咨询与建议

限定检索结果

文献类型

  • 1,266 篇 会议
  • 618 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,066 篇 工学
    • 874 篇 计算机科学与技术...
    • 738 篇 软件工程
    • 278 篇 信息与通信工程
    • 173 篇 控制科学与工程
    • 135 篇 电气工程
    • 109 篇 生物工程
    • 100 篇 网络空间安全
    • 94 篇 电子科学与技术(可...
    • 68 篇 机械工程
    • 65 篇 安全科学与工程
    • 57 篇 化学工程与技术
    • 54 篇 交通运输工程
    • 50 篇 生物医学工程(可授...
    • 47 篇 仪器科学与技术
    • 44 篇 光学工程
    • 38 篇 建筑学
    • 35 篇 动力工程及工程热...
  • 440 篇 理学
    • 213 篇 数学
    • 115 篇 生物学
    • 97 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 62 篇 化学
    • 49 篇 系统科学
  • 283 篇 管理学
    • 169 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 法学
    • 64 篇 社会学
  • 52 篇 医学
    • 42 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 33 篇 经济学
    • 33 篇 应用经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 117 篇 accuracy
  • 93 篇 feature extracti...
  • 89 篇 deep learning
  • 82 篇 security
  • 77 篇 real-time system...
  • 70 篇 training
  • 66 篇 machine learning
  • 65 篇 computational mo...
  • 61 篇 internet of thin...
  • 51 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 47 篇 convolutional ne...
  • 39 篇 support vector m...
  • 37 篇 protocols
  • 37 篇 data models
  • 33 篇 neural networks
  • 33 篇 optimization
  • 31 篇 artificial intel...
  • 31 篇 adaptation model...

机构

  • 517 篇 school of cyber ...
  • 392 篇 institute of inf...
  • 67 篇 state key labora...
  • 52 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 37 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 cyberspace insti...
  • 30 篇 school of comput...
  • 28 篇 institute of inf...
  • 27 篇 university of ch...
  • 26 篇 institute of com...
  • 24 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 school of cyber ...
  • 19 篇 peng cheng labor...
  • 18 篇 department of cy...

