咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是2501-2510 订阅
排序:
Can people collaborate to improve the relevance of search results?
Can people collaborate to improve the relevance of search re...
收藏 引用
2008 2nd ACM International Conference on Recommender Systems, RecSys'08
作者: Agrahri, Arun Kumar Divya Anand, T.M. Riedl, John Institute of Technology University of Minnesota Twin Cities Computer Science United States Amrita School of Engineering Amrita Vishwa Vidyapeetham Cyber Security India
Search engines are among the most-used resources on the internet. However, even today's most successful search engines struggle to provide high quality search results. According to recent studies as many as 50 per... 详细信息
来源: 评论
QoS Aware Dependable Distributed Stream Processing
QoS Aware Dependable Distributed Stream Processing
收藏 引用
International Symposium on Object-Oriented Real-Time Distributed Computing
作者: Vana Kalogeraki Dimitrios Gunopulos Ravi Sandhu Bhavani Thuraisingham Department of Computer Science & Engineering University of California Riverside USA Institute for Cyber Security University of Technology San Antonio USA Department of Computer Science University of Technology Dallas USA
In this paper we describe our approach for developing a QoS-aware, dependable execution environment for large-scale distributed stream processing applications. Distributed stream processing applications have strong ti... 详细信息
来源: 评论
Efficient linear array for multiplication over NIST recommended binary fields
Efficient linear array for multiplication over NIST recommen...
收藏 引用
6th International Workshop - Fuzzy Logic and Applications
作者: Kwon, Soonhak Kwon, Taekyoung Park, Young-Ho Inst. of Basic Science Dept. of Mathematics Sungkyunkwan University Suwon 440-746 Korea Republic of School of Computer Engineering Sejong University Seoul 143-747 Korea Republic of Dept. of Information Security Sejong Cyber University Seoul 143-747 Korea Republic of
We propose a new linear array for multiplication in GF(2m) which outperforms most of the existing linear multipliers in terms of the area and time complexity. Moreover we will give a very detailed comparison of our ar... 详细信息
来源: 评论
Localized public-key management for mobile ad hoc networks
Localized public-key management for mobile ad hoc networks
收藏 引用
IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
作者: Ruidong Li Jie Li H. Kameda Peng Liu University of Tsukuba Tsukuba Japan Department of Computer Science Graduate School of Systems and Information Engineering University of Tsukuba Tsukuba Japan Cyber Security Lab School of Information Sciences and Technology Pennsylvania State University University Park USA
A mobile ad hoc network (MANET) is the cooperative engagement of a collection of wireless mobile nodes without aid of any established infrastructure or centralized administration. The conventional security solutions t... 详细信息
来源: 评论
TALENT: Targeted Mining of Non-overlapping Sequential Patterns
收藏 引用
ACM Transactions on Management Information Systems 1000年
作者: Zefeng Chen Wensheng Gan Gengsen Huang Zhenlian Qi Yan Li Philip S. Yu College of Cyber Security Jinan University Guangzhou China School of Information Engineering Guangdong Eco-Engineering Polytechnic Guangzhou China Hebei University of Technology Tianjin China Department of Computer Science University of Illinois at Chicago Chicago United States
With the widespread application of sequential pattern mining (SPM) algorithms, sequential patterns that allow gap constraints are valuable for discovering knowledge from biological data such as DNA and protein sequenc... 详细信息
来源: 评论
Computational science and Its Applications – ICCSA 2012  1
收藏 引用
丛书名: Lecture Notes in computer science
1000年
作者: Beniamino Murgante Osvaldo Gervasi Sanjay Misra Nadia Nedjah Ana Maria A. C. Rocha David Taniar Bernady O. Apduhan
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. ... 详细信息
来源: 评论
Online Learning from Mix-typed, Drifted, and Incomplete Streaming Features
收藏 引用
ACM Transactions on Knowledge Discovery from Data 1000年
作者: Shengda Zhuo Di Wu Yi He Shuqiang Huang Xindong Wu College of Cyber Security Jinan University Guangzhou Guangdong China College of Computer and Information Science Southwest University Chongqing China School of Computing Data Science and Physics William & Mary Williamsburg VA USA Key Laboratory of Knowledge Engineering with Big Data the Ministry of Education of China) School of Computer Science and Information Engineering Hefei University of Technology Hefei Anhui China
Online learning, where feature spaces can change over time, offers a flexible learning paradigm that has attracted considerable attention. However, it still faces three significant challenges. First, the heterogeneity... 详细信息
来源: 评论
Advanced Multimedia and Ubiquitous engineering  1
收藏 引用
丛书名: Lecture Notes in Electrical engineering
1000年
作者: James J. Park Vincenzo Loia Kim-Kwang Raymond Choo Gangman Yi
来源: 评论
Wireless Networks  1
收藏 引用
丛书名: Advanced sciences and Technologies for security Applications
1000年
作者: Hamid Jahankhani Ayman El Hajjar
来源: 评论
Applied Quantum Computing and Cryptography  1
Applied Quantum Computing and Cryptography
收藏 引用
丛书名: Studies in Big Data
1000年
作者: Marius Iulian Mihailescu Stefania Loredana Nita Valentina Marascu Valentin Barna
This book explores the dynamically developing areas of quantum computing and quantum cryptography. The book offers an in-depth examination of the possibilities and difficulties presented by these revolutionary technol... 详细信息
来源: 评论