咨询与建议

限定检索结果

文献类型

  • 4,459 篇 会议
  • 3,002 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 7,539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,712 篇 工学
    • 3,673 篇 计算机科学与技术...
    • 3,036 篇 软件工程
    • 1,254 篇 信息与通信工程
    • 684 篇 控制科学与工程
    • 613 篇 电气工程
    • 528 篇 生物工程
    • 394 篇 电子科学与技术(可...
    • 331 篇 网络空间安全
    • 292 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 242 篇 安全科学与工程
    • 214 篇 光学工程
    • 180 篇 仪器科学与技术
    • 176 篇 动力工程及工程热...
    • 164 篇 交通运输工程
    • 157 篇 化学工程与技术
  • 1,964 篇 理学
    • 1,058 篇 数学
    • 573 篇 生物学
    • 379 篇 物理学
    • 341 篇 统计学(可授理学、...
    • 249 篇 系统科学
    • 165 篇 化学
  • 1,214 篇 管理学
    • 762 篇 管理科学与工程(可...
    • 514 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 399 篇 法学
    • 257 篇 社会学
    • 151 篇 法学
  • 317 篇 医学
    • 257 篇 临床医学
    • 238 篇 基础医学(可授医学...
  • 161 篇 经济学
    • 160 篇 应用经济学
  • 77 篇 农学
  • 60 篇 教育学
  • 58 篇 军事学
  • 26 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 256 篇 accuracy
  • 246 篇 deep learning
  • 218 篇 security
  • 207 篇 machine learning
  • 197 篇 feature extracti...
  • 194 篇 internet of thin...
  • 182 篇 authentication
  • 171 篇 training
  • 164 篇 computational mo...
  • 140 篇 privacy
  • 137 篇 cryptography
  • 135 篇 real-time system...
  • 133 篇 protocols
  • 120 篇 blockchain
  • 118 篇 predictive model...
  • 105 篇 artificial intel...
  • 101 篇 support vector m...
  • 99 篇 cloud computing
  • 96 篇 data privacy
  • 92 篇 computer science

机构

  • 229 篇 school of cyber ...
  • 191 篇 institute of inf...
  • 96 篇 school of cyber ...
  • 93 篇 school of cyber ...
  • 80 篇 college of cyber...
  • 61 篇 department of co...
  • 60 篇 school of comput...
  • 53 篇 school of comput...
  • 53 篇 department of co...
  • 52 篇 key laboratory o...
  • 50 篇 school of cyber ...
  • 48 篇 college of compu...
  • 43 篇 school of cyber ...
  • 42 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 school of inform...
  • 35 篇 department of co...
  • 34 篇 state key labora...
  • 32 篇 peng cheng labor...
  • 31 篇 school of comput...

作者

  • 62 篇 choo kim-kwang r...
  • 39 篇 muhaidat sami
  • 39 篇 zhou pan
  • 37 篇 huang qingming
  • 33 篇 mohana
  • 31 篇 das ashok kumar
  • 27 篇 sofotasios pasch...
  • 26 篇 yang zhiyong
  • 25 篇 hu shengshan
  • 25 篇 mohammad kamrul ...
  • 24 篇 wang wei
  • 23 篇 weng jian
  • 22 篇 cao xiaochun
  • 21 篇 peng hao
  • 21 篇 ma jianfeng
  • 21 篇 liu yang
  • 21 篇 hai jin
  • 20 篇 dehghantanha ali
  • 20 篇 wang qian
  • 19 篇 guizani mohsen