作者

  • 54 篇 cao xiaochun
  • 29 篇 xu qianqian
  • 27 篇 huang qingming
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 20 篇 hu songlin
  • 19 篇 yang zhiyong
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,535 篇 英文
  • 348 篇 其他
  • 11 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1889 条 记 录,以下是91-100 订阅
排序:
A Novel Scoring Algorithm Against HID Attacks Based on Static Text Feature Matching  1
收藏 引用
6th International Conference on Science of cyber security, SciSec 2024
作者: Li, Haiyang Lv, Zhiqiang Zhang, Yixin Xue, Yanan Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China North Automatic Control Technology Institute Taiyuan China
In recent years, the proliferation of HID attacks has raised significant security concerns. Previous research has primarily focused on detecting these attacks by analyzing behavior features extracted from keystroke ti... 详细信息
来源: 评论
CACluster: A Clustering Approach for IoT Attack Activities Based on Contextual Analysis  29
CACluster: A Clustering Approach for IoT Attack Activities B...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Yang, Huiran Zhang, Yan Dai, Yueyue Sun, Jiyan Cui, Huajun Ma, Can Wang, Weiping Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan China
Attacks against IoT have shown a rapid increase in both quantity and complexity. Analysts must handle massive alerts and determine the type of attack manually. In addition, the same attack activity may present polymor... 详细信息
来源: 评论
Query in Your Tongue: Reinforce Large Language Models with Retrievers for Cross-lingual Search Generative Experience  24
Query in Your Tongue: Reinforce Large Language Models with R...
收藏 引用
33rd ACM Web Conference, WWW 2024
作者: Guo, Ping Hu, Yue Cao, Yanan Ren, Yubing Li, Yunpeng Huang, Heyan Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Haidian Beijing China Beijing Institute of Technology Haidian Beijing China
In the contemporary digital landscape, search engines play an invaluable role in information access, yet they often face challenges in Cross-Lingual Information Retrieval (CLIR). Though attempts are made to improve CL... 详细信息
来源: 评论
Differential Fault Analysis on 3DES Middle Rounds Based on Error Propagation
收藏 引用
Chinese Journal of Electronics 2022年 第1期31卷 68-78页
作者: MA Xiangliang ZHANG Lizhen WU Liji LI Xia ZHANG Xiangmin LI Bing LIU Yuling School of Integrated Circuits Tsinghua University Beijing National Research Center for Information Science and Technology National Research Center for Information Technology Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Since differential fault analysis(DFA)was first implemented on data encryption standard(DES), many scholars have improved this attack and extended the limit of the original last two rounds to the earlier rounds. Howev... 详细信息
来源: 评论
Unidirectional Encrypted Traffic Classification: A Survey  5
Unidirectional Encrypted Traffic Classification: A Survey
收藏 引用
5th Asia-Pacific Conference on Image Processing, Electronics and Computers, IPEC 2024
作者: Yang, Chen Gu, Zheyuan Wei, Yuhao Xiong, Gang Gou, Gaopeng Yao, Shan Yu, Yang Institute of Information Engineering University of Chinese Academy of Sciences Chinese Academy of Sciences School of Cyber Security Beijing China 360 Digital Security Technology Group Co. Ltd Beijing China
Techniques for classifying encrypted traffic typically rely on learning the interaction patterns between communicating parties to determine the traffic category. However, with the widespread application of asymmetric ... 详细信息
来源: 评论
Low Latency Implementations of CRYSTALS-Dilithium for Cloud Applications  25
Low Latency Implementations of CRYSTALS-Dilithium for Cloud ...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Chen, Ya-Nan Gaol, Yiwen Liu, Yuejun Zhou, Yongbin School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
This paper studies GPU-based implementations of CRYSTALS-Dilithium (Dilithium) algorithm, which is one of four post-quantum algorithms that NIST has standardized. We focus on the scenarios of batch processing and expl... 详细信息
来源: 评论
NFVDC: A flexible and efficient NFV platform for dynamic service chaining  22
NFVDC: A flexible and efficient NFV platform for dynamic ser...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lu, Qiuwen Liu, Qingyun Fang, Binxing Chinese Academy of Sciences Institute of Information Engineering Beijing China National Engineering Research Center of Information Security Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Harbin Institute of Technology Shenzhen China
This paper presents the design and implementation of a novel Network Function Virtualization (NFV) platform, NFVDC, specifically for dynamic service chaining. Unlike traditional service chaining methods, NFVDC support... 详细信息
来源: 评论
Multi-omics Sampling-based Graph Transformer for Synthetic Lethality Prediction
Multi-omics Sampling-based Graph Transformer for Synthetic L...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhao, Xusheng Liu, Hao Dai, Qiong Peng, Hao Bai, Xu Peng, Huailiang Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Beihang University School of Cyber Science and Technology Beijing China
Synthetic lethality (SL) prediction is used to identify if the co-mutation of two genes results in cell death. The prevalent strategy is to abstract SL prediction as an edge classification task on gene nodes within SL... 详细信息
来源: 评论
Multiclass Brain Tumor Detection using Convolutional Neural Network and Conventional Machine Learning  2
Multiclass Brain Tumor Detection using Convolutional Neural ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational Science, ICERCS 2024
作者: Vidhya, K. Vamsi Krishna, B. Haritha, M. Rajasekaran, Arun Sekar Roopa Chandrika, R. Velusamy, Jayaraj Karunya Institute of Technology and Sciences Division of Data Science and Cyber Security School of Computer Science and Technology Coimbatore India QIS College of Engineering and Technology Department of AIMLDS Andhra Pradesh India QIS College of Engineering and Technology Department of Mechanical Engineering Andhra Pradesh India SR University Department of Electronics and Communication Engineering Telangana India Karpagam Academy of Higher Education Department of Cyber Security Coimbatore India Nehru Institute of Engineering and Technology Department of Electronics and Communication Engineering Coimbatore India
Brain tumor (BT) affect the brain and reduce the lifespan of humans. Therefore, diagnosis and treatment of illnesses in its early stage is required. The objective of this paper is to evaluate the effectiveness of the ... 详细信息
来源: 评论
Cloud Based AIVR Training System for Emergency Rescue  12
Cloud Based AIVR Training System for Emergency Rescue
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Dong, Meiya Zhu, Biaokai Zhao, Jumin Song, Jie School of Computer Science Peking University Beijing China Suzhou Industrial Technology Institute Zhejiang University Suzhou China Cyber Security Shanxi Police College China College of Information and Optical Engineering Taiyuan University of Technology Taiyuan China Cyber security Intelligent Policing Key Laboratory of Sichuan Province Luzhou China
This paper mainly discusses the current situation and existing problems of training exercises in emergency medicial scenarios, as well as the importance and necessity of developing an AI training system for emergency ... 详细信息
来源: 评论