咨询与建议

限定检索结果

文献类型

  • 1,305 篇 会议
  • 629 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,109 篇 工学
    • 913 篇 计算机科学与技术...
    • 768 篇 软件工程
    • 303 篇 信息与通信工程
    • 198 篇 控制科学与工程
    • 158 篇 电气工程
    • 111 篇 网络空间安全
    • 110 篇 生物工程
    • 106 篇 电子科学与技术(可...
    • 79 篇 安全科学与工程
    • 71 篇 机械工程
    • 68 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 45 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 建筑学
  • 456 篇 理学
    • 226 篇 数学
    • 117 篇 生物学
    • 99 篇 物理学
    • 89 篇 统计学(可授理学、...
    • 64 篇 化学
    • 50 篇 系统科学
  • 309 篇 管理学
    • 190 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 95 篇 法学
    • 66 篇 社会学
  • 63 篇 医学
    • 45 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 40 篇 公共卫生与预防医...
  • 34 篇 经济学
  • 18 篇 农学
  • 17 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 122 篇 accuracy
  • 99 篇 feature extracti...
  • 97 篇 deep learning
  • 84 篇 security
  • 82 篇 real-time system...
  • 71 篇 training
  • 70 篇 machine learning
  • 68 篇 computational mo...
  • 62 篇 internet of thin...
  • 53 篇 predictive model...
  • 50 篇 semantics
  • 50 篇 privacy
  • 50 篇 convolutional ne...
  • 42 篇 support vector m...
  • 38 篇 data models
  • 37 篇 protocols
  • 34 篇 neural networks
  • 34 篇 optimization
  • 31 篇 authentication
  • 31 篇 blockchain

机构

  • 523 篇 school of cyber ...
  • 397 篇 institute of inf...
  • 67 篇 state key labora...
  • 53 篇 chinese academy ...
  • 38 篇 school of cyber ...
  • 38 篇 department of co...
  • 36 篇 university of bu...
  • 33 篇 department of me...
  • 31 篇 school of comput...
  • 31 篇 cyberspace insti...
  • 29 篇 university of ch...
  • 28 篇 institute of inf...
  • 26 篇 institute of com...
  • 25 篇 beijing electron...
  • 23 篇 department of cy...
  • 21 篇 maharishi school...
  • 20 篇 kuaishou technol...
  • 20 篇 yeshwantrao chav...
  • 20 篇 school of cyber ...
  • 19 篇 division of comp...

作者

  • 54 篇 cao xiaochun
  • 30 篇 xu qianqian
  • 28 篇 huang qingming
  • 22 篇 hu songlin
  • 20 篇 yang zhiyong
  • 20 篇 cao yanan
  • 20 篇 wu xing
  • 19 篇 jayant giri
  • 18 篇 jingqiang lin
  • 18 篇 zhou pan
  • 18 篇 hu yue
  • 17 篇 wang wei
  • 17 篇 sun limin
  • 17 篇 lin jingqiang
  • 16 篇 limin sun
  • 16 篇 n. sreevani
  • 14 篇 peng hao
  • 14 篇 xiong gang
  • 14 篇 lin zheng
  • 14 篇 gai keke

