咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是1801-1810 订阅
排序:
SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS
SwiftFabric: Optimizing Fabric Private Data Transaction Flow...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Mingxuan Li Dongdong Huo Chao Liu Han Wang Yazhe Wang Yu Wang Ping Zou Yandong Li Zhen Xu Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Beijing Aerospace Smart Manufacturing Technology Development Co. Ltd Beijing China
As permissioned chain technology is getting more and more important in blockchain technology, Hyperledger Fabric-one of its representative-has received extensive attention. However, previous works just focused on plai... 详细信息
来源: 评论
An Acute Kidney Injury Prediction Model Based on Ensemble Learning Algorithm
An Acute Kidney Injury Prediction Model Based on Ensemble Le...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Yuan Wang Yake Wei Qin Wu Hao Yang Jingwei Li College of Computer Science and Information Engineering Tianjin University of Science and Technology Population and Precision Health Care (Tianjin) Ltd Center for Cyber Security University of Electronic Science and Technology of China Department of critical care medicine Sichuan University State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences
Acute Kidney Injury (AKI), a common disease in Intensive Care Unit (ICU) patients, is related to high cost, morbidity and mortality. The early prediction of AKI is critical for improving patients' outcome. However... 详细信息
来源: 评论
SLBot: A serverless botnet based on service flux  3
SLBot: A serverless botnet based on service flux
收藏 引用
3rd IEEE International Conference on Data Science in cyberspace, DSC 2018
作者: Wu, Di Fang, Binxing Yin, Jie Zhang, Fangjiao Cui, Xiang Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Cyberspace Institute of Advanced Technology Guangzhou University China Institute of Electronic and Information Engineering of UESTC in Guangdong China School of Cyberspace Security Beijing University of Posts and Telecommunications China
Today, botnet continue to be a significant threat to Internet, and is still responsible for most large scale cyber-attacks. An obvious strategy for preventing these activities is detecting Command-and-Control (C&C... 详细信息
来源: 评论
Erratum to:Recent Advances of Chimp Optimization Algorithm:Variants and Applications
收藏 引用
Journal of Bionic engineering 2024年 第3期21卷 1618-1618页
作者: Mohammad Sh.Daoud Mohammad Shehab Laith Abualigah Mohammad Alshinwan Mohamed Abd Elaziz Mohd Khaled Yousef Shambour Diego Oliva Mohammad A.Alia Raed Abu Zitar College of Engineering Al Ain University112612 Abu DhabiUnited Arab Emirates College of Computer Sciences and Informatics Amman Arab UniversityAmman 11953Jordan Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl Al-Bayt UniversityMafraq 25113Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman 19328Jordan MEU Research Unit Middle East UniversityAmman 11831Jordan Applied Science Research Center Applied Science Private UniversityAmman 11931Jordan School of Computer Sciences Universiti Sains Malaysia11800 Pulau PinangMalaysia Faculty of Information Technology Applied Science Private UniversityAmman 11931Jordan Department of Mathematics Faculty of ScienceZagazig UniversityZagazig 7120001Egypt The Custodian of the Two Holy Mosques Institute for Hajj and Umrah Research Umm Al-Qura UniversityMakkah 24382Saudi Arabia Depto.de Innovacio′n Basada en la Informacio′n y el Conocimiento Universidad de GuadalajaraCUCEI45129 GuadalajaraMexico Cyber Security Department Faculty of Science and Information TechnologyAl Zaytoonah University of JordanAmman 11733Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi38044 Abu DhabiUnited Arab Emirates School of Engineering and Technology Sunway University Malaysia27500 Petaling JayaMalaysia
Erratum to:J Bionic Eng https://***/10.1007/*** this article the statement in the Funding information section was incorrectly given as‘22UQU4361183DSR03’and should have read‘23UQU4361183DSR03’.
