咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是1831-1840 订阅
排序:
New security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications
New Security Attack and Defense Mechanisms Based on Negative...
收藏 引用
第一届网络空间安全科学国际会议(The 1st International Conference on Science of cyber security-SciSec 2018)
作者: Yexia Cheng Yuejin Du Jin Peng Shen He Jun Fu Baoxu Liu Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Secur Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Secur Department of Security Technology China Mobile Research InstituteBeijingChina Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Secur
Agenda Introduction Negative Logic System security Attack and Defense Mechanisms Based on NLS Applications of Attack and Defense Mechanisms Based on NLS Conclusion
来源: 评论
Relation Structure-Aware Heterogeneous Graph Neural Network
Relation Structure-Aware Heterogeneous Graph Neural Network
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Shichao Zhu Chuan Zhou Shirui Pan Xingquan Zhu Bin Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Faculty of Information Technology Monash University Melbourne Australia Dept. of Computer & Electrical Engineering and Computer Science Florida Atlantic University Boca Raton USA Xiaomi AI Lab Beijing China
Heterogeneous graphs with different types of nodes and edges are ubiquitous and have immense value in many applications. Existing works on modeling heterogeneous graphs usually follow the idea of splitting a heterogen...
来源: 评论
Modeling cyber-physical attacks on water networks with epanetCPA  1
Modeling cyber-physical attacks on water networks with epane...
收藏 引用
1st International Joint Conference in Water Distribution Systems Analysis and Computing and Control in the Water Industry, WDSA/CCWI 2018
作者: Taormina, R. Galelli, S. Douglas, H.C. Tippenhauer, N.O. Salomons, E. Ostfeld, A. ITrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore487372 Singapore Pillar of Engineering Systems and Design Singapore University of Technology and Design Singapore487372 Singapore Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore487372 Singapore OptiWater Haifa Israel Faculty of Civil and Environmental Engineering Technion-Israel Institute of Technology Haifa32000 Israel
In this work, we discuss modeling of cyber-physical attacks and their effects on the hydraulic processes of water networks. In particular, we introduce our software epanetCPA, that allows users to quickly develop plau... 详细信息
来源: 评论
Distortion-free watermarking scheme for compressed data in columnar database  15
Distortion-free watermarking scheme for compressed data in c...
收藏 引用
15th International Joint Conference on e-Business and Telecommunications, ICETE 2018
作者: Yaqub, Waheeb Kamel, Ibrahim Aung, Zeyar Center for Cyber Security New York University Abu Dhabi United Arab Emirates Department of Electrical and Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science Khalifa University of Science and Technology Masdar Institute Abu Dhabi United Arab Emirates
Digital watermarking is an effective technique for protecting various databases against data copyright infringement, piracy, and data tampering in the columnar database. Increasing deployments of various database syst... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
Joint extraction of entities and relations based on a novel decomposition strategy
arXiv
收藏 引用
arXiv 2019年
作者: Yu, Bowen Zhang, Zhenyu Su, Jianlin Wang, Yubin Liu, Tingwen Wang, Bin Li, Sujian Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhuiyi Technology Co. Ltd. Shenzhen China Xiaomi AI Lab Xiaomi Inc. Beijing China Key Laboratory of Computational Linguistics Peking University MOE China
Joint extraction of entities and relations aims to detect entity pairs along with their relations using a single model. Prior works typically solve this task in the extract-then-classify or unified labeling manner. Ho... 详细信息
来源: 评论
Erratum to “High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators”
收藏 引用
security and Communication Networks 2020年 第1期2020卷
作者: Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 *** Data Assurance and Communications Security Research Center Chinese Academy of Sciences Beijing 100093 *** School of Cyber Security University of Chinese Academy of Sciences Beijing 100093 *** China Information Technology Security Evaluation Center Beijing 100085 *** School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 100093 ***
来源: 评论
Aesthetic Attributes Assessment of Images
arXiv
收藏 引用
arXiv 2019年
作者: Jin, Xin Wu, Le Zhao, Geng Li, Xiaodong Zhang, Xiaokun Ge, Shiming Zou, Dongqing Zhou, Bin Zhou, Xinghui Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing100070 China Cetc Big Data Research Institute Co. Ltd. Guiyang Guizhou550018 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China SenseTime Research Beijing100084 China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Peng Cheng Laboratory Beijing100191 China
Image aesthetic quality assessment has been a relatively hot topic during the last decade. Most recently, comments type assessment (aesthetic captions) has been proposed to describe the general aesthetic impression of... 详细信息
来源: 评论
Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks
Deep Reinforcement Learning based Smart Mitigation of DDoS F...
收藏 引用
IEEE International Workshop on Computer-Aided Modeling, Analysis, and Design of Communication Links and Networks, CAMAD
作者: Yandong Liu Mianxiong Dong Kaoru Ota Jianhua Li Jun Wu School of Cyber Security Shanghai Jiao Tong University Shanghai China Department of Information and Electronic Engineering Muroran Institute of Technology Muroran Japan
Distributed Denial-of-Service (DDoS) flooding attack has remained as one of the most destructive attacks for more than two decades. Although great efforts have been made to design the defense mechanism, it is still di... 详细信息
来源: 评论
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation  24th
Leakage-Resilient Cryptography from Puncturable Primitives a...
收藏 引用
24th Annual International Conference on Theory and Application of Cryptology and Information security, ASIACRYPT 2018
作者: Chen, Yu Wang, Yuyu Zhou, Hong-Sheng State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China School of Cyber Security University of Chinese Academy of Sciences Beijing China Tokyo Institute of Technology Tokyo Japan IOHK Hong Kong China National Institute of Advanced Industrial Science and Technology Tokyo Japan Virginia Commonwealth University Richmond United States
In this work, we develop a framework for building leakage-resilient cryptosystems in the bounded leakage model from puncturable primitives and indistinguishability obfuscation The major insight of our work is that var... 详细信息
来源: 评论