咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是4981-4990 订阅
排序:
Symbolic Models for Interconnected Impulsive Systems
Symbolic Models for Interconnected Impulsive Systems
收藏 引用
IEEE Conference on Decision and Control
作者: Sadek Belamfedel Alaoui Adnane Saoud Pushpak Jagtap Abdalla Swikir School of Computer Science at Mohammed VI Polytechnical University Benguerir Morocco Centrale-Supelec University Paris-Saclay Gif-sur-Yvette France Robert Bosch Center for Cyber-Physical Systems Indian Institute of Science Bangalore Chair of Robotics and Systems Intelligence and MIRMI Technical University Munich (TUM) Munich Germany Department of Electrical and Electronic Engineering Omar Al-Mukhtar University (OMU) Albaida Libya Centre for Tactile Internet with Human-in-the-Loop (CeTI) Dresden Germany
In this paper, we present a compositional method-ology for constructing symbolic models of nonlinear interconnected impulsive systems. Our approach relies on the concept of “alternating simulation function” to estab...
来源: 评论
Blind Face Retrieval for Mobile Users  2nd
Blind Face Retrieval for Mobile Users
收藏 引用
2nd EAI International Conference on Robotic Sensor Networks, ROSENET 2018
作者: Jin, Xin Ge, Shiming Song, Chenggen Wu, Le Sun, Hongbo Department of Cyber Security Beijing Electronic Science and Technology Institute Beijing China CETC Big Data Research Institute Co. Ltd. Guizhou Guiyang China Institute of Information Engineering Chinese Academy of Sciences Beijing China Beijing Electronic Science and Technology Institute Beijing China
Recently, cloud storage and processing have been widely adopted. Mobile users in one family or one team may automatically backup their photos to the same shared cloud storage space. The powerful face detector trained ... 详细信息
来源: 评论
Decentralized distributed blockchain ledger for financial transaction backup data
Decentralized distributed blockchain ledger for financial tr...
收藏 引用
2019 International Conference on cyber security and Internet of Things, ICSIoT 2019
作者: Xenya, Michael Christopher Quist-Aphetsi, Kester Computer Engineering Department Ghana Technology University College Ghana Computer Science Department Ghana Technology University College Ghana Cyber Security Division CRITAC Ghana Information Assurance and Intelligent Research CRITAC Ghana
Due to the fact that financial data stands a great risk of attack, several schemes are being deployed to ensure security and integrity of financial data. In considering the security of the financial transaction data, ... 详细信息
来源: 评论
Modeling Secure Home Area Network Based on IoT for Resource Constraints Environment
收藏 引用
Journal of computer and Communications 2020年 第1期8卷 45-70页
作者: Minsu Park Mwawi Kayuni Tiwonge Manda Hyunsung Kim Department of Computer Science Chancellor College University of Malawi Zomba Malawi Mathematical Sciences Department Chancellor College University of Malawi Zomba Malawi Department of Cyber Security Kyungil University Kyungbuk Korea.
The Internet of things (IoT) can be used in our daily life. Home area network (HAN) is one of the applications of loT. However, deploying HAN for underdeveloped countries in Africa is not easy due to the lack of Inter... 详细信息
来源: 评论
Distributed Approach to Traffic Management Automation Implemented According to IEC 61499  11th
Distributed Approach to Traffic Management Automation Implem...
收藏 引用
11th Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020
作者: Elkin, Dmitry Vyatkin, Valeriy Institute of Computer Technologies and Information Security Southern Federal University Chekhova. 2 Taganrog347900 Russia Department of Electrical Engineering and Automation Aalto University Otakaari 1B Aalto00076 Finland Department of Computer Science Electrical and Space Engineering Luleå University of Technology Luleå97187 Sweden
The number of vehicles on public roads is increasing while the road infrastructure is not keeping up to this. It is necessary to apply advanced algorithms and approaches to transport management to maximize the use of ... 详细信息
来源: 评论
Iot in traffic management: review of existing methods of road traffic regulation  9th
Iot in traffic management: review of existing methods of roa...
