咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是281-290 订阅
排序:
Bl-IEA: A Bit-Level Image Encryption Algorithm using Transformation and Chaotic Skew Tent Map based Substitution for Fingerprint Images
Bl-IEA: A Bit-Level Image Encryption Algorithm using Transfo...
收藏 引用
Electrical, Electronics, Information and Communication Technologies (ICEEICT), International Conference on
作者: Aditya G Kulkarni Prajwalasimha S N Naveen Kulkarni Deepthika Karuppusamy Raveena Dharmappa Yash Bagga Department of Computer Science and Engineering (Cyber Security) School of Engineering (SoE) Dayananda Sagar University Bangalore India
In order to fortify pre-stored biometric data of fingerprint samples in the biometric authentication system, a hybrid approach based on Pseudo Hadamard transformation and Skew Tent chaotic substitution is proposed. In... 详细信息
来源: 评论
PPO-Based Mobile Robot Path Planning with Dense Bootstrap Reward in Partially Observable Environments
PPO-Based Mobile Robot Path Planning with Dense Bootstrap Re...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Zhou Shujie School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu China
Path planning in large, complex environments poses significant challenges, as a single robot must efficiently navigate to its target while avoiding obstacles. Traditional algorithms often struggle to balance computati... 详细信息
来源: 评论
An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network
An Adaptive Threat Defence Mechanism Through Self Defending ...
收藏 引用
Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS), International Conference on
作者: Datta Sai Manikanta Narayana Sai Bharadwaj Nookala Shraddha Chopra Udhayakumar Shanmugam Department of Computer Science and Engineering (Cyber Security) School of Computing Chennai
IEEE 802.11 generally known as the Wi-Fi network, is our backbone of the present communication system delivering the best effort service to the end users. Access control in wireless network is an intrinsic security pr...
来源: 评论
On the security of Smart Home Systems:A Survey
收藏 引用
Journal of computer science & Technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Point-of-Interest Recommendation
Dynamic Graph-Enhanced Sequential LSTM for Context-Aware Poi...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Zhang Yuwen Ren Shaobo School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu China
Next Point-of-Interest (POI) recommendation is a critical task in location-based services, aiming to predict the user's next POI based on historical check-in data. Existing approaches often rely on static graphs o... 详细信息
来源: 评论
Sine Cosine Reptile Search Algorithm with Grid Search Support Vector Machine based Ransomware Detection and Classification  2
Sine Cosine Reptile Search Algorithm with Grid Search Suppor...
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Adnan, Myasar Mundher Devi, S. Vaag Deepthi, V.S. Raghunathareddy, M.V. Yamsani, Nagendar The Islamic University Najaf Iraq City Engineering College Department of Artificial Intelligence and Machine Learning Karnataka Bangalore India Cyber Security Dayananda Sagar College of Engineering Department of Computer Science and Engineering Karnataka Bangalore India Nitte Meenakshi Institute of Technology Department of Electronics and Communication Engineering Bengaluru India SR University School of Computer Science and Artificial Intelligence Warangal India
The ransomware exploits the system data and takes off the significant information of the user without any intimation. Moreover, the ransomware furtively directs that information to the servers which are organized by t... 详细信息
来源: 评论
FEDA: Private-Preserving Data Aggregation for Smart Grid via Functional Encryption
FEDA: Private-Preserving Data Aggregation for Smart Grid via...
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: LI ZHENJIANG LI HONGWEI QIAN XINYUAN School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu China
Privacy-preserving data aggregation (P2DA) is a technique that enables the simultaneous availability of data and the preservation of privacy in smart grid systems. However, existing methods are only capable of fulfill... 详细信息
来源: 评论
Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection
Universal Watermark Vaccine: Universal Adversarial Perturbat...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Chen, Jianbo Liu, Xinwei Liang, Siyuan Jia, Xiaojun Xun, Yuan Hunan University College of Computer Science and Electronic Engineering Hunan China Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
As computing ability continues to rapidly develop, neural networks have found widespread use in various fields. However, in the realm of visible watermarking for image copyright protection, neural networks have made i... 详细信息
来源: 评论
Multi-Behavioral Recommender System with Heterogeneous Graph Learning
Multi-Behavioral Recommender System with Heterogeneous Graph...
收藏 引用
Consumer Electronics and computer engineering (ICCECE), 2021 IEEE International Conference on
作者: Jiaming Feng Yang Liu Junjie Zhang School of Computer Science and Engineering (School of Cyber Security) University of Electronic Science and Technology of China Chengdu China
With the rapid development of online platforms and the explosive growth of user-generated data, personalized recommendation systems have become increasingly crucial in delivering relevant content to users. Traditional...
来源: 评论
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection  24th
BlockWhisper: A Blockchain-Based Hybrid Covert Communication...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Zehui Xu, Yuwei Huang, Ranfeng Fan, Xinhe Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Software College Northeastern University Shenyang China College of Computer Science Nankai University Tianjin China
In light of the pervasive significance of privacy protection in contemporary society, the exploration of covert communication technology has been extensive, which is designed to safeguard communication behaviors and c... 详细信息
来源: 评论