语言

  • 1,429 篇 英文
  • 506 篇 其他
  • 12 篇 中文
检索条件"机构=Cyber Security and Cyber Forensics in the Institute of Engineering and Technology"
1939 条 记 录,以下是71-80 订阅
排序:
New Coefficient Grouping for Complex Affine Layers
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 520-532页
作者: Qiao Wenxiao Sun Siwei Chen Ying Hu Lei Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing 100085 China School of Cyber Security University of Chinese Academy of Sciences Beijing 100049 China School of Cryptology University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Cryptology Beijing 100878 China Department of Cryptology Science & Technology Beijing Electronic Science & Technology Institute Beijing 100070 China
Recently, designing symmetric primitives for applications in cryptographic protocols including multi-party computation, fully homomorphic encryption, and zero-knowledge proofs has become an important research topic. A... 详细信息
来源: 评论
Recommending Orchestration Plan for Space-Ground Integration Information Network: A Subgraph Matching Approach  9
Recommending Orchestration Plan for Space-Ground Integration...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Xu, Yaobing Guo, Yunchuan Yu, Mingjie Li, Fenghua Guo, Shoukun Fang, Liang Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China University of Science and Technology of China School of Cyber Security Hefei China
The Space-Ground Integration Information Networks (SGIIN) are facing increasing attacks and risks, highlighting the critical need to recommend network defense orchestration plans for the SGIIN in an efficient manner. ... 详细信息
来源: 评论
Forensic Analysis of I2P Communication Network in Android and macOS Environments  18
Forensic Analysis of I2P Communication Network in Android an...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Wangchuk, Tashi Mandela, Ngaira Mbinda, Tumaini Damedjate, Kamboisssoi Etyang, Felix Makopa, Joel Royal University of Bhutan Department of Information Technology Dewathang Bhutan National Forensic Sciences University School of Cyber Security and Digital Forensics Gandhinagar India Cochin University of Science and Technology School of Computer Science and Engineering Kochi India
The Invisible Internet Project (I2P) has emerged as a crucial privacy-centric communication network, offering users a secure and anonymous online environment. As the utilization of I2P continues to expand, the demand ... 详细信息
来源: 评论
LEGF-DST:LLMs-Enhanced Graph-Fusion Dual-Stream Transformer for Fine-Grained Chinese Malicious SMS Detection
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 1901-1924页
作者: Xin Tong Jingya Wang Ying Yang Tian Peng Hanming Zhai Guangming Ling School of Information and Cybersecurity People’s Public Security University of ChinaBeijing100038China Cyber Investigation Technology Research and Development Center The Third Research Institute of the Ministry of Public SecurityShanghai201204China Department of Cybersecurity Defense Beijing Police CollegeBeijing102202China School of Computer Science Henan Institute of EngineeringZhengzhou451191China
With the widespread use of SMS(Short Message Service),the proliferation of malicious SMS has emerged as a pressing societal *** deep learning-based text classifiers offer promise,they often exhibit suboptimal performa... 详细信息
来源: 评论
A Hybrid Solution for Summarizing Diverse Medical Texts in the Health Domain
A Hybrid Solution for Summarizing Diverse Medical Texts in t...
收藏 引用
2024 International Conference on Communication, Computer Sciences and engineering, IC3SE 2024
作者: Samuel, Prithi Berna, Eugene Kumar, Arun Reshmy, A.K. Sriraj, Swaroop Kadaba Saketh, Yanda Srm Institute Of Science And Technology Department Of Computational Intelligence Kattankulathur India Bannari Amman Institute Of Technology Department Of Artificial Intelligence And Machine Learning Erode India University Of South Wales Department Of Digital Forensics And Cyber Security Treforest United Kingdom
Since medical text summarization has become essential in facilitating rapid access to vital information for healthcare professionals, this research paper introduces a novel hybrid medical text summarizer that combines... 详细信息
来源: 评论
Stable NICE Model-Based Picture Generation for Generative Steganography  6th
Stable NICE Model-Based Picture Generation for Generative S...
收藏 引用
6th International Conference on security and Privacy in New Computing Environments, SPNCE 2023
作者: Cui, Xutong Zhou, Zhili Yang, Jianhua Yuan, Chengsheng Tang, Weixuan Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China Institute of Artificial Intelligence Guangzhou University Guangdong510006 China School of Cyber Security Guangdong Polytechnic Normal University Guangdong510006 China
Steganography is one of most important techniques for covert communication. In recent years, generative steganography, which transforms a secret information into a generated picture, is a prospective steganography-res... 详细信息
来源: 评论
Track the Answer: Extending TextVQA from Image to Video with Spatio-Temporal Clues  39
Track the Answer: Extending TextVQA from Image to Video with...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zhang, Yan Zeng, Gangyan Shen, Huawen Wu, Daiqing Zhou, Yu Ma, Can Institute of Information Engineering Chinese Academy of Sciences China VCIP & TMCC & DISSec College of Computer Science Nankai University China School of Cyber Security University of Chinese Academy of Sciences China School of Cyber Science and Engineering Nanjing University of Science and Technology China
Video text-based visual question answering (Video TextVQA) is a practical task that aims to answer questions by jointly reasoning textual and visual information in a given video. Inspired by the development of TextVQA...
来源: 评论
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, Xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论
Polycystic ovary syndrome detection using optimized SVM and DenseNet
收藏 引用
International Journal of Information technology (Singapore) 2024年 第2期17卷 1039-1047页
作者: Silambarasan, E. Nirmala, G. Mishra, Ishani Department of CSE - Cyber Security Indian Institute of Information Technology Kottayam India Department of Electronics and Communication Engineering Mahendra Institute of Technology Namakkal (Dt) India Department of Electronics and Communication New Horizon College of Engineering Bangalore India
Polycystic ovary syndrome (PCOS) is a complicated endocrine disease that significantly impacts the health of women, affecting fertility and leading to various critical conditions. Unfortunately, around 70% of PCOS cas... 详细信息
来源: 评论
ECSNN: Spiking Neural Networks for Efficient Exposure Correction in Endoscopy Imaging
ECSNN: Spiking Neural Networks for Efficient Exposure Correc...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Jun Zheng, Zhuoran Zhang, Jingang Ren, Wenqi Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus China School of Future Technology University of Chinese Academy of Sciences China
The quality of endoscopic images is critical to the success of polyp segmentation, highlighting the need for accurate exposure correction in endoscopy. While traditional deep learning methods are effective, they deman... 详细信息
来源: 评论