咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是191-200 订阅
排序:
Modeling Locomotion with Body Angular Movements in Virtual Reality  25
Modeling Locomotion with Body Angular Movements in Virtual R...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Mai, Zijun Gao, BoYu Tu, Huawei Li, Dasheng Kim, HyungSeok Luo, Weiqi College of Information Science and Technology/Cyber Security Jinan University Guangzhou China Department of Computer Science and Information Technology La Trobe University Melbourne Australia College of Cyber Security/Guangdong Institute of Smart Education Jinan University Guangdong Guangzhou China Vr Lab Department of Computer Science and Engineering Konkuk University Seoul Korea Republic of
This study proposes a time prediction model for locomotion along a polyline path with body angular movements in Virtual Reality (VR). We divide such locomotion into two components: navigating in multiple line-segment ... 详细信息
来源: 评论
Detection and Recovery of RFID Harmonic Signal for Wi-Fi Interference
收藏 引用
Journal of Communications and Information Networks 2024年 第4期9卷 330-339页
作者: Chao Gong Ping Li Panlong Yang Zhao Lv School of Computer Science and Technology Anhui UniversityHefei 230000China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of TechnologyMa’anshan 243032China School of Computer science School of Cyber Science and EngineeringNanjing University of Information Science and TechnologyNanjing 210000China
In the realm of the Internet of things(IoT),radio frequency identification(RFID)technology is essential for linking physical objects to digital *** introduction of harmonic technology has expanded RFID’s applications... 详细信息
来源: 评论
ICP Registration Based on Overlapping Region
ICP Registration Based on Overlapping Region
收藏 引用
Image Processing, computer Vision and Machine Learning (ICICML), International Conference on
作者: Zhuoer Xiao School of Computer Science and Engineering School of Cyber Security) UESTC Chengdu China
To solve the problem that ICP(Iterative Closest Point), a widely used fine registration algorithm, can degrade good initial registration results, this paper introduces a step of overlapping region extraction between t... 详细信息
来源: 评论
Guardian of the Ensembles: Introducing Pairwise Adversarially Robust Loss for Resisting Adversarial Attacks in DNN Ensembles
Guardian of the Ensembles: Introducing Pairwise Adversariall...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Shukla, Shubhi Dalui, Subhadeep Alam, Manaar Datta, Shubhajit Mondal, Arijit Mukhopadhyay, Debdeep Chakrabarti, Partha Pratim Centre for Computational and Data Sciences Iit Kharagpur India Iit Kharagpur Computer Science and Engineering Department India Center for Cyber Security New York University Abu Dhabi United Arab Emirates Iit Kharagpur Department of Artificial Intelligence India Iit Patna Computer Science and Engineering Department India
Adversarial attacks rely on transferability, where an adversarial example (AE) crafted on a surrogate classifier tends to mislead a target classifier. Recent ensemble methods demonstrate that AEs are less likely to mi... 详细信息
来源: 评论
Save the Bruised Striver: A Reliable Live Patching Framework for Protecting Real-World PLCs  24
Save the Bruised Striver: A Reliable Live Patching Framework...
收藏 引用
19th European Conference on computer Systems, EuroSys 2024
作者: Zhou, Ming Wang, Haining Li, Ke Zhu, Hongsong Sun, Limin School of Cyber Science and Engineering Nanjing University of Science and Technology China Department of Electrical and Computer Engineering Virginia Tech China Nari Group Corporation State Grid Electric Power Research Institute School of Cyber Security University of Chinese Academy of Sciences China Institute of Information Engineering Cas China Virginia Tech. United States
Industrial Control Systems (ICS), particularly programmable logic controllers (PLCs) responsible for managing underlying physical infrastructures, often operate for extended periods without interruption. Thus, it is c... 详细信息
来源: 评论
IoT-driven automatic vehicle accident rescue system implemented with Proteus  1
IoT-driven automatic vehicle accident rescue system implemen...
收藏 引用
1st International Conference on Optimization Techniques for Learning, ICOTL 2023
作者: Hemalatha, K. Ganga Devi, S.V.S. Deepika, V. Madanapalle Institute of Technology and Science Dept. of Computer Science & Engineering-Artificial Intelligence Andhra-Pradesh Madanapalle India Madanapalle Institute of Technology and Science Dept. of Computer Science & Engineering-Cyber Security Andhra-Pradesh Madanapalle India Sri Venkateswara College of Engineering Dept. of Computer Science & Engineering Andhra-Pradesh India
IoT-driven automatic vehicle accident rescue system implemented with Proteus is an inventive solution aimed at enhancing emergency response and rescue operations following vehicle accidents. Given the rising vehicle u... 详细信息
来源: 评论
Digital-Bracers: A Design Process for an Interactive Monitoring Generative System That Helps People with Hand Movements
Digital-Bracers: A Design Process for an Interactive Monitor...
收藏 引用
2023 International Symposium on World Ecological Design, ISWED 2023
作者: Yao, Yousheng Xie, Yuan Ying, Fangtian Wang, Haoran Huang, Zhihao Zheng, Junpeng Faculty of Humanities and Arts Macau University of Science and Technology China Hexiangning College of Art and Design Zhongkai University of Agriculture and Engineering China College of Computer and Cyber Security Fujian Normal University China
In the post-New Crown epidemic era, people need to face a period of physical recovery after being infected with New Crown, especially when there are frequent cases of deaths due to over-aggressive or excessive physica... 详细信息
来源: 评论
Robust Multimodal Sentiment Analysis of Image-Text Pairs by Distribution-Based Feature Recovery and Fusion  24
Robust Multimodal Sentiment Analysis of Image-Text Pairs by ...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Daiqing Yang, Dongbao Zhou, Yu Ma, Can School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China TMCC College of Computer Science Nankai University Tianjin China
As posts on social media increase rapidly, analyzing the sentiments embedded in image-text pairs has become a popular research topic in recent years. Although existing works achieve impressive accomplishments in simul... 详细信息
来源: 评论
Cloud Based AIVR Training System for Emergency Rescue  12
Cloud Based AIVR Training System for Emergency Rescue
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Dong, Meiya Zhu, Biaokai Zhao, Jumin Song, Jie School of Computer Science Peking University Beijing China Suzhou Industrial Technology Institute Zhejiang University Suzhou China Cyber Security Shanxi Police College China College of Information and Optical Engineering Taiyuan University of Technology Taiyuan China Cyber security Intelligent Policing Key Laboratory of Sichuan Province Luzhou China
This paper mainly discusses the current situation and existing problems of training exercises in emergency medicial scenarios, as well as the importance and necessity of developing an AI training system for emergency ... 详细信息
来源: 评论
ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via Contrastive Learning  4
ContraPonzi: Smart Ponzi Scheme Detection for Ethereum via C...
收藏 引用
4th Asia Service sciences and Software engineering Conference, ASSE 2023
作者: Wu, Jiajing Liu, Jieli Chen, Jinze Chen, Ting Li, Jingwei Song, Shuwei He, Jiahao School of Software Engineering Sun Yat-sen University China School of Computer Science and Engineering Sun Yat-sen University China School of Cyber Security University of Electronic Science and Technology of China China
In recent years, blockchain technology has witnessed rapid development and received considerable attention. However, its decentralized and pseudonymous nature has also attracted many criminal activities. Among them, P... 详细信息
来源: 评论