来源: 评论
Dense attention fluid network for salient object detection in optical remote sensing images
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Qijian Cong, Runmin Li, Chongyi Cheng, Ming-Ming Fang, Yuming Cao, Xiaochun Zhao, Yao Kwong, Sam The Department of Computer Science City University of Hong Kong Hong Kong The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The School of Computer Science and Engineering Nanyang Technological University Singapore The College of Computer Science Nankai University Tianjin300071 China School of Information Technology Jiangxi University of Finance and Economics NanchangJiangxi330032 China The State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
Despite the remarkable advances in visual saliency analysis for natural scene images (NSIs), salient object detection (SOD) for optical remote sensing images (RSIs) still remains an open and challenging problem. In th... 详细信息
来源: 评论
iShake: Imitation-Resistant Secure Pairing of Smart Devices via Shaking
iShake: Imitation-Resistant Secure Pairing of Smart Devices ...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Congcong Shi Lei Xie Chuyu Wang Peicheng Yang Yubo Song Sanglu Lu State Key Laboratory for Novel Software Technology Nanjing University State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute co. Ltd School of Cyber Science and Engineering Southeast University
In conventional device-to-device (D2D) communication through wireless channels, it is an essential demand to authenticate with each other and establish spontaneous secure connections among the smart devices. In this p... 详细信息
来源: 评论
Dynamical Interaction Between Information and Disease Spreading in Populations of Moving Agents
收藏 引用
Computers, Materials & Continua 2018年 第10期57卷 123-144页
作者: Lingling Xia Bo Song Zhengjun Jing Yurong Song Liang Zhang Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China College of Telecommunications and Information Engineering Nanjing University of Posts and TelecommunicationsNanjing210003China Global Big Data Technologies Centre University of Technology SydneySydney2007Australia College of Computer Engineering Jiangsu University of TechnologyChangzhou213001China College of Automation Nanjing University of Posts and TelecommunicationsNanjing210003China
Considering dynamical disease spreading network consisting of moving individuals,a new double-layer network is constructed,one where the information dissemination process takes place and the other where the dynamics o... 详细信息
来源: 评论
Symmetrical slot line with a dielectric insert in the slot  10
Symmetrical slot line with a dielectric insert in the slot
收藏 引用
10th All-Russian Conference on Irreversible Processes in Nature and technology
作者: Klyuev, S.B. Nefyodov, E.I. Potapov, A.A. RPC Istok 2A Vokzalnaya Str Fryazino Moscow Region141190 Russia Fryazino Branch of kotel'Nikov Institute of Radio Engineering and Electronics of RAS Vvedenskiy Sq. Fryazino Moscow Region1 141195 Russia Kotel'Nikov Institute of Radio Engineering and Electronics of RAS Mokhovaya St. Moscow125009 Russia College of Information Science and Technology / College of Cyber Security Guangzhou510632 China Cooperative Chinese-Russian Laboratory of Informational Technologies and Signals Fractal Processing Guangzhou510632 China
The electrodynamic properties of a symmetric slot line with a dielectric insert are investigated. A numerical analysis of the transmission line is performed using the finite element method. The dispersion matrix eleme... 详细信息
来源: 评论
Corrigendum to “A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography” CAEE, Volume 102, September 2022, 108205
收藏 引用
Computers and Electrical engineering 2022年 103卷
作者: Manjari Singh Rathore M. Poongodi Praneet Saurabh Umesh Kumar Lilhore Sami Bourouis Wajdi Alhakami Jude Osamor Mounir Hamdi Oriental Institute of Technology Bhopal Madhya Pradesh India Division of Information and Computing Technology College of Science and Engineering Hamad Bin Khalifa University Doha Qatar Mody University of Science and Technology Lakshmangarh Rajasthan India KIET Group of Institutions Delhi-NCR Ghaziabad Uttar Pradesh India Department of Information Technology College of Computers and Information Technology Taif University P.O. Box 11099 Taif 21944 Saudi Arabia Department of Cyber Security and Networks Glasgow Caledonian University Cowcaddens Road Glasgow Scotland G4 0BA United Kingdom
来源: 评论
GraphNAS: Graph neural architecture search with reinforcement learning
arXiv
收藏 引用
arXiv 2019年
作者: Gao, Yang Yang, Hong Zhang, Peng Zhou, Chuan Hu, Yue Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Centre for Artificial Intelligence University of Technology Sydney Australia Ant Financial Services Group Hangzhou China
Graph Neural Networks (GNNs) have been popularly used for analyzing non-Euclidean data such as social network data and biological data. Despite their success, the design of graph neural networks requires a lot of manu... 详细信息
来源: 评论