语言

  • 6,827 篇 英文
  • 648 篇 其他
  • 68 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering-Cyber Security"
7539 条 记 录,以下是4991-5000 订阅
排序:
The next world war and how it will rely on cyber attacks
收藏 引用
AIP Conference Proceedings 2023年 第1期2963卷
作者: Mahakant Sharma Nidhish Bhatnagar School of Computer Science Engineering Lovely Professional University Jalandhar Punjab India School of Engineering RK University Rajkot Gujarat India School of Information Technology Artificial Intelligence and Cyber Security Rashtriya Raksha University Gandhinagar Gujarat India
cyberattacks and data leaks are rapidly increasing in our competitive and ever-evolving world. According to the late Sir CDS General Bipin Rawat, there is a possibility for Chinese cyberattacks (April 8, 2021) and we ...
来源: 评论
Improving the impact of power efficiency in mobile cloud applications using cloudlet model
Improving the impact of power efficiency in mobile cloud app...
收藏 引用
作者: Tawalbeh, Lo'ai Tawalbeh, Mohammad A. Aldwairi, Monther Department of Computing and Cyber Security Texas A&M University-San Antonio San AntonioTX United States Faculty of Computing Engineering and Science Staffordshire University Stafford United Kingdom College of Technological Innovation Zayed University Dubai United Arab Emirates
The applications and services of Information and Communication Technologies are becoming a very essential part of our daily life. In addition, the spread of advanced technologies including the cloud and mobile cloud c... 详细信息
来源: 评论
Node to node secure data communication for IoT devices using diffie-hellman, AES, and MD5 cryptographic schemes
Node to node secure data communication for IoT devices using...
收藏 引用
2019 International Conference on cyber security and Internet of Things, ICSIoT 2019
作者: Quist-Aphetsi, Kester Xenya, Michael Christopher Computer Science Department Ghana Technology University College Ghana Computer Engineering Department Ghana Technology University College Ghana Cyber Security Division CRITAC Ghana Information Assurance and Intelligent Research CRITAC Ghana
Identifying the right source and target nodes in IoT as well as secure data communication is very vital in ensuring security, validity and reliability of IoT communication. Since more devices are being programmed to e... 详细信息
来源: 评论
On MOS-enabled differentiated VoIP provisioning in campus software defined networking  15
On MOS-enabled differentiated VoIP provisioning in campus so...
收藏 引用
15th International Conference on Emerging Technologies, ICET 2019
作者: Bakhshi, Taimur Nadir, Ibrahim Center for Information Management and Cyber Security National University of Computer and Emerging Sciences Lahore Pakistan National University of Computer Emerging Sciences Department of Computer Science Lahore Pakistan
Software defined networking (SDN) promises a paradigm shift in real-time traffic management by offering centralized network control and programmability. The present work leverages SDN technology for dynamic resource a... 详细信息
来源: 评论
FastER: Fast On-Demand Entity Resolution in Property Graphs
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Shujing Kwashie, Selasi Bewong, Michael Hu, Junwei Nofong, Vincent M. Miao, Shiqi Feng, Zaiwen Huazhong Agricultural University Wuhan China AI & Cyber Futures Institute Charles Sturt University Australia School of Computing Mathematics and Engineering Charles Sturt University Australia Department of Computer Science and Engineering University of Mines and Technology Ghana
Entity resolution (ER) is the problem of identifying and linking database records that refer to the same real-world entity. Traditional ER methods use batch processing, which becomes impractical with growing data volu... 详细信息
来源: 评论
Aggregate Authentication for Massive Internet of Things in 5G Networks  4th
Aggregate Authentication for Massive Internet of Things in 5...
收藏 引用
4th International Symposium on Mobile Internet security, MobiSec 2019
作者: Syalim, Amril Anggorojati, Bayu Baek, Joonsang Gerbi, Daniel You, Ilsun Faculty of Computer Science University of Indonesia Depok Indonesia School of Computing and Information Technology University of Wollongong WollongongNSW Australia Department of Information Security Engineering Soonchunhyang University Asan-si Korea Republic of
Massive Internet of Things (IoT) applications are characterized by a massive number of low-powered devices with small data storage. In those applications, authentication is very important to guarantee the origin of da... 详细信息
来源: 评论
Data Deletion and Recovery of Androd Plaforms
Data Deletion and Recovery of Androd Plaforms
收藏 引用
International Conference on Computational science and Computational Intelligence (CSCI)
作者: Hyungchan Kim Yeonghun Shin Sungbum Kim Minju Kim Wooyeon Jo Taeshik Shon Platform Tech Team WINS CO. Ltd Seongnam Republic of Korea Department of Artificial Intelligence Convergence Network Ajou University Suwon Republic of Korea Department of Computer Engineering Ajou University Suwon Republic of Korea Department of Cyber Security Ajou University Suwon Republic of Korea
The Android platform accounts for 83% of the global smartphone operating system market share. Android smartphones store personal information and smartphone usage data. In order to prevent cyber security threats, it is... 详细信息
来源: 评论
Differential advising in multi-agent reinforcement learning
arXiv
收藏 引用
arXiv 2020年
作者: Ye, Dayong Zhu, Tianqing Cheng, Zishuo Zhou, Wanlei Yu, Philip S. School of Computer Science China University of Geosciences Wuhan China Centre for Cyber Security and Privacy School of Computer Science University of Technology Sydney Australia Department of Computer Science University of Illinois at Chicago United States
Agent advising is one of the main approaches to improve agent learning performance by enabling agents to share advice. Existing advising methods have a common limitation that an adviser agent can offer advice to an ad... 详细信息
来源: 评论
FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices
arXiv
收藏 引用
arXiv 2022年
作者: Wehbi, Osama Arisdakessian, Sarhad Wahab, Omar Abdel Otrok, Hadi Otoum, Safa Mourad, Azzam Guizani, Mohsen Cyber Security Systems and Applied AI Research Center Department of CSM Lebanese American University Lebanon Department of Computer and Software Engineering Polytechnique Montréal MontrealQC Canada Khalifa University Abu Dhabi United Arab Emirates College of Technological Innovation Zayed University Dubai United Arab Emirates Division of Science New York University Abu Dhabi United Arab Emirates Mohammad Bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
Federated Learning (FL) is a novel distributed privacy-preserving learning paradigm, which enables the collaboration among several participants (e.g., Internet of Things devices) for the training of machine learning m... 详细信息
来源: 评论
Detection of Deepfake videos using long distance attention
arXiv
收藏 引用
arXiv 2021年
作者: Lu, Wei Liu, Lingyi Luo, Junwei Zhao, Xianfeng Zhou, Yicong Huang, Jiwu School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100195 China School of Cyber Security University of Chinese Academy of Sciences Beijing100195 China Department of Computer and Information Science University of Macau 999078 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518055 China
With the rapid progress of deepfake techniques in recent years, facial video forgery can generate highly deceptive video contents and bring severe security threats. And detection of such forgery videos is much more ur... 详细信息
来源: 评论