收藏 引用
9th computer science On-line Conference, CSOC 2020
作者: Elkin, Dmitry Vyatkin, Valeriy Southern Federal University Institute of Computer Technologies and Information Security Chekhova. 2 Taganrog347900 Russia Department of Electrical Engineering and Automation Aalto University Otakaari 1B Aalto00076 Finland Department of Computer Science Electrical and Space Engineering Luleå University of Technology Luleå97187 Sweden
Internet of Things (IoT) is an important upcoming technology for making infrastructures of our society smart and adaptable to the users’ needs. One such infrastructure is transportation. This article discusses existi... 详细信息
来源: 评论
Reasoning over the Air: A Reasoning-based Implicit Semantic-Aware Communication Framework
arXiv
收藏 引用
arXiv 2023年
作者: Xiao, Yong Liao, Yiwei Li, Yingyu Shi, Guangming Poor, H. Vincent Saad, Walid Debbah, Mérouane Bennis, Mehdi The School of Electronic Information and Communications The Huazhong University of Science and Technology Wuhan430074 China The Peng Cheng Laboratory Guangdong Shenzhen518055 China Guangdong Guangzhou510555 China The School of Mech. Eng. and Elect. Inform. The China University of Geosciences Wuhan430074 China The School of Artificial Intelligence The Xidian University Shaanxi Xi’an710071 China The Department of Electrical and Computer Engineering Princeton University PrincetonNJ08544 United States The Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States Cyber Security Systems and Applied AI Research Center Lebanese American University Beirut Lebanon Khalifa University of Science and Technology P O Box 127788 Abu Dhabi United Arab Emirates CentraleSupelec University Paris-Saclay Gif-sur-Yvette91192 France The University of Oulu Oulu90014 Finland
—Semantic-aware communication is a novel paradigm that draws inspiration from human communication focusing on the delivery of the meaning of messages. It has attracted significant interest recently due to its potenti... 详细信息
来源: 评论
A Multi-Perspective Machine Learning Approach to Evaluate Police-Driver Interaction in Los Angeles
arXiv
收藏 引用
arXiv 2024年
作者: Graham, Benjamin A.T. Brown, Lauren Chochlakis, Georgios Dehghani, Morteza Delerme, Raquel Friedman, Brittany Graeden, Ellie Golazizian, Preni Hebbar, Rajat Hejabi, Parsa Kommineni, Aditya Salinas, Mayagüez Sierra-Arévalo, Michael Trager, Jackson Weller, Nicholas Narayanan, Shrikanth Department of Political Science and International Relations University of Southern California Los Angeles90007 United States School of Public Policy University of Southern California Los Angeles90007 United States University of Southern California Los Angeles90007 United States Department of Computer Science University of Southern California Los Angeles90007 United States Brain and Creativity Institute University of Southern California Los Angeles90007 United States Department of Sociology University of Southern California Los Angeles90007 United States Center for Global Health Science and Security Georgetown University WashingtonDC20057 United States Department of Electrical and Computer Engineering University of Southern California Los Angeles90007 United States The Lewis Registry Los AngelesCA90049 United States Department of Sociology The University of Texas at Austin Austin78712 United States Department of Psychology University of Southern California Los Angeles90007 United States Department of Political Science University of California Riverside Riverside92521 United States
Interactions between the government officials and civilians affect public wellbeing and the state legitimacy that is necessary for the functioning of democratic society. Police officers, the most visible and contacted... 详细信息
来源: 评论
Securing medical IoT devices using diffie-hellman and des cryptographic schemes
Securing medical IoT devices using diffie-hellman and des cr...
收藏 引用
2019 International Conference on cyber security and Internet of Things, ICSIoT 2019
作者: Quist-Aphetsi, Kester Xenya, Michael Christopher Computer Science Department Ghana Technology University College Ghana Computer Engineering Department Ghana Technology University College Ghana Cyber Security Division CRITAC Ghana Information Assurance and Intelligent Research CRITAC Ghana
IoT cuts across almost any field where communication or monitoring is needed. Recent works in IoT focuse on the architecture, secured communication, topologies, platforms etc. In the health sector, real-time access to... 详细信息
来源: 评论
An Electric Vehicle Charging Reservation Approach based on Blockchain
An Electric Vehicle Charging Reservation Approach based on B...
收藏 引用
GLOBECOM 2020 - 2020 IEEE Global Communications Conference
作者: Sheng Cao Sixuan Dang Xiaojiang Du Mohsen Guizani Xiaosong Zhang Xiaoming Huang School of Computer Science and Engineering Institute for Cyber Security University of Electronic Science and Technology of China China School of Information and Software Engineering University of Electronic Science and Technology of China China Temple University Philadelphia USA Qatar University Qatar China Electronics Technol. Cyber Security Co. Ltd
The popularity of electric vehicles depends on convenient and efficient charging services. At present, none of existing charging services allow users to reach charging stations at desirable time and charge immediately... 详细信息
来源: 评论