咨询与建议

限定检索结果

文献类型

  • 1,611 篇 会议
  • 963 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,517 篇 工学
    • 1,251 篇 计算机科学与技术...
    • 1,046 篇 软件工程
    • 405 篇 信息与通信工程
    • 253 篇 控制科学与工程
    • 245 篇 电气工程
    • 201 篇 生物工程
    • 140 篇 网络空间安全
    • 125 篇 电子科学与技术(可...
    • 98 篇 安全科学与工程
    • 89 篇 生物医学工程(可授...
    • 68 篇 机械工程
    • 64 篇 交通运输工程
    • 57 篇 化学工程与技术
    • 54 篇 光学工程
    • 50 篇 动力工程及工程热...
    • 49 篇 仪器科学与技术
  • 607 篇 理学
    • 297 篇 数学
    • 214 篇 生物学
    • 125 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 68 篇 系统科学
    • 60 篇 化学
  • 412 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 110 篇 工商管理
  • 126 篇 法学
    • 82 篇 社会学
  • 112 篇 医学
    • 86 篇 基础医学(可授医学...
    • 86 篇 临床医学
    • 60 篇 公共卫生与预防医...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 126 篇 deep learning
  • 118 篇 feature extracti...
  • 107 篇 training
  • 99 篇 machine learning
  • 98 篇 security
  • 82 篇 computational mo...
  • 79 篇 real-time system...
  • 76 篇 internet of thin...
  • 74 篇 privacy
  • 64 篇 blockchain
  • 58 篇 support vector m...
  • 58 篇 predictive model...
  • 50 篇 cloud computing
  • 50 篇 data models
  • 49 篇 artificial intel...
  • 47 篇 convolutional ne...
  • 44 篇 semantics
  • 43 篇 reliability
  • 43 篇 neural networks

机构

  • 233 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 37 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 31 篇 school of comput...
  • 28 篇 purple mountain ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 45 篇 cao xiaochun
  • 41 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 35 篇 huang qingming
  • 35 篇 xu qianqian
  • 33 篇 jin hai
  • 29 篇 hai jin
  • 26 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 zhou yu
  • 22 篇 kim-kwang raymon...
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 ma jianfeng
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou

