咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是171-180 订阅
排序:
AntiMal: an Approach of Malware Detection Employing Swin Transformer  13
AntiMal: an Approach of Malware Detection Employing Swin Tra...
收藏 引用
13th International Conference on Communication and Network security, ICCNS 2023
作者: Lyu, Chenxi Yao, Yinan Guo, Xiaodong Huang, Zihong Dong, Chen Zhang, Yuanyuan Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China Department of Computer Science and Engineering University of South Florida FL United States
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Mahdi, Ali Jafer Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq AI-Zahraa University for Women Department of Scientific Affairs Bangi43600 Malaysia College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Innovative grid technology leverages Information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home... 详细信息
来源: 评论
Knowledge-based recommendation with contrastive learning
收藏 引用
High-Confidence Computing 2023年 第4期3卷 41-46页
作者: Yang He Xu Zheng Rui Xu Ling Tian School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 611731China Kash Institute of Electronics and Information Industry Kashgar 844199China China Electronic Technology Cyber Security Co. Ltd.Chengdu 610041China Cyberspace Security Key Laboratory of Sichuan Province Chengdu 610041China
Knowledge Graphs(KGs)have been incorporated as external information into recommendation systems to ensure the high-confidence ***,Contrastive Learning(CL)framework has been widely used in knowledge-based recommendatio... 详细信息
来源: 评论
Federated Learning with Blockchain for Privacy-Preserving Data Sharing in Internet of Vehicles
收藏 引用
China Communications 2023年 第3期20卷 69-85页
作者: Wenxian Jiang Mengjuan Chen Jun Tao School of Cyber Science and Engineering Southeast UniversityNanjing 211189China College of Computer Science and Technology Huaqiao UniversityXiamen 361021China Key Lab of CNII MOESoutheast UniversityNanjing 211189China Purple Mountain Laboratories:Networking Communications and Security Nanjing 211111China
Data sharing technology in Internet of Vehicles(Io V)has attracted great research interest with the goal of realizing intelligent transportation and traffic ***,the main concerns have been raised about the security an... 详细信息
来源: 评论
Malicious Traffic Detection with Noise Labels Based on Cross-Modal Consistency
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第2期6卷 148-151页
作者: Yuan, Qingjun Niu, Weina Wang, Yongjuan Gou, Gaopeng Lu, Bin Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518110 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
To train robust malicious traffic identification models under noisy labeled datasets, a number of learning with noise labels approaches have been introduced, among which parallel training methods have been proved to b... 详细信息
来源: 评论
A Payment Channel Network Fee Allocation Strategy Integrating Auction Theory
A Payment Channel Network Fee Allocation Strategy Integratin...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Zhang, Jingjing Xiao, Shanbin Wu, Weigang Zhou, Jieying Guangdong University of Foreign Studies School of Cyber Security Guangzhou China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China
The payment channel network is an auspicious approach to improve the blockchain scalability, by allowing multi-hop off-chain payments between any two nodes. Therefore, a good incentive mechanism is very important to e... 详细信息
来源: 评论
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding  2
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Recep...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Waseem, Ahsan Kamil, Mohd Azhan Umar Bhardwaj, Abhisehek Razim, Abdul Qadeer, Mohammed Abdul Ghazal, Taher M. Aligarh Muslim University Department Of Electrical Engineering Aligarh India Aligarh Muslim University Department Of Computer Engineering Aligarh India Stony Brook University Department Of Electrical And Computer Engineering New York United States Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
This study examines the growing number of satellites, this paper explores the importance of satellite tracking and highlights NOAA-15 for information transmission and weather monitoring. It offers a low-cost configura... 详细信息
来源: 评论
Double Compression Detection Based on the De-Blocking Filtering of HEVC Videos  48
Double Compression Detection Based on the De-Blocking Filter...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Kang, Xiangui Su, Pengcheng Huang, Zisheng Chen, Yifang Wang, Jie Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Guangdong Polytechnic Normal University School of Cyber Security Guangzhou China
Instead of detecting whether the whole video sequence is double compressed, a frame-level detection result can provide more precise information for video forensic tasks, such as locate tamper point and restore compres... 详细信息
来源: 评论
An efficient data aggregation scheme with local differential privacy in smart grid
收藏 引用
Digital Communications and Networks 2022年 第3期8卷 333-342页
作者: Na Gai Kaiping Xue Bin Zhu Jiayu Yang Jianqing Liu Debiao He School of Cyber Science and Technology University of Science and Technology of ChinaHefeiAnhui230027China Department of Electronic Engineering and Information Science University of Science and Technology of ChinaHefeiAnhui230027China Department of Electrical and Computer Engineering University of Alabama in HuntsvilleHuntsvilleAL35899USA Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education School of Cyber Science and EngineeringWuhan UniversityWuhanBeihu430072China
By integrating the traditional power grid with information and communication technology, smart grid achieves dependable, efficient, and flexible grid data processing. The smart meters deployed on the user side of the ... 详细信息
来源: 评论
Volume Hiding Conjunctive Searchable Symmetric Encryption over Cloud  16
Volume Hiding Conjunctive Searchable Symmetric Encryption ov...
收藏 引用
16th International Conference on cyber-Enabled Distributed Computing and Knowledge Discover, cyberC 2024
作者: Deng, Qinghua Chen, Lanxiang Zhu, Yizhao Mu, Yi City University of Macau Faculty of Data Science 999078 China Hanshan Normal University School of Computer and Information Engineering Chaozhou521041 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou China
Symmetric searchable encryption (SSE) is crucial for promoting cloud storage. It enables users to encrypt private data and outsource it to untrusted servers while retaining query capabilities. To prevent the cloud fro... 详细信息
来源: 评论