咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是2371-2380 订阅
排序:
Erratum to “Quantifying the need for supervised machine learning in conducting live forensics analysis of emergent configurations (ECO) in IoT environments” [Forensic Sci. Int.: Rep. 2 (2020) 100122]
收藏 引用
Forensic science International: Reports 2020年 2卷 100135-100135页
作者: Kebande, Victor R. Ikuesan, Richard A. Karie, Nickson M. Alawadi, Sadi Choo, Kim-Kwang Raymond Al-Dhaqm, Arafat Department of Computer Science Malmö University Sweden Cyber and Network Security Department Science and Technology Division Community College of Qatar Qatar School of Science Edith Cowan University Australia Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249-0631 USA School of Computing Faculty of Engineering Universiti Teknologi Malysia Johor Malaysia
来源: 评论
Relation Structure-Aware Heterogeneous Graph Neural Network
Relation Structure-Aware Heterogeneous Graph Neural Network
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Shichao Zhu Chuan Zhou Shirui Pan Xingquan Zhu Bin Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Faculty of Information Technology Monash University Melbourne Australia Dept. of Computer & Electrical Engineering and Computer Science Florida Atlantic University Boca Raton USA Xiaomi AI Lab Beijing China
Heterogeneous graphs with different types of nodes and edges are ubiquitous and have immense value in many applications. Existing works on modeling heterogeneous graphs usually follow the idea of splitting a heterogen...
来源: 评论
E-trade Management System Architecture
E-trade Management System Architecture
收藏 引用
IEEE International Conference on Advanced Trends in Information Theory (ATIT)
作者: Oleg Pursky Anna Selivanova Oleksander Kharchenko Pavlo Demidov Volodymyr Kulazhenko department of computer science Kyiv national university of trade and economics Kyiv Ukraine department of software engineering and cyber security Kyiv national university of trade and economics Kyiv Ukraine department of cybernetics and system analysis Kyiv national university of trade and economics Kyiv Ukraine
In this work we present the model for construction of e-trade management system architecture which consists of two basic blocks: the landing Web-pages management unit of the online store is responsible for interacting... 详细信息
来源: 评论
Coherence-based automated essay scoring using self-attention  17th
Coherence-based automated essay scoring using self-attention
收藏 引用
17th China National Conference on Computational Linguistics, CCL 2018 and 6th International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2018
作者: Li, Xia Chen, Minping Nie, Jianyun Liu, Zhenxing Feng, Ziheng Cai, Yingdan Key Laboratory of Language Engineering and Computing Guangdong University of Foreign Studies Guangzhou China School of Information Science and Technology/School of Cyber Security Guangdong University of Foreign Studies Guangzhou China Department of Computer Science and Operations Research University of Montreal Montreal Canada
Automated essay scoring aims to score an essay automatically without any human assistance. Traditional methods heavily rely on manual feature engineering, making it expensive to extract the features. Some recent studi... 详细信息
来源: 评论
Structural transition in interdependent networks with regular interconnections
收藏 引用
Physical Review E 2019年 第1期99卷 012311-012311页
作者: Xiangrong Wang Robert E. Kooij Yamir Moreno Piet Van Mieghem Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft The Netherlands iTrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore Institute for Biocomputation and Physics of Complex Systems (BIFI) University of Zaragoza Zaragoza 50009 Spain Department of Theoretical Physics University of Zaragoza Zaragoza 50009 Spain ISI Foundation Turin Italy
Networks are often made up of several layers that exhibit diverse degrees of interdependencies. An interdependent network consists of a set of graphs G that are interconnected through a weighted interconnection matrix... 详细信息
来源: 评论
NTIRE 2021 challenge on video super-resolution
arXiv
收藏 引用
arXiv 2021年
作者: Son, Sanghyun Lee, Suyoung Nah, Seungjun Timofte, Radu Lee, Kyoung Mu Chan, Kelvin C.K. Zhou, Shangchen Xu, Xiangyu Loy, Chen Change Jiang, Boyuan Lin, Chuming Dong, Yuchun Luo, Donghao Chu, Wenqing Ji, Xiaozhong Yang, Siqian Tai, Ying Wang, Chengjie Li, Jilin Huang, Feiyue Chen, Chengpeng Chu, Xiaojie Zhang, Jie Lu, Xin Chen, Liangyu Lin, Jing Du, Guodong Hao, Jia Zou, Xueyi Zhang, Qi Jiang, Lielin Li, Xin Zheng, He Liu, Fanglong He, Dongliang Li, Fu Dang, Qingqing Yi, Peng Wang, Zhongyuan Jiang, Kui Jiang, Junjun Ma, Jiayi Chen, Yuxiang Wang, Yutong Liu, Ting Sun, Qichao Liang, Huanwei Li, Yiming Li, Zekun Ruan, Zhubo Shang, Fanjie Guo, Chen Li, Haining Luo, Renjun Shen, Longjie Zafirouli, Kassiani Karageorgos, Konstantinos Konstantoudakis, Konstantinos Dimou, Anastasios Daras, Petros Song, Xiaowei Zhuo, Xu Liu, Hanxi Guo, Mengxi Li, Junlin Li, Yu Zhu, Ye Wang, Qing Zhao, Shijie Sun, Xiaopeng Zhan, Gen Xie, Tangxin Jia, Yu Lu, Yunhua Zhang, Wenhao Sun, Mengdi Michelini, Pablo Navarrete Zhang, Xueheng Jiang, Hao Chen, Zhiyu Chen, Li Xiong, Zhiwei Xiao, Zeyu Xu, Ruikang Cheng, Zhen Fu, Xueyang Song, Fenglong Luo, Zhipeng Yao, Yuehan Dutta, Saikat Shah, Nisarg A. Das, Sourya