咨询与建议

限定检索结果

文献类型

  • 1,569 篇 会议
  • 948 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 2,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,466 篇 工学
    • 1,206 篇 计算机科学与技术...
    • 1,019 篇 软件工程
    • 373 篇 信息与通信工程
    • 227 篇 控制科学与工程
    • 216 篇 电气工程
    • 200 篇 生物工程
    • 120 篇 网络空间安全
    • 114 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 83 篇 安全科学与工程
    • 63 篇 机械工程
    • 54 篇 化学工程与技术
    • 53 篇 光学工程
    • 49 篇 交通运输工程
    • 47 篇 仪器科学与技术
  • 593 篇 理学
    • 287 篇 数学
    • 212 篇 生物学
    • 121 篇 物理学
    • 93 篇 统计学(可授理学、...
    • 67 篇 系统科学
    • 56 篇 化学
  • 387 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 109 篇 工商管理
  • 121 篇 法学
    • 77 篇 社会学
    • 47 篇 法学
  • 104 篇 医学
    • 84 篇 基础医学(可授医学...
    • 82 篇 临床医学
    • 54 篇 公共卫生与预防医...
  • 57 篇 经济学
    • 57 篇 应用经济学
  • 26 篇 农学
  • 19 篇 教育学
  • 13 篇 军事学
  • 5 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 148 篇 accuracy
  • 119 篇 deep learning
  • 108 篇 feature extracti...
  • 106 篇 training
  • 95 篇 security
  • 94 篇 machine learning
  • 79 篇 computational mo...
  • 74 篇 internet of thin...
  • 74 篇 real-time system...
  • 74 篇 privacy
  • 61 篇 blockchain
  • 55 篇 support vector m...
  • 55 篇 predictive model...
  • 49 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 cloud computing
  • 46 篇 convolutional ne...
  • 44 篇 semantics
  • 42 篇 reliability
  • 42 篇 data privacy

机构

  • 229 篇 school of cyber ...
  • 160 篇 institute of inf...
  • 52 篇 school of comput...
  • 50 篇 college of cyber...
  • 50 篇 school of cyber ...
  • 44 篇 key laboratory o...
  • 44 篇 college of compu...
  • 36 篇 school of comput...
  • 34 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of cyber ...
  • 27 篇 college of compu...
  • 27 篇 national enginee...
  • 27 篇 purple mountain ...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 24 篇 school of comput...

作者

  • 44 篇 cao xiaochun
  • 40 篇 choo kim-kwang r...
  • 37 篇 zhou pan
  • 36 篇 mohana
  • 34 篇 huang qingming
  • 34 篇 xu qianqian
  • 33 篇 jin hai
  • 28 篇 hai jin
  • 25 篇 yang zhiyong
  • 22 篇 hu shengshan
  • 22 篇 kim-kwang raymon...
  • 21 篇 zhou yu
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 gan wensheng
  • 15 篇 zhang leo yu
  • 15 篇 hasan mohammad k...
  • 14 篇 ma jianfeng

