咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是2391-2400 订阅
排序:
Erratum to “High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators”
收藏 引用
security and Communication Networks 2020年 第1期2020卷
作者: Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 *** Data Assurance and Communications Security Research Center Chinese Academy of Sciences Beijing 100093 *** School of Cyber Security University of Chinese Academy of Sciences Beijing 100093 *** China Information Technology Security Evaluation Center Beijing 100085 *** School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 100093 ***
来源: 评论
The method of factorizing multi-digit numbers based on the operation of adding odd numbers  8
The method of factorizing multi-digit numbers based on the o...
收藏 引用
8th International Conference Advanced computer Information Technologies, ACIT 2018
作者: Kasianchuk, Mykhailo Yakymenko, Igor Ivasiev, Stepan Shevchuk, Ruslan Tymoshenko, Lidiya Department of Computer Engineering Ternopil National Economic University 8 Chekhova str. Ternopil Ukraine Department of Cyber Security Ternopil National Economic University 8 Chekhova str. Ternopil Ukraine Department of Computer Science Ternopil National Economic University 8 Chekhova str. Ternopil Ukraine Department of Computer Science and Information Systems Management Odesa National Polytechnic University 1 Shevchenko Str. Odesa Ukraine
The method for factorizing multi-digit numbers based on the addition of odd numbers is developed in this article. The temporal characteristics of software implementations of the proposed method, the classical Fermat m... 详细信息
来源: 评论
Fast stochastic ordinal embedding with variance reduction and adaptive step size
arXiv
收藏 引用
arXiv 2019年
作者: Ma, Ke Zeng, Jinshan Xiong, Jiechao Xu, Qianqian Cao, Xiaochun Liu, Wei Yao, Yuan School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Information Engineering Jiangxi Normal University NanchangJiangxi330022 China Tencent AI Lab Shenzhen Guangdong China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Department of Mathematics and by courtesy Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
—Learning representation from relative similarity comparisons, often called ordinal embedding, gains rising attention in recent years. Most of the existing methods are based on semi-definite programming (SDP), which ... 详细信息
来源: 评论
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Peapods: OS-Independent Memory Confidentiality for Cryptogra...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Congwu Li Jingqiang Lin Quanwei Cai Bo Luo School of Cyber Security University of Chinese Academy of Sciences Data Assurance and Communication Security Research Center Chinese Academy of Sciences Department of Electrical Engineering and Computer Science The University of Kansas USA
Cryptography is widely adopted in computer systems to protect the confidentiality of sensitive information. The security relies on the assumption that cryptography keys are never leaked, which may be broken by the mem... 详细信息
来源: 评论
Spatiotemporal Knowledge Distillation for Efficient Estimation of Aerial Video Saliency
arXiv
收藏 引用
arXiv 2019年
作者: Li, Jia Fu, Kui Zhao, Shengwei Ge, Shiming State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing100191 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China School of Cyber Security at University of Chinese Academy of Sciences Beijing100095 China
—The performance of video saliency estimation techniques has achieved significant advances along with the rapid development of Convolutional Neural Networks (CNNs). However, devices like cameras and drones may have l... 详细信息
来源: 评论
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures  13th
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minut...
收藏 引用
13th International Conference on Information securityand Cryptology, Inscrypt 2017
作者: Li, Xiangmin Ding, Ning Lu, Haining Gu, Dawu Wang, Shanshan Xu, Beibei Yuan, Yuan Yan, Siyun Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China School of Cyber Security Shanghai Jiao Tong University Shanghai China Information Technology Co. Ltd. Hangzhou China
Biometrics-based cryptosystems are helpful tools facilitating our daily life. Examples are that people use their biometrics to identify themselves in clouds or protect passwords as well as other privacy information in... 详细信息
来源: 评论
PixelSteganalysis: Pixel-wise Hidden Information Removal with Low Visual Degradation
arXiv
收藏 引用
arXiv 2019年
作者: Jung, Dahuin Bae, Ho Choi, Hyun-Soo Yoon, Sungroh The Dept. of Electrical and Computer Engineering Seoul National University Seoul08826 Korea Republic of Dept. of Cyber Security Ewha Womans University Seoul03760 Korea Republic of Dept. of Computer Science & Engineering Interdisciplinary Graduate Program in Medical Bigdata Convergence Kangwon National University Chuncheon 24341 Korea Republic of Ziovision Chuncheon24341 Korea Republic of Interdisciplinary Program in Artificial Intelligence Seoul National University Seoul08826 Korea Republic of
Recently, the field of steganography has experienced rapid developments based on deep learning (DL). DL based steganography distributes secret information over all the available bits of the cover image, thereby posing... 详细信息
来源: 评论
TOWARDS CAMERA IDENTIFICATION FROM CROPPED QUERY IMAGES
TOWARDS CAMERA IDENTIFICATION FROM CROPPED QUERY IMAGES
收藏 引用
IEEE International Conference on Image Processing
作者: Waheeb Yaqub Manoranjan Mohanty Nasir Memon Center for Cyber Security New York University Abu Dhabi UAE Department of Computer Science The University of Auckland New Zealand Department of Computer Science and Engineering New York University New York USA
PRNU (Photo Response Non-Uniformity)-based camera fingerprints are useful for identifying the source camera of an anonymous image. As the query image has to be correlated with each candidate camera fingerprint, one ke... 详细信息
来源: 评论
Corrigendum to "Generation of a local lung respiratory motion model using a weighted sparse algorithm and motion prior-based registration" [Comput. Biol. Med. 123 (2020) 103913]
收藏 引用
computers in biology and medicine 2021年 140卷 104271页
作者: Dong Chen Hongzhi Xie Lixu Gu Jing Liu Liang Tian College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Shijiazhuang China Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Department of Cardiothoracic Surgery Peking Union Medical College Hospital Beijing China. School of Biomedical Engineering Shanghai Jiao Tong University Shanghai China. Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Electronic address: liujing01@***. Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Electronic address: tianliang@***.
来源: 评论
Towards a User and Role-Based Behavior Analysis Method for Insider Threat Detection
Towards a User and Role-Based Behavior Analysis Method for I...
收藏 引用
IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC)
作者: Qiujian Lv Yan Wang Leiqi Wang Dan Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China China School of Cyber Security University of Chinese Academy of Science Beijing China School of Computer and Communication Engineering University of Science and Technology Beijing China
Organizations are experiencing an ever-growing concern of how to identify and defend against insider threats. Existing methods have distinguished the minority of users who show suspicious behavior from the majority of... 详细信息
来源: 评论