咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是201-210 订阅
排序:
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
First Creating Backgrounds Then Rendering Texts: A New Paradigm for Visual Text Blending  27
First Creating Backgrounds Then Rendering Texts: A New Parad...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Li, Zhenhang Shu, Yan Zeng, Weichao Yang, Dongbao Zhou, Yu Institute of Information Engineering Chinese Academy of Sciences Beijing China TMCC College of Computer Science Nankai University Tianjin China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Diffusion models, known for their impressive image generation abilities, have played a pivotal role in the rise of visual text generation. Nevertheless, existing visual text generation methods often focus on generatin... 详细信息
来源: 评论
Leveraging XGBoost Machine Learning Algorithm for Common Vulnerabilities and Exposures (CVE) Exploitability Classification
Leveraging XGBoost Machine Learning Algorithm for Common Vul...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Meryn Babu Namruth Reddy S Minal Moharir Mohana Computer Science and Engineering (Cyber Security) RV College of Engineering® Bengaluru India Security Engineer NVIDIA Bengaluru India
The problem of exploitation is highly critical in cybersecurity. Therefore, it is very important for the prioritization of security patching efforts and risk mitigation to accurately predict the exploitability of a gi... 详细信息
来源: 评论
An Integrated Platform for Virtual Ecosystems and Wireless Edge Computing for Web 3.0  3
An Integrated Platform for Virtual Ecosystems and Wireless E...
收藏 引用
3rd IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Garg, Khushi Jattu, Mahee Hariharasitaraman, S. Subramanian, R. Raja Division of Cyber Security and Digital Forensics VIT Bhopal University Madhya Pradesh India School of Computing Science and Engineering Vit Bhopal University Madhya Pradesh India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamil Nadu India
The emergence of Web 3.0 has paved the way for a new generation of the internet that enables users to view, publish, and own content independently. This innovation is being driven by a combination of blockchain, seman... 详细信息
来源: 评论
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with Precise Static Taint Analysis  40
CryptoPyt: Unraveling Python Cryptographic APIs Misuse with ...
收藏 引用
40th Annual computer security Applications Conference, ACSAC 2024
作者: Guo, Xiangxin Jia, Shijie Lin, Jingqiang Ma, Yuan Zheng, Fangyu Li, Guangzheng Xu, Bowen Cheng, Yueqiang Ji, Kailiang School of Cyber Security University of Science and Technology of China Hefei China Key Laboratory of Cyberspace Security Defense Institute of Information Engineering CAS Beijing China School of Cryptology University of Chinese Academy of Sciences Beijing China Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China NIO China
Cryptographic APIs are essential for ensuring the security of software systems. However, many research studies have revealed that the misuse of cryptographic APIs is commonly widespread. Detecting such misuse in Pytho... 详细信息
来源: 评论
Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6369-6384页
作者: Wang, Xiuhua Wang, Shuai Li, Yiwei Fan, Fengrui Li, Shikang Lin, Xiaodong Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China Xiamen University of Technology Fujian Key Laboratory of Communication Network and Information Processing Xiamen361024 China University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Federated learning (FL) is a popular distributed paradigm where enormous clients collaboratively train a machine learning (ML) model under the orchestration of a central server without knowing the clients' private... 详细信息
来源: 评论
Bridging Visual Affective Gap: Borrowing Textual Knowledge by Learning from Noisy Image-Text Pairs  24
Bridging Visual Affective Gap: Borrowing Textual Knowledge b...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Daiqing Yang, Dongbao Zhou, Yu Ma, Can School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China TMCC College of Computer Science Nankai University Tianjin China
Visual emotion recognition (VER) is a longstanding field that has garnered increasing attention with the advancement of deep neural networks. Although recent studies have achieved notable improvements by leveraging th... 详细信息
来源: 评论
Circumventing Google Play vetting policies: a stealthy cyberattack that uses incremental updates to breach privacy
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 4785-4794页
作者: Muhammad, Zia Amjad, Faisal Iqbal, Zafar Javed, Abdul Rehman Gadekallu, Thippa Reddy Department of Computer Science North Dakota State University Fargo United States Department of Cyber Security PAF Complex E-9 Air University Islamabad Pakistan Islamabad Pakistan School of Information Technology and Engineering Vellore Institute of Technology Vellore India Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Today digital technologies are evolving to accommodate small businesses and young entrepreneurs by reducing their time-to-market while encouraging rapid innovation in mobile, Extended Reality (XR), Internet of Things ... 详细信息
来源: 评论
Intelligent Deep Learning Model for Securing KMS Through CSF Deviation Detection  13
Intelligent Deep Learning Model for Securing KMS Through CSF...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Chauhan, Raj Ahmad, Shahnawaz Onyarin, Ogala Justin Kumar, Rajendra Noida Institute of Engineering and Technology Department of CSE-AIML Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India University of Delta Cyber Security Department Delta State Nigeria Jamia Millia Islamia Department of Computer Science New Delhi India
Cloud computing has revolutionized data content stock and administration but concurrently it has increased the vulnerability factors especially Key Management System (KMS), which is crucial since it is used to protect... 详细信息
来源: 评论
Automated Crop Growth Monitoring and Optimizing the Yield with Reinforcement Learning  3
Automated Crop Growth Monitoring and Optimizing the Yield wi...
收藏 引用
3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: Gorantla, Snehitha Veluchamy, S. Amrita School of Computing Department of Computer Science and Engineering - Artificial Intelligence Amrita Vishwa Vidyapeetham Chennai601103 India Amrita School of Computing Department of Computer Science and Engineering - Cyber Security Amrita Vishwa Vidyapeetham Chennai601103 India
A reinforcement learning agent for optimal green-house management through Proximal Policy Optimisation is developed and evaluated in this work. With variable elements like lighting, irrigation, humidity, and temperatu... 详细信息
来源: 评论