiang Lu, Lingyun Zhang, Tao Qiu, Tie Wang, Chunpeng Liu, Yuan Beijing Jiaotong University School of Software Engineering Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University College of Intelligence and Computing Tianjin300350 China Qilu University of Technology School of Cyber Security and the Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250353 China
The rapid growth of intelligent sensing capabilities and super computation power in 6G mobile communication systems has facilitated their application in diverse domains such as smart health, smart factories, and the i... 详细信息
来源: 评论
Explicitly Disentangling and Exclusively Fusing for Semi-Supervised Bi-Modal Salient Object Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第5期35卷 4479-4492页
作者: Wang, Jie Kong, Xiangji Yu, Nana Zhang, Zihao Han, Yahong Tianjin University College of Intelligence and Computing Tianjin300072 China Zhengzhou University School of Cyberspace Security Zhengzhou450001 China
Bi-modal (RGB-T and RGB-D) salient object detection (SOD) aims to enhance detection performance by leveraging the complementary information between modalities. While significant progress has been made, two major limit... 详细信息
来源: 评论
Three-in-One: Robust Enhanced Universal Transferable Anti-Facial Retrieval in Online Social Networks
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4408-4421页
作者: Lv, Yunna Tang, Long Ye, Dengpan Xie, Caiyun Deng, Jiacheng He, Yiheng Shen, Sipeng Wuhan University School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan430072 China
Deep hash-based retrieval techniques are widely used in facial retrieval systems to improve the efficiency of facial matching. However, it also carries the danger of exposing private information. Deep hash models are ... 详细信息
来源: 评论
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection
收藏 引用
ACM Transactions on Privacy and security 2025年 第2期28卷 1-32页
作者: Bostani, Hamid Zhao, Zhengyu Liu, Zhuoran Moonsamy, Veelasha Digital Security Group Institute for Computing and Information Sciences Radboud University Nijmegen Netherlands Faculty of Electronic and Information Engineering Xi'an Jiaotong University Xi'an China Horst Görtz Institute for It Security Ruhr University Bochum Bochum Germany
Machine Learning (ML) promises to enhance the efficacy of Android Malware Detection (AMD);however, ML models are vulnerable to realistic evasion attacks - crafting realizable Adversarial Examples (AEs) that satisfy An... 详细信息
来源: 评论
Diffusion Model with Multi-layer Wavelet Transform for Low-Light Image Enhancement
Diffusion Model with Multi-layer Wavelet Transform for Low-L...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jin, Haiyan Wang, Jing Zuo, Fengyuan Su, Haonan Xiao, Zhaolin Wang, Bin Zhang, Yuanlin Xi'an University of Technology 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology 710048 China
Low-light image enhancement methods based on diffusion models, though effective in improving image quality, often overrely on noise sensitivity and neglect the reconstruction deviations due to the naive up- and down-s... 详细信息
来源: 评论
Efficient Multi-Keyword Searchable and Verifiable Data Sharing for Cloud-Edge Collaboration Intelligent Transportation Systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15869-15882页
作者: Liu, Peng He, Qian Chen, Yiting Jiang, Shan Guilin University of Electronic Technology Department of Guangxi Key Laboratory of Cryptograph and Information Security Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptograph and Information Security Guilin541004 China The Hong Kong Polytechnic University Department of Computing Hong Kong
Intelligent transportation systems (ITS) are essential for the development of future smart cities. They can improve traffic management, mitigate urban congestion, and provide extensive social services by disseminating... 详细信息
来源: 评论
FlexFL: Flexible and Effective Fault Localization with Open-Source Large Language Models
收藏 引用
IEEE Transactions on Software Engineering 2025年 第5期51卷 1455-1471页
作者: Xu, Chuyang Liu, Zhongxin Ren, Xiaoxue Zhang, Gehao Liang, Ming Lo, David Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Ant Group China Singapore Management University School of Computing and Information Systems 188065 Singapore
Fault localization (FL) targets identifying bug locations within a software system, which can enhance debugging efficiency and improve software quality. Due to the impressive code comprehension ability of Large Langua... 详细信息
来源: 评论