咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是2381-2390 订阅
排序:
Collaborative Filtering Method with the use of Production Rules
Collaborative Filtering Method with the use of Production Ru...
收藏 引用
International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)
作者: Amin Salih Mohammed Yelyzaveta Meleshko Saravana Balaji B Semenov Serhii Dept of Computer Engineering Lebanese French University Salahaddin University Erbil KR-Iraq Dept of Cyber Security & Software Central Ukrainian National Technical University Kropyvnytskyi Ukraine Dept of Information Technology Lebanese French University Erbil KR-Iraq Dept of Computer Science and Programming National Technical University (Kharkiv Polytechnic Institute) Ukraine
this paper proposes a new collaborative filtering method with the calculation of unknown similarity coefficients between users via the application of production rules, which aims to improve the work quality of recomme... 详细信息
来源: 评论
Modeling multi-turn conversation with deep utterance aggregation  27
Modeling multi-turn conversation with deep utterance aggrega...
收藏 引用
27th International Conference on Computational Linguistics, COLING 2018
作者: Zhang, Zhuosheng Li, Jiangtong Zhu, Pengfei Zhao, Hai Liu, Gongshen Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University Shanghai200240 China College of Zhiyuan Shanghai Jiao Tong University China School of Cyber Security Shanghai Jiao Tong University China School of Computer Science and Software Engineering East China Normal University China
Multi-turn conversation understanding is a major challenge for building intelligent dialogue systems. This work focuses on retrieval-based response matching for multi-turn conversation whose related work simply concat... 详细信息
来源: 评论
A unified syntax-aware framework for semantic role labeling
A unified syntax-aware framework for semantic role labeling
收藏 引用
2018 Conference on Empirical Methods in Natural Language Processing, EMNLP 2018
作者: Li, Zuchao He, Shexia Cai, Jiaxun Zhang, Zhuosheng Zhao, Hai Liu, Gongshen Li, Linlin Si, Luo Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University Shanghai China School of Cyber Security Shanghai Jiao Tong University China Alibaba Group Hangzhou China
Semantic role labeling (SRL) aims to recognize the predicate-argument structure of a sentence. Syntactic information has been paid a great attention over the role of enhancing SRL. However, the latest advance shows th... 详细信息
来源: 评论
Deep Active Learning for Anchor User Prediction
arXiv
收藏 引用
arXiv 2019年
作者: Cheng, Anfeng Zhou, Chuan Yang, Hong Wu, Jia Li, Lei Tan, Jianlong Guo, Li Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Centre for Artificial Intelligence School of Software FEIT University of Technology Sydney Australia Department of Computing Macquarie University Sydney Australia School of Computer Science and Information Engineering Hefei University of Technology China
Predicting pairs of anchor users plays an important role in the cross-network analysis. Due to the expensive costs of labeling anchor users for training prediction models, we consider in this paper the problem of mini... 详细信息
来源: 评论
Autonomous extraction of a hierarchical structure of tasks in reinforcement learning, a sequential associate rule mining approach
arXiv
收藏 引用
arXiv 2018年
作者: Ghazanfari, Behzad Afghah, Fatemeh Taylor, Matthew E. School of Informatics Computing and Cyber Security Northern Arizona University School of Electrical Engineering and Computer Science Washington State University
Reinforcement learning (RL) techniques, while often powerful, can suffer from slow learning speeds, particularly in high dimensional spaces. Decomposition of tasks into a hierarchical structure holds the potential to ... 详细信息
来源: 评论
Privacy issues and data protection in big data: A case study analysis under GDPR
arXiv
收藏 引用
arXiv 2018年
作者: Gruschka, Nils Mavroeidis, Vasileios Vishi, Kamer Jensen, Meiko Research Group of Information and Cyber Security University of Oslo Norway Faculty of Computer Science and Electrical Engineering Kiel University of Applied Science Germany
Big data has become a great asset for many organizations, promising improved operations and new business opportunities. However, big data has increased access to sensitive information that when processed can directly ... 详细信息
来源: 评论
Password Guessing Time Based on Guessing Entropy and Long-Tailed Password Distribution in the Large-Scale Password Dataset  11
Password Guessing Time Based on Guessing Entropy and Long-Ta...
收藏 引用
2017 11th IEEE International Conference on Anti-counterfeiting,security,and Identification(ASID)
作者: Shuo Zhang Jianping Zeng Zewen Zhang School of Computer Science Fudan University Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education
Currently the password security is serious, but there is not an appropriate metric for measuring passwords. Thus, the main purpose of this paper is to provide a security time period for the user's password in an o... 详细信息
来源: 评论
security and privacy on blockchain
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Rui Xue, Rui Liu, Ling State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences 89 Minzhuang Rd Haidian Dist Beijing Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences 19 Yuquan Rd Shijingshan Dist Beijing Beijing100049 China School of Computer Science Georgia Institute of Technology USA AtlantaGA30332-0765 United States
Blockchain offers an innovative approach to storing information, executing transactions, performing functions, and establishing trust in an open environment. Many consider blockchain as a technology breakthrough for c... 详细信息
来源: 评论
Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks
Malware Detection in Cloud Infrastructures Using Convolution...
收藏 引用
IEEE International Conference on Cloud Computing, CLOUD
作者: Mahmoud Abdelsalam Ram Krishnan Yufei Huang Ravi Sandhu Department of Computer Science Institute for Cyber Security and Center for Security and Privacy Enhanced Cloud Computing Department of Electrical and Computer Engineering University of Texas at San Antonio San Antonio Texas USA
A major challenge in Infrastructure as a Service (IaaS) clouds is its exposure to malware. Malware can spread rapidly within a datacenter and can cause major disruption to a cloud service provider and its clients. Thi... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论