咨询与建议

限定检索结果

文献类型

  • 4,486 篇 会议
  • 2,991 篇 期刊文献
  • 77 册 图书

馆藏范围

  • 7,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,694 篇 工学
    • 3,658 篇 计算机科学与技术...
    • 3,023 篇 软件工程
    • 1,249 篇 信息与通信工程
    • 679 篇 控制科学与工程
    • 606 篇 电气工程
    • 527 篇 生物工程
    • 392 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 243 篇 安全科学与工程
    • 214 篇 光学工程
    • 179 篇 仪器科学与技术
    • 178 篇 动力工程及工程热...
    • 163 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,957 篇 理学
    • 1,054 篇 数学
    • 572 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 165 篇 化学
  • 1,207 篇 管理学
    • 761 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 398 篇 法学
    • 256 篇 社会学
    • 151 篇 法学
  • 312 篇 医学
    • 254 篇 临床医学
    • 237 篇 基础医学(可授医学...
  • 162 篇 经济学
    • 162 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 25 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 262 篇 accuracy
  • 249 篇 deep learning
  • 226 篇 security
  • 207 篇 machine learning
  • 203 篇 feature extracti...
  • 195 篇 internet of thin...
  • 182 篇 authentication
  • 168 篇 computational mo...
  • 167 篇 training
  • 139 篇 privacy
  • 136 篇 protocols
  • 136 篇 cryptography
  • 135 篇 real-time system...
  • 121 篇 predictive model...
  • 120 篇 blockchain
  • 111 篇 artificial intel...
  • 105 篇 cloud computing
  • 102 篇 support vector m...
  • 96 篇 encryption
  • 95 篇 data privacy

机构

  • 235 篇 school of cyber ...
  • 193 篇 institute of inf...
  • 99 篇 school of cyber ...
  • 94 篇 school of cyber ...
  • 82 篇 college of cyber...
  • 63 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 51 篇 school of cyber ...
  • 44 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 school of inform...
  • 39 篇 school of comput...
  • 39 篇 school of cyber ...
  • 33 篇 peng cheng labor...
  • 32 篇 department of co...
  • 31 篇 school of comput...
  • 31 篇 department of co...

作者

  • 61 篇 choo kim-kwang r...
  • 40 篇 zhou pan
  • 39 篇 muhaidat sami
  • 37 篇 huang qingming
  • 35 篇 mohana
  • 30 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 23 篇 wang wei
  • 23 篇 cao xiaochun
  • 22 篇 weng jian
  • 21 篇 chen kai
  • 21 篇 hai jin
  • 20 篇 peng hao
  • 20 篇 ma jianfeng
  • 20 篇 liu yang
  • 20 篇 wang qian
  • 20 篇 bariah lina