Dipta Zhao, Peng Shi, Yukai Liu, Hongying Shang, Fanhua Liu, Yuanyuan Chen, Fei Yu, Fangxu Gao, Ruisheng Bai, Yixin Heo, Jeonghwan Yue, Shijie Li, Chenghua Li, Jinjing Zheng, Qian Gang, Ruipeng Song, Ruixia Wee, Seungwoo Jeong, Jechang Li, Chen Wen, Geyingjie Chai, Xinning Song, Li Department of ECE ASRI SNU Korea Republic of Computer Vision Lab ETH Zurich Switzerland S-Lab Nanyang Technological University Singapore YouTu Lab Tencent East China Normal University China Megvii Peking University China Fudan University China Noah's Ark Lab Huawei Canada Technologies Co. Ltd Baidu Inc National Engineering Research Center for Multimedia Software Wuhan University China School of Computer Science and Technology Harbin Institute of Technology China Electronic Information School Wuhan University China School of Computer Science and Engineering University of Electronic Science and Technology of China China MTlab Meitu Inc Xidian university China ITI CERTH Greece Southeast University China Tencent PCG South China University of Technology China ByteDance Sun Yat-Sen University China Electronic Technology Cyber Security Co. Ltd. AIoT R&D Centre BOE Technology Group Co. Ltd. Shanghai Jiao Tong University China University of Science and Technology of China China Huawei Noah's Ark Lab DeepBlue Technology Shanghai Co. Ltd Indian Institute of Technology Madras India Indian Institute of Technology Jodhpur India Jadavpur University India Xidian University China Hanyang University Korea Republic of NCUT China CASIA China CUC China NRTA China
Super-Resolution (SR) is a fundamental computer vision task that aims to obtain a high-resolution clean image from the given low-resolution counterpart. This paper reviews the NTIRE 2021 Challenge on Video Super-Resol... 详细信息
来源: 评论
Targeted Malicious Email Detection using Hypervisor-based Dynamic Analysis and Ensemble Learning
Targeted Malicious Email Detection using Hypervisor-based Dy...
收藏 引用
IEEE Global Communications Conference
作者: Jian Zhang Zhaojun Gu Wenzhen Li Liangyi Gong Jeffrey Wu School of Computer Science and Engineering Tianjin University of Technology College of Cyber Science Nankai University Tianjin China School of Computer Science and Engineering Tianjin University of Technology Tianjin China School of Software and BNRist Tsinghua University Beijing China Information Security Evaluation Center of Civil Aviation Civil Aviation University of China Tianjin China Jiaxing Chenxiang Information Technology Co. Ltd. Jiaxing China
At present, email is still one of the most frequently used communication tools for organizations and individuals. With the leakage of personal privacy information, targeted malicious email (TME) is becoming a prominen... 详细信息
来源: 评论
Towards the Trust-Enhancements of Single Sign-On Services
Towards the Trust-Enhancements of Single Sign-On Services
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Xuhua Bao Xiaokun Zhang Jingqiang Lin Dawei Chu Qiongxiao Wang Fengjun Li Legendsec Information Technology (Beijing) Inc. CHINA Joint Laboratory of Institute of Information Engineering Chinese Academy of Sciences and QiAnXin Group Academy of Opto-Electronics Chinese Academy of Sciences State Key Laboratory of Information Security Chinese Academy of Sciences Data Assurance and Communication Security Research Center Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Department of Electrical Engineering and Computer Science University of Kansas USA
Single sign-on (SSO) becomes popular as the identity management and authentication infrastructure in the Internet. A user receives an SSO ticket after being authenticated by the identity provider (IdP), and this IdP-i... 详细信息
来源: 评论
A blockchain-based architecture framework for secure sharing of personal health data  20
A blockchain-based architecture framework for secure sharing...
收藏 引用
20th IEEE International Conference on e-Health Networking, Applications and Services, Healthcom 2018
作者: Amofa, Sandro Sifah, Emmanuel Boateng Obour Agyekum, Kwame O.-B. Abla, Smahi Xia, Qi Gee, James C. Gao, Jianbin School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China Department of Radiology University of Pennsylvania Philadelphia United States School of Resource and Enviroment Center for Digital Health University of Electronic Science and Technology China
Health information exchanges have been popular for some time with their advantages known and widely researched. In spite of their utility in increasing provider efficiency and decreasing administrative costs, one chal... 详细信息
来源: 评论
Domain-Adversarial Graph Neural Networks for Text Classification
Domain-Adversarial Graph Neural Networks for Text Classifica...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Man Wu Shirui Pan Xingquan Zhu Chuan Zhou Lei Pan Dept. of Computer & Electrical Engineering and Computer Science Florida Atlantic University Boca Raton USA Faculty of Information Technology Monash University Melbourne Australia Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Information Technology Deakin University Geelong VIC Australia
Text classification, in cross-domain setting, is a challenging task. On the one hand, data from other domains are often useful to improve the learning on the target domain; on the other hand, domain variance and hiera...
来源: 评论