咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,351 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,945 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,683 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,331 篇 软件工程
    • 971 篇 信息与通信工程
    • 551 篇 控制科学与工程
    • 513 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 251 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,577 篇 理学
    • 830 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 263 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 130 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 229 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 185 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 blockchain
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 protocols
  • 89 篇 artificial intel...
  • 84 篇 convolutional ne...
  • 80 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 71 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of cy...
  • 38 篇 department of co...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 30 篇 university of bu...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 29 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 han zhu
  • 17 篇 naglaa f.soliman
  • 17 篇 jin hai
  • 16 篇 ma jianfeng

语言

  • 4,940 篇 英文
  • 948 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5945 条 记 录,以下是1191-1200 订阅
排序:
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 评论
A Novel Machine Learning-Based Framework for Predicting Diabetes in Healthcare
A Novel Machine Learning-Based Framework for Predicting Diab...
收藏 引用
2025 International Conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Oliver, A. Sheryl Gupta, Kimmi Singh, Jagendra Agnihotri, Atul Kumar Vasavi, M. Kaur, Gaganjot Srm Institute of Science and Technology Department of Computational Intelligence Chennai India School of Computer Science Engineering & Technology Bennett University Greater Noida India School of Engineering and Technology Chhatrapati Shahu Ji Maharaj University Electronics and Communication Engineering Kanpur India Cvr College of Engineering Department of Et -Cyber Security Hyderabad India Raj Kumar Goel Institute of Technology Department of Computer Science Ghaziabad India
The rise in diabetes is considered the greatest global health issue;thus, the call for early and accurate predictions of the disease is a dire need in the health sector. The detection of the disease in its initial sta... 详细信息
来源: 评论
Comparative Evaluation of Deep Learning Models in Alzheimer’s Disease Diagnosis
收藏 引用
Procedia computer Science 2025年 258卷 2352-2361页
作者: Leena Arya Yogesh Kumar Sharma Smitha Nayak Janaki Sivakumar Assistant Professor Computing Department Muscat College Oman Associate Professor Programme leader Computer security and forensics Department of Computer Science and Creative Technologies Global College of Engineering and Technology Muscat Oman
Alzheimer’s Disease (AD) is an ever-evolving neurodegenerative confusion that influences the neurons of the mind in a manner that hinders the patients’ ability to solve problems and remember issues and that requires... 详细信息
来源: 评论
Research on Concurrency Control in Database Systems  12th
Research on Concurrency Control in Database Systems
收藏 引用
12th International Conference on computer engineering and Networks, CENet 2022
作者: Shen, Pengxu Qian, Hanwei Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
In a database system, if the degree of concurrency is high, using a concurrency control algorithm alone will reduce the performance of the system, and the process of selecting a concurrency control algorithm will virt... 详细信息
来源: 评论
security Revisited: Honeytokens meet Google Authenticator  7
Security Revisited: Honeytokens meet Google Authenticator
收藏 引用
7th South-East Europe Design Automation, computer engineering, computer Networks and Social Media Conference, SEEDA-CECNSM 2022
作者: Papaspirou, Vassilis Papathanasaki, Maria Maglaras, Leandros Kantzavelou, Ioanna Douligeris, Christos Ferrag, Mohamed Amine Janicke, Helge University of West Attica Department of Informatics and Computer Engineering Athens Greece University of Thessaly Department of Cs and Telecommunications Lamia Greece Cyber Technology Institute De Montfort University Leicester United Kingdom University of Piraeus Department of Informatics Piraeus Greece Guelma University Department of Computer Science Guelma Algeria Cyber Security CRC Edith Cowan University Perth Perth6027 Australia
In contrast to the rapid advancement and evolution of technology, computer systems rely significantly on passwords to maintain their security for an unreasonably long time. Although the introduction of two or more fac... 详细信息
来源: 评论
A Community Detection Approach for Academic Social Network: The Case of the Cross-Strait Academic Conference Network  3
A Community Detection Approach for Academic Social Network: ...
收藏 引用
3rd International Conference on Electronics, Communications and Information technology, CECIT 2022
作者: Zhang, Xinxin Xu, Li Gao, Min Fan, Jianxi Sun, Hung-Min Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China Fudan University The School of Computer Science Shanghai China Soochow University The School of Computer Science and Technology Suzhou China National Tsing Hua University The Department of Computer Science Hsinchu Taiwan
With the fast development of information networks, academic social network analysis has attracted significant attention, we regard these researchers sharing common interests as a research community. The community has ... 详细信息
来源: 评论
A Physical-Layer Key Generation Scheme for Non-Square Channel Matrices Based on PMI
A Physical-Layer Key Generation Scheme for Non-Square Channe...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Sun, Haixi Li, Guyue Li, Haoyu Hu, Aiqun Cheng, Yexia Tian, Ye He, Shen Southeast University School of Cyber Science and Engineering Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Research Institute of China Mobile Communications Corporation Department of Security Technology China
Physical-layer secret key generation (PKG) is an emerging technique to address the secret key distribution problem and precoding matrix index (PMI)-based PKG approaches can thwart eavesdropping attempts. However, exis... 详细信息
来源: 评论
Design and Implementation of Weibo Public Opinion Analysis System  12th
Design and Implementation of Weibo Public Opinion Analysis S...
收藏 引用
12th International Conference on computer engineering and Networks, CENet 2022
作者: Qi, Jiacheng Liu, Xiaoqian Yuan, Ming Gu, Haiyan Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Engineering Research Center of Electronic Data Forensics Analysis Jiangsu Nanjing China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu Province Nanjing China
Public opinion refers to the public attitudes and emotions of the masses on social phenomena. As one of the most popular micro-blogging platforms, Sina Weibo serves as an important public opinion carrier. Understandin... 详细信息
来源: 评论
Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound
Highly Efficient Actively Secure Two-Party Computation with ...
收藏 引用
IEEE Symposium on security and Privacy
作者: Yi Liu Junzuo Lai Peng Yang Qi Wang Anjia Yang Siu-Ming Yiu Jian Weng College of Cyber Security Jinan University Guangzhou China Department of Computer Science The University of Hong Kong Hong Kong SAR China Department of Computer Science and Engineering National Center for Applied Mathematics Shenzhen Southern University of Science and Technology Shenzhen China
Secure two-party computation (2PC) enables two parties to jointly evaluate a function while maintaining input privacy. Despite recent significant progress, a notable efficiency gap remains between actively secure and ... 详细信息
来源: 评论
Digital Forensics Study on Smart Watch and Wristband: Data Sniffing, Backup and Database Analyzing  8th
Digital Forensics Study on Smart Watch and Wristband: Data S...
收藏 引用
8th International Conference on Artificial Intelligence and security , ICAIS 2022
作者: Chen, Pu Liang, GuangJun Ding, Ziqi Xu, Zixiang Zhang, Mochi Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing China Jiangsu Province Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Key Laboratory of Digital Forensics of Jiangsu Provincial Public Security Department Nanjing China
With the technology advancing rapidly, it has become apparent that it is nearly impossible to go without a digital trace when committing a crime. Device such as Xiaomi wristband, keeps the record of a user’s daily ac... 详细信息
来源: 评论