咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是2451-2460 订阅
排序:
ESEC: An Ideal Secret Sharing Scheme
ESEC: An Ideal Secret Sharing Scheme
收藏 引用
1st International Conference on Intelligent Computing, Communication and Devices, ICCD 2014
作者: Sarath, Greeshma Deepu, S. Sundararajan, Sudharsan Achuthan, Krishnashree Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri Kollam India Department of Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri Kollam India
Secret sharing techniques have been used to ensure data confidentiality and enable secure reconstruction of data. In this paper, we propose a novel secret sharing scheme called ESEC based on Elliptic Curve Cryptograph... 详细信息
来源: 评论
Multicast adaptive logic for Dynamic Adaptive Streaming over HTTP network
Multicast adaptive logic for Dynamic Adaptive Streaming over...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2015
作者: Dubin, Ran Dvir, Amit Hadar, Ofer Harel, Nissim Barkan, Refael Communication Systems Engineering Ben-Gurion University of the Negev Israel Cyber Security Center Department of Computer Science and Mathematics Ariel University Israel Computer Science Department Holon Institute of Technology Israel Computer Science School College of Management Academic Studies Israel
Video streaming constitutes the vast majority of Internet traffic and the DASH protocol has become the de-facto standard in the industry of multimedia delivery. The multicast method for information distribution has th... 详细信息
来源: 评论
Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment
收藏 引用
Multimedia Tools and Applications 2017年 第21期76卷 22785-22785页
作者: Shen, Jian Tan, Haowen Zhang, Yan Sun, Xingming Xiang, Yang Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer & Software Nanjing University of Information Science and Technology Nanjing China School of Computer & Software Nanjing University of Information Science & Technology Nanjing China Simula Research Laboratory of Norway and the Department of Informatics University of Oslo Oslo Norway Center for Cyber Security Research Deakin University Deakin Australia
来源: 评论
Experience Report: Detecting Poor-Responsive UI in Android Applications
Experience Report: Detecting Poor-Responsive UI in Android A...
收藏 引用
International Symposium on Software Reliability engineering (ISSRE)
作者: Yu Kang Yangfan Zhou Min Gao Yixia Sun Michael R. Lyu Shenzhen Research Institute The Chinese University Hong Kong China Computer Sci. & Eng. Dept. The Chinese Univercity Hong Kong China School of Computer Science Fudan University Shanghai China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China School of Management Zhejiang University Hangzhou Zhejiang China
Good user interface (UI) design is key to successful mobile apps. UI latency, which can be considered as the time between the commencement of a UI operation and its intended UI update, is a critical consideration for ... 详细信息
来源: 评论
Erratum to “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model”
收藏 引用
security and Communication Networks 2017年 第1期2017卷
作者: Guomin Zhou Peng Zeng Xiaohui Yuan Siyuan Chen Kim-Kwang Raymond Choo Department of Computer and Information Technology Zhejiang Police College Hangzhou Zhejiang Province *** Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai *** Department of Computer Science and Engineering University of North Texas Denton TX 76203 USAunt.edu College of Information Engineering China University of Geosciences Wuhan *** Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249 USAutsa.edu
来源: 评论
A novel adaptive image zooming scheme via weighted least-squares estimation
收藏 引用
Frontiers of computer science 2015年 第5期9卷 703-712页
作者: Xuexia ZHONG Guorui FENG Jian WANG Wenfei WANG Wen SI Cyber Physical System Research and Development Center The Third Research Institute of Ministry of Public Security Shanghai 201204 China School of Communication and Information Engineering Shanghai University Shanghai 200444 China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai 200240 China Shanghai Chenrui Information Technology Company Shanghai 201204 China College of Information and Computer Science Shanghai Business School Shanghai 201400 China
A critical issue in image interpolation is preserving edge detail and texture information in images when zooming. In this paper, we propose a novel adaptive image zooming algorithm using weighted least-square estimati... 详细信息
来源: 评论
Bring-Your-Own-Application (BYOA): Optimal Stochastic Application Migration in Mobile Cloud Computing
Bring-Your-Own-Application (BYOA): Optimal Stochastic Applic...
收藏 引用
IEEE Global Communications Conference
作者: Jonathan Chase Dusit Niyato Sivadon Chaisiri School of Computer Engineering Nanyang Technological University Cyber Security Lab Department of Computer Science University of Waikato
The increasing popularity of using mobile devices in a work context, has led to the need to be able to support more powerful computation. Users no longer remain in an office or at home to conduct their activities, pre... 详细信息
来源: 评论
Privacy Preservation and Protection Scheme over ALARM on Geographical Routing
Privacy Preservation and Protection Scheme over ALARM on Geo...
收藏 引用
International Conference on security Technology, SECTECH
作者: B. Muthusenthil S. Murugavalli Hyunsung Kim Dept. of Computer Science and Engineering Valliammai Engineering College Dept. of Computer Science and Engineering Panimalar Engineering College Dept. of Cyber Security Kyungil University
Routing and security is a major issue in mobile ad-hoc networks due to dynamic network topology. Each node may compromise the packet routing functionality by disrupting the route discovery technique. Clustering divide... 详细信息
来源: 评论
Physical layer security in wireless cooperative relay networks: State of the art and beyond
Physical layer security in wireless cooperative relay networ...
收藏 引用
作者: Rodriguez, Leonardo Jimenez Tran, Nghi H. Duong, Trung Q. Le-Ngoc, Tho Elkashlan, Maged Shetty, Sachin McGill University MontrealQC Canada Department of Electrical and Computer Engineering University of Akron OH United States Queen's University Belfast United Kingdom Department of Electrical and Computer Engineering McGill University Canada School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Cyber Security Laboratory TSU Interdisciplinary Graduate Engineering Research Institute United States
Cooperative relaying is an effective method of increasing the range and reliability of wireless networks, and several relaying strategies have been adopted in major wireless standards. Recently, cooperative relaying h... 详细信息
来源: 评论
security and Privacy Framework for Academic Monitoring System
Security and Privacy Framework for Academic Monitoring Syste...
收藏 引用
International Conference on security Technology, SECTECH
作者: B. Muthusenthil C. Vijayakumaran Hyunsung Kim Dept. of Computer Science and Engineering Valliammai Enzineering College Dept. of Computer Science and Engineering Valliammai Engineering College Dept. of Cyber Security Kyungil University
Mobile device based academic monitoring system (AMS) are inherently open systems and thereby vulnerable to various attacks. This paper proposes a security and privacy framework for AMS, which is based on a security mo... 详细信息
来源: 评论