咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是1861-1870 订阅
排序:
Fast stochastic ordinal embedding with variance reduction and adaptive step size
arXiv
收藏 引用
arXiv 2019年
作者: Ma, Ke Zeng, Jinshan Xiong, Jiechao Xu, Qianqian Cao, Xiaochun Liu, Wei Yao, Yuan School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Information Engineering Jiangxi Normal University NanchangJiangxi330022 China Tencent AI Lab Shenzhen Guangdong China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Department of Mathematics and by courtesy Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
—Learning representation from relative similarity comparisons, often called ordinal embedding, gains rising attention in recent years. Most of the existing methods are based on semi-definite programming (SDP), which ... 详细信息
来源: 评论
A game-theoretic analysis of shard-based permissionless blockchains
arXiv
收藏 引用
arXiv 2018年
作者: Manshaei, Mohammad Hossein Jadliwala, Murtuza Maiti, Anindya Fooladgar, Mahdi Department of Electrical and Computer Engineering Isfahan University of Technology Iran Department of Computer Science University of Texas San Antonio United States Institute for Cyber Security University of Texas San Antonio United States
Low transaction throughput and poor scalability are significant issues in public blockchain consensus protocols such as Bitcoins. Recent research efforts in this direction have proposed shard-based consensus protocols... 详细信息
来源: 评论
Intelligent feature selection for detecting HTTP/2 denial of service attacks  15
Intelligent feature selection for detecting HTTP/2 denial of...
收藏 引用
15th Australian Information security Management Conference, AISM 2017
作者: Adi, Erwin Baig, Zubair Australian Centre for Cyber Security School of Engineering and Information Technology University of New South Wales Australia Security Research Institute School of Science Edith Cowan University PerthWA Australia
Intrusion-detection systems employ machine learning techniques to classify traffic into attack and legitimate. Network flooding attacks can leverage the new web communications protocol (HTTP/2) to bypass intrusiondete... 详细信息
来源: 评论
Exponentially weighted distance-based detection for radiometric identification
Exponentially weighted distance-based detection for radiomet...
收藏 引用
作者: Jia, Yong Qiang Gan, Lu Liao, Hong Shu Center for Cyber Security School of Electronic Engineering University of Electronic Science and Technology of China Chengdu Sichuan China Southwest Electronics and Telecommunication Technology Research Institute Chengdu Sichuan China
Radio signals show characteristics of minute differences, which result from various idiosyncratic hardware properties between different radio emitters. A robust detector based on exponentially weighted distances is pr... 详细信息
来源: 评论
Privacy-preserving mobile crowdsensing for located-based applications
Privacy-preserving mobile crowdsensing for located-based app...
收藏 引用
2017 IEEE International Conference on Communications, ICC 2017
作者: Ni, Jianbing Zhang, Kuan Lin, Xiaodong Xia, Qi Shen, Xuemin Sherman Department of Electrical and Computer Engineering University of Waterloo Canada Faculty of Business and Information Technology University of Ontario Institute of Technology Canada Center of Cyber Security University of Electronic Science and Technology of China China
Mobile crowdsensing is a new paradigm which explores the mobility and intelligence of mobile users to collect high-quality data from social events and phenomena for conducting complex sensing tasks. Nevertheless, priv... 详细信息
来源: 评论
ODN: Opening the Deep Network for Open-Set Action Recognition
ODN: Opening the Deep Network for Open-Set Action Recognitio...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yu Shu Yemin Shi Yaowei Wang Yixiong Zou Qingsheng Yuan Yonghong Tian Peking University Beijing Beijing CN School of Information and Electronics Beijing Institute of Technology Beijing China National Engineering Laboratory for Video Technology Peking University Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
In recent years, the performance of action recognition has been significantly improved with the help of deep neural networks. Most of the existing action recognition works hold the closed-set assumption that all actio... 详细信息
来源: 评论
Blockchain-based Mutual Authentication security Protocol for Distributed RFID Systems
Blockchain-based Mutual Authentication Security Protocol for...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Siye Wang Shaoyi Zhu Yanfang Zhang Chinese Academy of Sciences School of Computer and Information Technology Institute of Information Engineering Beijing Jiaotong University Beijing China Chinese Academy of Sciences School of Cyber Security Institute of Information Engineering University of Chinese Academy of Sciences Beijing China Chinese Academy of Sciences Institute of Information Engineering Beijing China
Since radio frequency identification (RFID) technology has been used in various scenarios such as supply chain, access control system and credit card, tremendous efforts have been made to improve the authentication be... 详细信息
来源: 评论
Persistent fault analysis on block ciphers
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2018年 第3期2018卷 150-172页
作者: Zhang, Fan Lou, Xiaoxuan Zhao, Xinjie Bhasin, Shivam He, Wei Ding, Ruyi Qureshi, Samiya Ren, Kui College of Information Science and Electronic Engineering Zhejiang University China Institute of Cyber Security Research Zhejiang University China College of Computer Science and Technology Zhejiang University China The Institute of North Electronic Equipment China Nanyang Technological University Singapore Shield Laboratory Huawei International Pte. Ltd Singapore Georgia Institute of Technology GA United States
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is propos... 详细信息
来源: 评论
Deep-Net: Deep neural network for cyber security use cases
arXiv
收藏 引用
arXiv 2018年
作者: Vinayakumar, R. Barathi Ganesh, H.B. Poornachandran, Prabaharan Anand, Kumar M. Soman, K.P. Amrita School of Engineering Coimbatore India Arnekt Solutions Pvt Ltd PuneMaharashtra India Center for Cyber Security Systems and Networks Amrita School of Engineering Amrita Vishwa Vidyapeetham Amritapuri India Department of Information Technology National Institute of Technology Karnataka Surathkal. Mangalore India
Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech proc... 详细信息
来源: 评论
Smartly deploying wechat mobile application on cloud foundry paas  3rd
Smartly deploying wechat mobile application on cloud foundry...
收藏 引用
3rd International Conference on Smart Computing and Communications, SmartCom 2018
作者: Lu, Zhihui Wan, Xiaoli Qiu, Meikang Zu, Lijun Huang, Shih-Chia Wu, Jie Liu, Meiqin School of Computer Science Fudan University Shanghai200433 China Information Center Zhejiang International Business Group Co. Ltd. Hangzhou China Department of Electrical Engineering Columbia University New YorkNY10027 United States Research Institute of Electronic Payment China UnionPay Shanghai China Department of Electronic Engineering National Taipei University of Technology Taipei Taiwan Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai200433 China College of Electrical Engineering Zhejiang University Hangzhou310027 China
WeChat has become the mainstream social network mobile applications in China. Based on the WeChat API, there are many attached mobile applications. Cloud Foundry is a lightweight mainstream PaaS platform. In this pape... 详细信息
来源: 评论