咨询与建议

限定检索结果

文献类型

  • 170 篇 期刊文献
  • 166 篇 会议

馆藏范围

  • 336 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 179 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 34 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 120 篇 理学
    • 75 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 artificial intel...
  • 5 篇 privacy
  • 4 篇 support vector m...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 trainee security...
  • 4 篇 computer and inf...
  • 4 篇 college of mathe...
  • 4 篇 department of co...
  • 4 篇 shanghai key lab...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 duan xueyuan

语言

  • 316 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
336 条 记 录,以下是201-210 订阅
排序:
Reduction of Server Load by Means of CMS Drupal
Reduction of Server Load by Means of CMS Drupal
收藏 引用
International Conference on Advanced computer Information Technologies (ACIT)
作者: Viktor Satsyk Roman Grudetsky Olena Kuzmych Nataliia Bahniuk Liudmyla Hlynchuk Yulia Melnychuk Department of Automation and Computer-Integrated Technologies Lutsk National Technical University Lutsk Ukraine Department of Computer Engineering and Cyber Security Lutsk National Technical University Lutsk Ukraine Department of Applied Mathematics Eastern European National University Lutsk Ukraine Department of Computer Science Lutsk National Technical University Lutsk Ukraine
In this paper description and analysis of simple methods of reducing (neutralization) the server load, as well as methods of optimization of Drupal based on embedded and additionally installed modules is done. An opti... 详细信息
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
Vision Inspection of Bottle Caps in Drink Factories Using Convolutional Neural Networks  15
Vision Inspection of Bottle Caps in Drink Factories Using Co...
收藏 引用
15th IEEE International Conference on Intelligent computer Communication and Processing, ICCP 2019
作者: Bahaghighat, Mahdi Abedini, Fereshteh S'Hoyan, Misak Molnar, Arthur-Jozsef Raja University Department of Electrical Engineering Qazvin Iran Amirkabir University of Technology Department of Electrical Engineering Tehran Iran National Polytechnic University of Armenia Department of Information Security Yerevan Iran Babeş-Bolyai University Faculty of Mathematics and Computer Science Cluj-Napoca Romania
Nowadays, the growth and development of artificial intelligence is more evident than any other time. Consequently, the development of machine vision systems in the industry has been studied extensively. The provision ... 详细信息
来源: 评论
Fourier-reflexive partitions induced by poset metric
arXiv
收藏 引用
arXiv 2021年
作者: Xu, Yang Kan, Haibin Han, Guangyue Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China Department of Mathematics Faculty of Science The University of Hong Kong Pokfulam Road Hong Kong Hong Kong Fudan-Zhongan Joint Laboratory of Blockchain and Information Security Shanghai Engineering Research Center of Blockchain Fudan University Shanghai200433 China
Let H be the cartesian product of a family of finite abelian groups indexed by a finite set Ω. A given poset (i.e., partially ordered set) P = (Ω ≤ P) gives rise to a poset metric on H, which further leads to a par... 详细信息
来源: 评论
Amateur Drones Detection: A machine learning approach utilizing the acoustic signals in the presence of strong interference
arXiv
收藏 引用
arXiv 2020年
作者: Uddin, Zahoor Altaf, Muhammad Bilal, Muhammad Nkenyereye, Lewis Bashir, Ali Kashif COMSATS University Islamabad Wah Campus Pakistan Div. of Computer and Electronics Systems Engineering Hankuk University of Foreign Studies Yongin-si17035 Korea Republic of Department of Computer and Information Security Sejong University Seoul Korea Republic of Department of Computing and Mathematics Manchester Metropolitan University United Kingdom
MSC Codes 68T45, 68T10, 62H30,Owing to small size, sensing capabilities and autonomous nature, the Unmanned Air Vehicles (UAVs) have enormous applications in various areas e.g., remote sensing, navigation, archaeology... 详细信息
来源: 评论
DynaComm: Accelerating distributed CNN training between edges and clouds through dynamic communication scheduling
arXiv
收藏 引用
arXiv 2021年
作者: Cai, Shangming Wang, Dongsheng Wang, Haixia Lyu, Yongqiang Xu, Guangquan Zheng, Xi Vasilakos, Athanasios V. Department of Computer Science and Technology Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518066 China Big Data School Qingdao Huanghai University Qingdao266427 China College of Intelligence and Computing Tianjin University Tianjin300350 China Department of Computing Macquarie University SydneyNSW2109 Australia College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China School of Electrical and Data Engineering University of Technology Sydney Australia Department of Computer Science Electrical and Space Engineering Lulea University of Technology Lulea97187 Sweden