语言

  • 1,925 篇 英文
  • 664 篇 其他
  • 17 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2596 条 记 录,以下是2411-2420 订阅
排序:
The impact of predators on Malicious Worms propagation: A theoretical approach
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2018年 第3期45卷 371-376页
作者: Zhu, Qingyi Jiang, Yi Zhang, Ye School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer Science Chongqing University of Posts and Telecommunications Chongqing China School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing China
Predators, a class of programs that can travel over Internet, and replicate and multiply themselves, are specifically designed to eliminate the computer viruses. To better understand the effects of predators on virus ... 详细信息
来源: 评论
Reversible data hiding scheme with edge-direction predictor and modulo operation
Reversible data hiding scheme with edge-direction predictor ...
收藏 引用
作者: Kim, Dae-Soo Yoon, Eun-Jun Kim, Cheonshik Yoo, Kee-Young School of Computer Science and Engineering College of IT Engineering Kyungpook National University 1370 Sankyuk-Dong Buk-Gu Daegu702-701 Korea Republic of Department of Cyber Security Kyungil University 50 Gamasil-Gil Hayang-Eup Gyenggsan-SiGyeongbuk712-701 Korea Republic of Department of Digital Media Engineering Anyang University 708-113 Anyang 5-dong Manan-gu Anyang-shiKyonggi-do430-714 Korea Republic of
Since the first histogram shifting technique was proposed by Ni et al., many histogram based data hiding methods were proposed to improve their scheme. One of the methods is using difference value between cover image ... 详细信息
来源: 评论
A real-time secret image sharing with fairness
A real-time secret image sharing with fairness
收藏 引用
作者: Lee, Gil-Je Yoon, Eun-Jun Kim, Cheonshik Yoo, Kee-Young School of Computer Science and Engineering College of IT Engineering Kyungpook National University 1370 Sankyuk-Dong Buk-Gu Daegu702-701 Korea Republic of Department of Cyber Security Kyungil University 50 Gamasil-Gil Hayang-Eup Gyenggsan-SiGyeongbuk712-701 Korea Republic of Department of Digital Media Engineering Anyang University 708-113 Anyang 5-dong Manan-gu Anyang-shiKyonggi-do430-714 Korea Republic of
When traditional secret image sharing techniques reconstructed the secret, they input the shares over t. While less than t shares can know nothing about the secret, the problem arises when there are more than t shares... 详细信息
来源: 评论
The World of Malware: An Overview
The World of Malware: An Overview
收藏 引用
International Conference on Future Internet of Things and Cloud (FiCloud)
作者: Anitta Patience Namanya Andrea Cullen Irfan U. Awan Jules Pagna Disso Faculty of Science and Technology Ankole Western University Sheema Uganda School of Electrical Engineering and Computer Science University of Bradford Bradford UK Research and Development Nettitude Intelligent Cyber Security and Risk Management Leamington Spa UK
Malware, short for malicious software is a program code that is hostile and often used to corrupt or misuse a system. Introducing malware into a computer network environment has different effects depending on the desi... 详细信息
来源: 评论
Seeing isn’t believing: Towards more robust adversarial attack against real world object detectors
arXiv
收藏 引用
arXiv 2018年
作者: Zhao, Yue Zhu, Hong Liang, Ruigang Shen, Qintao Zhang, Shengzhi Chen, Kai SKLOIS Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Department of Computer Science Metropolitan College Boston University United States
Recently Adversarial Examples (AEs) that deceive deep learning models have been a topic of intense research interest. Compared with the AEs in the digital space, the physical adversarial attack is considered as a more... 详细信息
来源: 评论
Cluster-Aware Kronecker Supported Data Collection for Sensory Data
Cluster-Aware Kronecker Supported Data Collection for Sensor...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Siguang Chen Zhihao Wang Kewei Sha Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and Telecommunications Nanjing China Department of Computer Science & Cyber Security Institute University of Houston-Clear Lake Houston TX
Although current proposed compression schemes achieve a better performance compared with traditional data compression schemes, they have not fully exploited the spatial and temporal correlations among the data. Well-d... 详细信息
来源: 评论
Contract-Based Content Delivery in 5G Converged Networks
收藏 引用
China Communications 2017年 第12期14卷 120-133页
作者: Xiaoyuan Lu Yiqing Li Xiaoying Gan Yanwei Xu Jun Yao School of Computer Science Fudan University Shanghai China Dept. of Electronics Engineering Shanghai Jiao Tong University Shanghai 200240 China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China Shanghai Engineering Research Center for Broadband Technologies & Applications China Philips Lighting Research China
Mobile broadcasting services provided by converged networks do aid in satisfying users' demands for popular multimedia content while unicasting services offer personalized experiences for *** analyze hybrid broadc... 详细信息
来源: 评论
Non-reciprocity compensation combined with turbo codes for secret key generation in vehicular ad hoc social IoT networks
arXiv
收藏 引用
arXiv 2018年
作者: Epiphaniou, Gregory Karadimas, Petros Ismail, Dhouha Kbaier Ben Al-Khateeb, Haider Dehghantanha, Ali Choo, Kim-Kwang Raymond School of Computer Science and Technology University of Bedfordshire United Kingdom School of Engineering University of Glasgow Scotland United Kingdom School of Computer Science and Engineering University of Salford United Kingdom Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX United States
—The physical attributes of the dynamic vehicle-to-vehicle (V2V) propagation channel can be utilised for the generation of highly random and symmetric cryptographic keys. However, in physical-layer key agreement, non... 详细信息
来源: 评论
Gated fusion network for single image dehazing
arXiv
收藏 引用
arXiv 2018年
作者: Ren, Wenqi Ma, Lin Zhang, Jiawei Pan, Jinshan Cao, Xiaochun Liu, Wei Yang, Ming-Hsuan IIE Cas Tencent Ai Lab City University of Hong Kong Nanjing University of Science and Technology School of Cyber Security University of Chinese Academy of Sciences University of California Electrical Engineering and Computer Science Merced United States
In this paper, we propose an efficient algorithm to directly restore a clear image from a hazy input. The proposed algorithm hinges on an end-to-end trainable neural network that consists of an encoder and a decoder. ... 详细信息
来源: 评论
MCP: A multi-component learning machine to predict protein secondary structure
arXiv
收藏 引用
arXiv 2018年
作者: Khalatbari, Leila Kangavari, M.R. Hosseini, Saeid Yin, Hongzhi Cheung, Ngai-Man School of Computer Engineering Iran University of Science and Technology Tehran Iran ST Electronics SUTD Cyber Security Laboratory Singapore University of Technology and Design Singapore School of Information Technology and Electrical Engineering University of Queensland Brisbane Australia
The Gene or DNA sequence in every cell does not control genetic prop-erties on its own Rather, this is done through translation of DNA into protein and subsequent formation of a certain 3D structure. The biological fu... 详细信息
来源: 评论