咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是2431-2440 订阅
排序:
PRNU based source attribution with a collection of seam-carved images
PRNU based source attribution with a collection of seam-carv...
收藏 引用
IEEE International Conference on Image Processing
作者: Samet Taspinar Manoranjan Mohanty Nasır Memon Center for Cyber Security New York University Abu Dhabi UAE Department of Computer Science and Engineering New York University New York USA
Photo Response Non-Uniformity (PRNU) noise based source attribution is a well known technique to verify the source camera of an anonymous image or video. Researchers have proposed various counter measures to PRNU base... 详细信息
来源: 评论
Complexity analysis and comparison of test paths based on DSE
Complexity analysis and comparison of test paths based on DS...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Jiawen Lu Lizhi Cai Yang Zhang Keyi Hong Laboratory of Computer Software Testing & Evaluation Shanghai Development Center of Computer Software Technology Shanghai China School of Information Science & Engineering East China University of Science and Technology Shanghai China Cyber Security Department of Shanghai Public Security Bureau Shanghai China
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on D... 详细信息
来源: 评论
Study on Demand Response of Residential Power Customer
收藏 引用
Journal of Power and Energy engineering 2016年 第7期4卷 1-7页
作者: Xiu Cao Haiyong Jiang Lei Huang Xueping Wang Xuqi Zhang School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai China Xinneng Kaibo Industrial Co. Ltd. Shanghai China
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model (MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electri... 详细信息
来源: 评论
Source camera attribution using stabilized video
Source camera attribution using stabilized video
收藏 引用
IEEE International Workshop on Information Forensics and security (WIFS)
作者: Samet Taspinar Manoranjan Mohanty Nasir Memon Center for Cyber Security New York University Abu Dhabi Abu Dhabi UAE Department of Computer Science and Engineering New York University New York USA
Although PRNU (Photo Response Non-Uniformity)-based methods have been proposed to verify the source camera of a non-stabilized video, these methods may not be adequate for stabilized videos. The use of video stabiliza... 详细信息
来源: 评论
Time-Cost Effective Factor of a Midimew Connected Mesh Network
Time-Cost Effective Factor of a Midimew Connected Mesh Netwo...
收藏 引用
International Conference on Information and Communication Technology for the Muslim World (ICT4M)
作者: M.M. Hafizur Rahman Mohammed N.M. Ali Rizal Mohd Nor Tengku Mohd Tengku Sembok M.A.H. Akhand Dept. of Computer Science IIUM Kuala Lumpur Malaysia Cyber Security Center Nat. Defense Univ. Malaysia Kuala Lumpur Malaysia Dept. of Computer Science and Engineering KUET Khulna Bangladesh
Hierarchical Interconnection Network (HIN) is indispensable for the practical implementation of future generation massively parallel computer systems which consists of hundred thousands nodes or even millions of nodes... 详细信息
来源: 评论
Reencryption scheme for secure data sharing
Reencryption scheme for secure data sharing
收藏 引用
International Conference on Communications and Signal Processing
作者: B. Muthusenthil D. Nivetha Hyunsung Kim Dept. of Computer Science and Engineering Valliammai Engineering College Chennai India Dept. of Cyber Security Kyungil University Dept. of Mathematical Sciences University of Malawi Kyungsan Korea
Cloud computing is an evolutionary model for distributed computing, which consists of centralized data centers providing resources for massive scalable computing. Major security challenges are the generation, distribu... 详细信息
来源: 评论
POM: Power efficient multi-view video streaming over multi-antenna wireless systems
POM: Power efficient multi-view video streaming over multi-a...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhe Chen Xu Zhang Yuedong Xu Xin Wang School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education China School of Information Science and Technology Fudan University Shanghai China
Multi-view video streaming is essential for various mobile 3D and immersive applications that can capture the same scene from multiple angles. However, the large traffic volume of multi-view streaming will drain the b... 详细信息
来源: 评论
PDSDN: A Policy-Driven SDN Controller Improving Scheme for Multi-tenant Cloud Datacenter Environments
PDSDN: A Policy-Driven SDN Controller Improving Scheme for M...
收藏 引用
IEEE International Conference on Services Computing (SCC)
作者: Xuekai Du Zhihui Lv Jie Wu Chengrong Wu Shi Chen School of Computer Science Fudan University Shanghai China Fudan University Shanghai Shanghai CN Auditing and Monitoring Ministry of Education Engineering Research Center of Cyber Security Shanghai China
There is a trend that more and more enterprises utilize SDN (Software Defined Network) technology to manage the network of their cloud platform. For example, cloud computing datacenters define their own virtual networ... 详细信息
来源: 评论
Authorization federation in iaas multi cloud  15
Authorization federation in iaas multi cloud
收藏 引用
3rd ACM International Workshop on security in Cloud Computing, SCC 2015
作者: Pustchi, Navid Krishnan, Ram Sandhu, Ravi Institute for Cyber Security Department of Computer Science Univ of Texas at San Antonio United States Institute for Cyber Security Department of Electrical and Computer Engineering Univ of Texas at San Antonio United States
As more and more organizations move to cloud, it is inevitable that cross-organizational collaboration will need to be supported in the cloud. In this paper, we explore models for collaboration among clouds whose reso... 详细信息
来源: 评论
Author Correction: Multi-label Deep Learning for Gene Function Annotation in Cancer Pathways
收藏 引用
Scientific reports 2018年 第1期8卷 8995页
作者: Renchu Guan Xu Wang Mary Qu Yang Yu Zhang Fengfeng Zhou Chen Yang Yanchun Liang Key Laboratory for Symbol Computation and Knowledge Engineering of National Education Ministry College of Computer Science and Technology Jilin University Changchun 130012 China. MidSouth Bioinformatics Center and Joint Bioinformatics Ph.D. Program of University of Arkansas at Little Rock and Univ. of Arkansas Medical Sciences Little Rock AR 72204 USA. Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Beijing 100093 China. College of Earth Sciences Jilin University Changchun 130061 China. yangc616@***. Key Laboratory for Symbol Computation and Knowledge Engineering of National Education Ministry College of Computer Science and Technology Jilin University Changchun 130012 China. ycliang@***. Zhuhai Laboratory of Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Zhuhai College of Jilin University Zhuhai 519041 China. ycliang@***.
A correction to this article has been published and is linked from the HTML and PDF versions of this paper. The error has not been fixed in the paper.
来源: 评论