To reduce uploading bandwidth and address privacy concerns, deep learning at the network edge has been an emerging topic. Typically, edge devices collaboratively train a shared model using real-time generated data thr... 详细信息
来源: 评论
The Battery Capacity of Energy-storing Quantum Systems
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Xue Yang, Yan-Han Alimuddin, Mir Salvia, Raffaele Fei, Shao-Ming Zhao, Li-Ming Nimmrichter, Stefan Luo, Ming-Xing The School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China School of Computer and Network Security Chengdu University of Technology Chengdu610059 China Department of Physics of Complex Systems S. N. Bose National Center for Basic Sciences Kolkata700106 India Scuola Normale Superiore PisaI-56127 Italy School of Mathematical Sciences Capital Normal University Beijing100048 China Max-Planck-Institute for Mathematics in the Sciences Leipzig04103 Germany Naturwissenschaftlich-Technische Fakultät Universität Siegen Siegen57068 Germany CAS Center for Excellence in Quantum Information and Quantum Physics Hefei230026 China Shenzhen Institute for Quantum Science and Engineering Southern University of Science and Technology Shenzhen518055 China
The quantum battery capacity is introduced in this letter as a figure of merit that expresses the potential of a quantum system to store and supply energy. It is defined as the difference between the highest and the l... 详细信息
来源: 评论
Accelerating NATO Transformation with SnTEE: Experiments with Network security Function Virtualization in Coalition Networks
Accelerating NATO Transformation with SnTEE: Experiments wit...
收藏 引用
International Conference on Military Communications and Information Systems (ICMCIS)
作者: Roberto Rigolin F. Lopes Johannes F. Loevenich Konrad Wrona Paulo H. L. Rettore Jerry Falkcrona Joseph Mathews Nils Nordbotten Bogdan Vasilache Thorsten Lampe Olwen L. Worthington Juha Röning Secure Communications & Information (SIX) Thales Deutschland Ditzingen Germany Department of Mathematics/Computer Science University of Osnabrück Osnabrück Germany NATO Cyber Security Centre The Hague Netherlands Military University of Technology Warsaw Poland Communication Systems (KOM) Fraunhofer FKIE Bonn Germany Cyber Defence and C2 Technology Swedish Defence Research Agency Linköping Sweden Information Technology Division U.S. Naval Research Laboratory Washington DC USA Thales Norway Oslo Norway WonderBit B.V. Almere The Netherlands Defence Science and Technology Laboratory (Dstl) UK Ministry of Defence London United Kingdom Information Technology and Electrical Engineering University of Oulu Oulu Finland
This paper introduces a virtual laboratory for experiments with cybersecurity functions in coalition networks. The motivation comes from the NATO Allied Command Transformation (ACT) initiative on Science and Technolog...
来源: 评论
反向连边在大型分层网络中的影响(英文)
收藏 引用
engineering 2024年 第5期 240-249页
作者: 曹浩森 胡斌斌 莫小雨 陈都鑫 高建喜 袁烨 陈关荣 Tamás Vicsek 管晓宏 张海涛 MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Mechanical and Aerospace Engineering Nanyang Technological University Jiangsu Key Laboratory of Networked Collective Intelligence School of Mathematics Southeast University Department of Computer Science Rensselaer Polytechnic Institute Department of Electronic Engineering City University of Hong Kong Department of Biological Physics E?tv?s University MOE Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi'an Jiaotong University
Hierarchical networks are frequently encountered in animal groups, gene networks, and artificial engineering systems such as multiple robots, unmanned vehicle systems, smart grids, wind farm networks,and so forth. The...
来源: 评论
An Enhanced Feature Selection Approach based on Mutual Information for Breast Cancer Diagnosis  6
An Enhanced Feature Selection Approach based on Mutual Infor...
收藏 引用
6th International Conference on Image and Signal Processing and their Applications, ISPA 2019
作者: Zemmal, Nawel Azizi, Nabiha Ziani, Amel Benzebouchi, Nacer Eddine Aldwairi, Monther Badji Mokhtar University Labged Laboratory Annaba23000 Algeria Department of Mathematics and Computer Science Mohamed Cherif Messaadia University Souk-Ahras41000 Algeria Lri Laboratory: Information Research Laboratory Computer Science Department Annaba23000 Algeria Jordan University of Science and Technology Department of Network Engineering and Security Irbid22110 Jordan
Breast cancer is the most feared disease in the female population. Early detection plays an important role to improve prognosis. Mammography is the best examination for the detection of breast cancer. However, in some... 详细信息
来源: 评论