语言

  • 6,327 篇 英文
  • 1,167 篇 其他
  • 67 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7554 条 记 录,以下是4911-4920 订阅
排序:
Context-aware online client selection for hierarchical federated learning
arXiv
收藏 引用
arXiv 2021年
作者: Qu, Zhe Duan, Rui Chen, Lixing Xu, Jie Lu, Zhuo Liu, Yao The Department of Electrical Engineering University of South Florida TampaFL33620 United States The Institute of Cyber Science and Technology Shanghai Jiao Tong University Shanghai Shanghai200240 China The Department of Electrical and Computer Engineering University of Miami Coral Gables33146 United States The Department of Computer Science and Engineering University of South Florida Tampa33620 United States
Federated Learning (FL) has been considered as an appealing framework to tackle data privacy issues of mobile devices compared to conventional Machine Learning (ML). Using Edge Servers (ESs) as intermediaries to perfo... 详细信息
来源: 评论
FUIM: Fuzzy utility itemset mining
arXiv
收藏 引用
arXiv 2021年
作者: Wan, Shicheng Gan, Wensheng Guo, Xu Chen, Jiahui Yun, Unil School of Computers Guangdong University of Technology Guangzhou510006 China College of Cyber Security Jinan University Guangzhou510632 China Pazhou Laboratory Guangzhou510335 China Department of Computer Engineering Sejong University Seoul Korea Republic of
Because of usefulness and comprehensibility, fuzzy data mining has been extensively studied and is an emerging topic in recent years. Compared with utility-driven itemset mining technologies, fuzzy utility mining not ... 详细信息
来源: 评论
A Principled Design of Image Representation: Towards Forensic Tasks
arXiv
收藏 引用
arXiv 2022年
作者: Qi, Shuren Zhang, Yushu Wang, Chao Zhou, Jiantao Cao, Xiaochun The College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China The Institute of Information Engineering Chinese Academy of Sciences Beijing China The Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China The State Key Laboratory of Internet of Things for Smart City China The Department of Computer and Information Science Faculty of Science and Technology University of Macau China The School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University Shenzhen China
Image forensics is a rising topic as the trustworthy multimedia content is critical for modern society. Like other vision-related applications, forensic analysis relies heavily on the proper image representation. Desp... 详细信息
来源: 评论
EDOLAB: An Open-Source Platform for Education and Experimentation with Evolutionary Dynamic Optimization Algorithms
arXiv
收藏 引用
arXiv 2023年
作者: Peng, Mai Yazdani, Delaram She, Zeneng Yazdani, Danial Luo, Wenjian Li, Changhe Branke, Juergen Nguyen, Trung Thanh Gandomi, Amir H. Yang, Shengxiang Jin, Yaochu Yao, Xin School of Automation China University of Geosciences Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China Research Institute Faculty of Engineering and Technology Liverpool John Moores University United Kingdom School of Computer Science and Technology Harbin Institute of Technology China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Peng Cheng Laboratory China School of Artificial Intelligence Anhui University of Sciences & Technology China Information Systems Management and Analytics in Warwick Business School University of Warwick United Kingdom Faculty of Engineering & Information Technology University of Technology Sydney Australia Obuda University Hungary School of Computer Science and Informatics De Montfort University United Kingdom Department of Artificial Intelligence School of Engineering Westlake University China School of Computer Science University of Birmingham United Kingdom
Many real-world optimization problems exhibit dynamic characteristics, posing significant challenges for traditional optimization techniques. Evolutionary Dynamic Optimization Algorithms (EDOAs) are designed to addres... 详细信息
来源: 评论
A survey on security and privacy issues of UAVs
arXiv
收藏 引用
arXiv 2021年
作者: Mekdad, Yassine Aris, Ahmet Babun, Leonardo Fergougui, Abdeslam E.L. Conti, Mauro Lazzeretti, Riccardo Uluagac, A. Selcuk Laboratory of Computer Networks and Systems Moulay Ismail University of Meknes Zitoune Meknes11201 Morocco Cyber-Physical Systems Security Lab Department of Electrical and Computer Engineering Florida International University MiamiFL33174 United States Department of Mathematics University of Padua Padua35121 Italy Department of Computer Control and Management Engineering "Antonio Ruberti" Sapienza University of Rome Rome00185 Italy
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilia... 详细信息
来源: 评论
Explainable Verbal Deception Detection using Transformers
arXiv
收藏 引用
arXiv 2022年
作者: Ilias, Loukas Soldner, Felix Kleinberg, Bennett Decision Support Systems Laboratory School of Electrical and Computer Engineering National Technical University of Athens Athens15780 Greece GESIS Leibniz Institute for the Social Science Köln Germany Department of Security and Crime Science Dawes Centre for Future Crime University College London United Kingdom Department of Methodology and Statistics Tilburg University Netherlands
People are regularly confronted with potentially deceptive statements (e.g., fake news, misleading product reviews, or lies about activities). Only few works on automated text-based deception detection have exploited ... 详细信息
来源: 评论
Curriculum Self-supervised Learning for Weakly-supervised Histopathological Image Segmentation  2021
Curriculum Self-supervised Learning for Weakly-supervised Hi...
收藏 引用
2021 10th International Conference on Internet Computing for science and engineering
作者: Jijun Cheng Jinhai Mai Xipeng Pan Xin Chen Chu Han Zaiyi Liu Changhong Liang School of Computer Science and Information Security Guilin University of Electronic Technology China School of Automation Science and Engineering South China University of Technology China and Department of Radiology Guangdong Provincial People's HospitalGuangdong Academy of Medical Sciences China School of Computer Science and Information Security Guilin University of Electronic Technology China and Department of Radiology Guangdong Provincial People's HospitalGuangdong Academy of Medical Sciences China Department of Radiology Guangzhou First People's HospitalSchool of MedicineSouth China University of Technology China Department of Radiology Guangdong Provincial People's HospitalGuangdong Academy of Medical Sciences China
Histopathological image segmentation is the basic upstream task of pathomics cancer research. However, acquiring pixel-level annotations is extremely difficult and time-consuming. Moreover, it is also expertise-depend... 详细信息
来源: 评论
Learning linear policies for robust bipedal locomotion on terrains with varying slopes
arXiv
收藏 引用
arXiv 2021年
作者: Krishna, Lokesh Mishra, Utkarsh A. Castillo, Guillermo A. Hereid, Ayonga Kolathaya, Shishir Varanasi India The Mechanical and Industrial Engineering Department Indian Institute of Technology Roorkee India The department of Mechanical and Aerospace Engineering Ohio State University ColumbusOH United States The department of Computer Science and Automation The Centre for Cyber-Physical Systems Indian Institute of Science Bengaluru India
In this paper, with a view toward deployment of light-weight control frameworks for bipedal walking robots, we realize end-foot trajectories that are shaped by a single linear feedback policy. We learn this policy via... 详细信息
来源: 评论
Author Correction: AndroDex: Android Dex Images of Obfuscated Malware
收藏 引用
Scientific data 2024年 第1期11卷 729页
作者: Sana Aurangzeb Muhammad Aleem Muhammad Taimoor Khan George Loukas Georgia Sakellari National University of Computing and Emerging Sciences (FAST-NUCES) Department of Computer Science Islamabad 44000 Pakistan. Centre for Sustainable Cyber Security School of Computing and Mathematical Sciences University of Greenwich London UK. m.khan@greenwich.ac.uk. Centre for Sustainable Cyber Security School of Computing and Mathematical Sciences University of Greenwich London UK.
来源: 评论
IFA-EO: An improved firefly algorithm hybridized with extremal optimization for continuous unconstrained optimization problems
Research Square
收藏 引用
Research Square 2021年
作者: Chen, Min-Rong Yang, Liu-Qing Zeng, Guo-Qiang Lu, Kang-Di Huang, Yi-Yuan School of Computer Science South China Normal University Guangzhou510631 China National-Local Joint Engineering Laboratory of Digitalize Electrical Design Technology Wenzhou University Wenzhou325035 China College of Cyber Security Jinan University Guangzhou510632 China Institute of Cyber Systems and Control Zhejiang University Hangzhou310018 China
As one of the evolutionary algorithms, firefly algorithm (FA) has been widely used to solve various complex optimization problems. However, FA has significant drawbacks in slow convergence rate and is easily trapped i... 详细信息
来源: 评论