咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是181-190 订阅
排序:
Cryptanalysis and Improvement of a Multi-factor Authenticated Key Exchange Protocol
收藏 引用
International Journal of Network security 2023年 第5期25卷 764-776页
作者: Ma, Zhiqiang He, Jun College of Computer and Cyber Security & Fujian Normal University 69 Hongguang Avenue Banan District Chongqing400054 China School of Computer Science and Engineering & Chongqing University of Technology 69 Hongguang Avenue Banan District Chongqing400054 China
Authenticated key exchange (AKE) protocol is one of the most fundamental cryptographic primitives for secure communication systems. It allows two parties to securely establish a common session key over an insecure pub... 详细信息
来源: 评论
TextCtrl: Diffusion-based Scene Text Editing with Prior Guidance Control  38
TextCtrl: Diffusion-based Scene Text Editing with Prior Guid...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zeng, Weichao Shu, Yan Li, Zhenhang Yang, Dongbao Zhou, Yu Institute of Information Engineering Chinese Academy of Sciences China VCIP TMCC DISSec College of Computer Science Nankai University China School of Cyber Security University of Chinese Academy of Sciences China
Centred on content modification and style preservation, Scene Text Editing (STE) remains a challenging task despite considerable progress in text-to-image synthesis and text-driven image manipulation recently. GAN-bas...
来源: 评论
A Pricing-Based Cooperative Relay Selection Scheme for Reliable Communications
收藏 引用
China Communications 2024年 第8期21卷 30-44页
作者: Xiao Yulong Wu Yu Amr Tolba Chen Ziqiang Li Tengfei School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science Community CollegeKing Saud UniversityRiyadh 11437Saudi Arabia
With the rapid development and application of energy harvesting technology,it has become a prominent research area due to its significant benefits in terms of green environmental protection,convenience,and high safety... 详细信息
来源: 评论
Zero-Shot Cross-Domain Slot Filling with Retrieval Augmented In-Context Learning
Zero-Shot Cross-Domain Slot Filling with Retrieval Augmented...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Song, Mengxiao Liu, Tingwen Li, Quangang Ma, Duohe Sun, Ming Tian, Ling Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Zero-shot cross-domain slot filling is becoming increasingly important due to its ability to generalize to new domains without the need for annotating domain-specific data, which aligns well with the requirements of i... 详细信息
来源: 评论
Translational Generative Retrieval via Potential Query Generation
Translational Generative Retrieval via Potential Query Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Guo, Yihan Liu, Tingwen Sheng, Jiawei Ma, Duohe Sun, Ming Tian, Ling Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Document retrieval aims to find documents related to the query from all candidate documents. Existing studies develop the Generative Retrieval approach, which assigns a unique DocID to each document, and then measures... 详细信息
来源: 评论
Application of Support Vector Machine to Lassa Fever Diagnosis
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 165-177页
作者: Nwankwo, Wilson Adigwe, Wilfred Umezuruike, Chinecherem Acheme, Ijegwa D. Nwankwo, Chukwuemeka Pascal Ojei, Emmanuel Oghorodi, Duke Department of Computer Science Edo State University Uzairue Nigeria Department of Computer Science Delta State University of Science and Technology Ozoro Nigeria College of Computing and Communication Studies Bowen University Iwo Nigeria Department of Software Engineering Delta State University of Science and Technology Ozoro Nigeria Department of Cyber Security Delta State University of Science and Technology Ozoro Nigeria
Lassa fever is a type of viral hemorrhagic fever with high fatality rate. Precise and prompt diagnosis and successful treatment of this disease is very important in the control and prevention of the spread as unrestri... 详细信息
来源: 评论
A Novel Machine Learning-Based Early Warning Detection System for Business Customer Churn  5
A Novel Machine Learning-Based Early Warning Detection Syste...
收藏 引用
5th IEEE International Conference on Recent Trends in computer science and Technology, ICRTCST 2024
作者: Chandan, Radha Raman Ramaraj, S. Sarishma Praba Devi, P. Sj, Sultanuddin Indhuma, E. Department of Computer Science UP Varanasi221011 India Karpagam College of Engineering Department of Computer Science and Engineering TamilNadu Coimbatore India Graphic Era Deemed to be University Department of Computer Science & Engineering Uttarakhand Dehradun248002 India Sona College of Technology Department of Management Studies Salem India Dhanalakshmi College of Engineering Dept of Cyber Security Tambaram Manimangalam Chennai India St. Martins Engineering College Department of Computer Science and Engineering Telangana Secunderabad India
This study presents an Early Warning Detection System (ML-EWDS) based on machine learning for reducing commercial customer turnover. Companies in all sectors need to be especially concerned about client churn in today... 详细信息
来源: 评论
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs  24
Save the Bruised Striver: A Reliable Live Patching Framework...
收藏 引用
19th European Conference on computer Systems, EuroSys 2024
作者: Zhou, Ming Wang, Haining Li, Ke Zhu, Hongsong Sun, Limin School of Cyber Science and Engineering Nanjing University of Science and Technology China Department of Electrical and Computer Engineering Virginia Tech China Nari Group Corporation State Grid Electric Power Research Institute School of Cyber Security University of Chinese Academy of Sciences China Institute of Information Engineering Cas China Virginia Tech. United States
Industrial Control Systems (ICS), particularly programmable logic controllers (PLCs) responsible for managing underlying physical infrastructures, often operate for extended periods without interruption. Thus, it is c... 详细信息
来源: 评论
Predicting Mental States: Machine Learning Techniques for Personalized Mental Health Support  15
Predicting Mental States: Machine Learning Techniques for Pe...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Hepzibah, Grace Babu, Nirmal Varghese Division of Computer Science Engineering Karunya Institute of Technology and Science Karunya Nagar Tamil Nadu Coimbatore641114 India Division of Data Science and Cyber Security Karunya Institute of Technology and Science Karunya Nagar Tamil Nadu Coimbatore641114 India
As we know that individuals around the globe work difficult to keep up with this hustling world. In any case, due to this each person is managing with diverse wellbeing issues, one of the foremost known issue is sadne... 详细信息
来源: 评论
Detection and Recovery of RFID Harmonic Signal for Wi-Fi Interference
收藏 引用
Journal of Communications and Information Networks 2024年 第4期9卷 330-339页
作者: Chao Gong Ping Li Panlong Yang Zhao Lv School of Computer Science and Technology Anhui UniversityHefei 230000China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of TechnologyMa’anshan 243032China School of Computer science School of Cyber Science and EngineeringNanjing University of Information Science and TechnologyNanjing 210000China
In the realm of the Internet of things(IoT),radio frequency identification(RFID)technology is essential for linking physical objects to digital *** introduction of harmonic technology has expanded RFID’s applications... 详细信息
来源: 评论