语言

  • 2,080 篇 英文
  • 452 篇 其他
  • 15 篇 中文
检索条件"机构=Cyber Security in Computer Science and Engineering"
2539 条 记 录,以下是341-350 订阅
排序:
Data-Driven Unified Channel Modeling of WiFi and LiFi Using Conditional GAN  5
Data-Driven Unified Channel Modeling of WiFi and LiFi Using ...
收藏 引用
5th International Conference on Intelligent Computing, Communication, Networking and Services, ICCNS 2024
作者: Saif, Amal Ibrahim, Rahmeh Almajali, Sufyan Salameh, Haythem Bany Princess Sumaya University for Technology Computer Science Department Amman11941 Jordan Princess Sumaya University for Technology Cyber Security Department Amman11941 Jordan College of Engineering Al Ain University Al Ain United Arab Emirates
Wireless communication systems, rooted in the propagation of electromagnetic waves, have traditionally operated within the framework of digital modules such as source coding, encryption, and modulation. However, the c... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Contrastive Learning at the Relation and Event Level for Rumor Detection  48
Contrastive Learning at the Relation and Event Level for Rum...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Xu, Yingrui Hu, Jingyuan Ge, Jingguo Wu, Yulei Li, Tong Li, Hui Chinese Academy of Sciences Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China University of Exeter Faculty of Environment Science and Economy Department of Computer Science United Kingdom
Existing studies for rumor detection rely heavily on a large number of labeled data to operate in a fully-supervised manner. However, manual data annotation in realistic cases is very expensive and time-consuming. In ... 详细信息
来源: 评论
Detection of Network Attacks using Machine Learning and Deep Learning Models
Detection of Network Attacks using Machine Learning and Deep...
收藏 引用
2022 International Conference on Machine Learning and Data engineering, ICMLDE 2022
作者: Dhanya, K.A. Vajipayajula, Sulakshan Srinivasan, Kartik Tibrewal, Anjali Kumar, T. Senthil Kumar, T. Gireesh TIFAC-CORE in Cyber Security Amrita School of Engineering Amrita Vishwa Vidyapeetham Coimbatore India STSM Architect IBM Security IBM India Sr. Architect IBM Security IBM India Pvt Ltd India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
Anomaly-based network intrusion detection systems are highly significant in detecting network attacks. Robust machine learning and deep learning models for identifying network intrusion and attack types are proposed i... 详细信息
来源: 评论
Optimizing Energy Management and Load Balancing Through AI-Driven Quantum Approximate Optimization  4
Optimizing Energy Management and Load Balancing Through AI-D...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Manjunath Kamath, K. Manasa, M. Anitha, B.S. Mahadevi Tlajiya, Falguni Chavan, Sangramjit Department of Cyber Security Karkala India Brindavan College of Engineering Department of Artificial Intelligence and Machine Learning Bengaluru India Sarada Vilas College Department of Computer Science Mysuru India Parul institute of Engineering and Technology Parul University Department of Electrical Engineering Gujarat India Pune India
The integration of Quantum Approximate Optimization Algorithm (QAOA) and Quantum Annealing (QA) offers a promising approach to addressing energy management and load balancing challenges in modern power systems. This s... 详细信息
来源: 评论
Honeypot Comparison of Attack Detection and Mitigation of SSH Attack  3
Honeypot Comparison of Attack Detection and Mitigation of SS...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Ali, Wasif Sajid, Ahthasham Ghodke, Tanvi Ajit Malik, Rida Malik, Neeru Kaushik, Keshav Riphah Institute of System Engineering Riphah International University Department of Cyber Security Islamabad Pakistan Pimpri Chinchwad University Department of Computer Science and Engineering Maharashtra India School of Engineering & Technology Pimpri Chinchwad University Maharashtra Pune India Amity School of Engineering and Technology Amity University Mohali India
This research study addresses the importance of honeypots at multiple levels, which includes but not limited to placement in network or group of networks working alongside in an organization. This paper talks about th... 详细信息
来源: 评论
Deep Learning Based Traffic Detection in Cloud Computing Environment
Deep Learning Based Traffic Detection in Cloud Computing Env...
收藏 引用
International Conference on computer and Applications (ICCA)
作者: Sheily Verma Panwar Aboubakr Aqle (Computer Science/ Cyber Security) CUQ-Ulster University Doha Qatar (Computer Engineering) CUQ-Ulster University Doha Qatar
This work uses the characteristics of both architectures to present a novel hybrid model combining LSTM and GRU units to enhance anomaly detection in cloud environments. Separately integrating outputs from LSTM and GR... 详细信息
来源: 评论
6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information  27
6GAI: Active IPv6 Address Generation via Adversarial Trainin...
收藏 引用
27th International Conference on computer Supported Cooperative Work in Design, CSCWD 2024
作者: Jiao, Liang Zhu, Yujia Zhang, Wenxiu Zhao, Lei Zhou, Yi Liu, Qingyun Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Shandong Branchs Beijing China School of Cyber Security University of Chinese Academy of Sciences National Computer Network Beijing China School of Information Science And Engineering University of Jinan Jinan China National Computer Network Emergency Response Technical Team Coordination Center of China Guangdong Branch Guangdong China
Global IPv6 scanning has always been a challenge for researchers because of the limited network speed and computational power. In this paper, we introduce 6GAI to implement more efficient target address generation. 6G... 详细信息
来源: 评论
Transforming cybersecurity in the Digital Era: The Power of AI  2
Transforming Cybersecurity in the Digital Era: The Power of ...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Mahfuri, Mahmoud Ghwanmeh, Sameh Almajed, Rsha Alhasan, Waseem Salahat, Mohammed Lee, Jin Hie Ghazal, Taher M. International University For Science And Technology Computer And Information Technology Department Damascus Syria American University In The Emirates Department Of Computer Scienc Dubai United Arab Emirates School Of Computer Science And Informatics De Montfort University Dubai Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates Miracle Clinic Seoul Korea Republic of Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
In the midst of the digital revolution of the 21st century, cybersecurity has come to be a primary social situation, requiring revolutionary and Innovative solution. To find the proper answer for this pressing demand,... 详细信息
来源: 评论
A Novel Method with Transformers for Fine-grained Encrypted Traffic Classification  25
A Novel Method with Transformers for Fine-grained Encrypted ...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Kong, He Li, Tong Ge, Jingguo Li, Hui Yang, Liqun Lu, Zhuang Xu, Zhibin Xie, Chuanxi Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China School of Computer Science and Engineering Beihang University Beijing100191 China
With the rise of cyber threats and data breaches, encrypted traffic has become increasingly important in ensuring online privacy and security. However, it also brings significant security challenges. Existing studies ... 详细信息
来源: 评论