咨询与建议

限定检索结果

文献类型

  • 171 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 229 篇 工学
    • 180 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 34 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 120 篇 理学
    • 75 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...
  • 4 篇 college of mathe...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 duan xueyuan

语言

  • 324 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
344 条 记 录,以下是241-250 订阅
排序:
Structural transition in interdependent networks with regular interconnections
收藏 引用
Physical Review E 2019年 第1期99卷 012311-012311页
作者: Xiangrong Wang Robert E. Kooij Yamir Moreno Piet Van Mieghem Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft The Netherlands iTrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore Institute for Biocomputation and Physics of Complex Systems (BIFI) University of Zaragoza Zaragoza 50009 Spain Department of Theoretical Physics University of Zaragoza Zaragoza 50009 Spain ISI Foundation Turin Italy
Networks are often made up of several layers that exhibit diverse degrees of interdependencies. An interdependent network consists of a set of graphs G that are interconnected through a weighted interconnection matrix... 详细信息
来源: 评论
Automated verification of noninterference property  20th
Automated verification of noninterference property
收藏 引用
20th International Conference on Information and Communications security, ICICS 2018
作者: Zhang, Fan Zhang, Cong Xu, Mingdi Liu, Xiaoli Hu, Fangning Chao, HanChieh Mathematics and Computer Science School Wuhan Polytechnic University Wuhan China School of Computer Science and Electrical Engineering Jacobs University Bremen Bremen Germany Wuhan Digital and Engineering Institute Wuhan China College of Information Science and Technology/College of Cyber Security Jinan University Guangzhou510632 China Department of Electrical Engineering National Dong Hwa University Hualien Taiwan Department of Computer Science and Information Engineering National Ilan University Ilan Taiwan
Noninterference is an important information flow model that is widely applied in building secure information systems. Although the noninterference model itself has been thoroughly investigated, verifying the noninterf... 详细信息
来源: 评论
An adaptive system for detecting malicious queries in web attacks
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 175-190页
作者: Ying DONG Yuqing ZHANG Hua MA Qianru WU Qixu LIU Kai WANG Wenjie WANG National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences School of Mathematics and Statistics Xidian University Security Department Alibaba Group Zhanlu Laboratory Tencent Incorporation
Web request query strings(queries), which pass parameters to a referenced resource, are always manipulated by attackers to retrieve sensitive data and even take full control of victim web servers and web applications.... 详细信息
来源: 评论
Corrigendum to "Generation of a local lung respiratory motion model using a weighted sparse algorithm and motion prior-based registration" [Comput. Biol. Med. 123 (2020) 103913]
收藏 引用
computers in biology and medicine 2021年 140卷 104271页
作者: Dong Chen Hongzhi Xie Lixu Gu Jing Liu Liang Tian College of Computer and Cyber Security Hebei Normal University Shijiazhuang China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Hebei Normal University Shijiazhuang China Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Department of Cardiothoracic Surgery Peking Union Medical College Hospital Beijing China. School of Biomedical Engineering Shanghai Jiao Tong University Shanghai China. Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Electronic address: liujing01@***. Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China. Electronic address: tianliang@***.
来源: 评论
On a parametric mulholland-type inequality and applications
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2019年 第none期2019卷 8-8页
作者: Yang, Bicheng Huang, Meifa Zhong, Yanru Department of Mathematics Guangdong University of Education Guangzhou Guangdong 510303 China School of Mechanical Science and Electrical Engineering Guilin University of Electronic Technology Guilin Guangxi 541004 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi 541004 China
In this paper, by the use of the weight functions, and the idea of introducing parameters, a discrete Mulholland-type inequality with the general homogeneous kernel and the equivalent form are given. The equivalent st...
来源: 评论
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 118-130页
作者: Wei LI Vincent RIJMEN Zhi TAO Qingju WANG Hua CHEN Yunwen LIU Chaoyun LI Ya LIU School of Computer Science and Technology Donghua University imec-COSIC KU Leuven Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Applied Mathematics and Computer Science Technical University of Denmark Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences College of Science National University of Defense Technology Department of Computer Science and Engineering University of Shanghai for Science and Technology
With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing many serious traffic problems, such as road safety, convenien... 详细信息
来源: 评论
Fast stochastic ordinal embedding with variance reduction and adaptive step size
arXiv
收藏 引用
arXiv 2019年
作者: Ma, Ke Zeng, Jinshan Xiong, Jiechao Xu, Qianqian Cao, Xiaochun Liu, Wei Yao, Yuan School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Information Engineering Jiangxi Normal University NanchangJiangxi330022 China Tencent AI Lab Shenzhen Guangdong China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Department of Mathematics and by courtesy Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
—Learning representation from relative similarity comparisons, often called ordinal embedding, gains rising attention in recent years. Most of the existing methods are based on semi-definite programming (SDP), which ... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
A chaotic artificial bee colony algorithm based on lévy search
A chaotic artificial bee colony algorithm based on lévy sea...
收藏 引用
作者: Lin, Shijie Dong, Chen Wang, Zhiqiang Guo, Wenzhong Chen, Zhenyi Ye, Yin College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Information Security of Network Systems Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China Department of Electrical Engineering University of South Florida TampaFL33620 United States
A Lévy search strategy based chaotic artificial bee colony algorithm (LABC) is proposed in this paper. The chaotic sequence, global optimal mechanism and Lévy flight mechanism were introduced respectively in... 详细信息
来源: 评论
Finding global optima in nonconvex stochastic semide finite optimization with variance reduction
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jinshan Ma, Ke Yao, Yuan School of Computer Information Engineering Jiangxi Normal University Department of Mathematics Hong Kong University of Science and Technology State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
There is a recent surge of interest in nonconvex reformulations via low-rank factorization for stochastic convex semide finite optimization problem in the purpose of efficiency and scalability. Compared with the origi... 详细信息
来源: 评论