咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 941 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,464 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 1,017 篇 软件工程
    • 371 篇 信息与通信工程
    • 225 篇 控制科学与工程
    • 214 篇 电气工程
    • 200 篇 生物工程
    • 118 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 591 篇 理学
    • 285 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 51 篇 school of cyber ...
  • 50 篇 college of cyber...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 33 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...

语言

  • 2,073 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2532 条 记 录,以下是21-30 订阅
排序:
Secure and Efficient Blockchain-Based Access Control Scheme with Attribute Update
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 1539-1550页
作者: Zuo, Yuting Xu, Li Li, Jiguo Li, Jie Wang, Xiaoding Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Lab Shanghai200240 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
Secure data access control is widely concerned in cyber Physical Systems (CPSs) to protect consumer rights. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an ideal solution that supports fine-grained access ... 详细信息
来源: 评论
Real-time Autonomous Vehicle Maneuver Generation Algorithm Based on Hierarchical Planning  24
Real-time Autonomous Vehicle Maneuver Generation Algorithm B...
收藏 引用
2024 Guangdong-Hong Kong-Macao Greater Bay Area International Conference on Digital Economy and Artificial Intelligence, DEAI 2024
作者: Zhai, WenHao School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Sichua Chengdu China
Global path planning, whether based on sampling-based algorithms or heuristic search algorithms, can search for a global path from the start point to the destination in a relatively short time. However, they often str... 详细信息
来源: 评论
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science and Engineering University College of EngineeringTindivanamMelpakkamTamil nadu 604001India Department of Computer Engineering National Institute of Technology KurukshetraIndia
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri... 详细信息
来源: 评论
FEDA: Private-Preserving Data Aggregation for Smart Grid via Functional Encryption  21
FEDA: Private-Preserving Data Aggregation for Smart Grid via...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Zhenjiang, Li Hongwei, Li Xinyuan, Qian School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu611731 China
Privacy-preserving data aggregation (P2DA) is a technique that enables the simultaneous availability of data and the preservation of privacy in smart grid systems. However, existing methods are only capable of fulfill... 详细信息
来源: 评论
PPO-Based Mobile Robot Path Planning with Dense Bootstrap Reward in Partially Observable Environments  21
PPO-Based Mobile Robot Path Planning with Dense Bootstrap Re...
收藏 引用
21st International computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Shujie, Zhou School of Computer Science and Engineering School of Cyber Security University of Electronic Science and Technology of China Chengdu611731 China
Path planning in large, complex environments poses significant challenges, as a single robot must efficiently navigate to its target while avoiding obstacles. Traditional algorithms often struggle to balance computati... 详细信息
来源: 评论
Endogenous security of FQn Networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Omni Contextual Aggregation Networks for High-Fidelity Image Inpainting
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 6129-6144页
作者: Peng, Jinjia Li, Mengkai Wang, Bingyan Wang, Huibing Hebei University School of Cyber Security and Computer Hebei China Hebei Machine Vision Engineering Research Center China Dalian Maritime University College of Information Science and Technology Liaoning China
Image inpainting aims to restore a realistic image from a damaged or incomplete version. Although Transformer-based methods have achieved impressive results by modeling long-range dependencies, the inherent quadratic ... 详细信息
来源: 评论
CSA4Rec: Collaborative Signals Augmentation Model Based on GCN for Recommendation  25th
CSA4Rec: Collaborative Signals Augmentation Model Based on ...
收藏 引用
25th International Conference on Web Information Systems engineering, WISE 2024
作者: Liu, Haibo Yu, Lianjie Si, Yali Liu, Jinglian School of Cyber Security and Computer Hebei University Baoding Baoding China School of Computer Science and Engineering Changshu Institute of Technology Suzhou China
Graph Convolution Network (GCN) is a potent deep learning methodology and GCN-based graph data augmentation methods excel in recommender systems. The augmented data, as the higher-order collaborative signals, is gener... 详细信息
来源: 评论
Electromagnetic Radiation Effects in Human and Animal Health  14
Electromagnetic Radiation Effects in Human and Animal Health
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Singh, Jagjot Kumar, Sanu Johnson, Derick Mathew Savita Department of Computer Science Engineering Spl. Digital Forensics and Cyber Security India
Electromagnetic (EM) radiations are the waves of electromagnetic and magnetic field which are generated from electromagnetic devices. These radiations are dangerous to humans as well as animal health. Talking medicall... 详细信息
来源: 评论
Exploring the landscape of network security: a comparative analysis of attack detection strategies
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3211-3228页
作者: Rajesh Kanna, P. Santhi, P. Department of Computer Science and Engineering Bannari Amman Institute of Technology Tamil Nadu Erode India TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Tamil Nadu Coimbatore India
The field of computer networking is experiencing rapid growth, accompanied by the swift advancement of internet tools. As a result, people are becoming more aware of the importance of network security. One of the prim... 详细信息
来源: 评论