咨询与建议

限定检索结果

文献类型

  • 3,623 篇 会议
  • 2,399 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,798 篇 工学
    • 2,918 篇 计算机科学与技术...
    • 2,393 篇 软件工程
    • 1,037 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 578 篇 电气工程
    • 420 篇 生物工程
    • 364 篇 电子科学与技术(可...
    • 287 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 227 篇 安全科学与工程
    • 185 篇 光学工程
    • 164 篇 动力工程及工程热...
    • 158 篇 交通运输工程
    • 156 篇 仪器科学与技术
    • 140 篇 化学工程与技术
  • 1,615 篇 理学
    • 859 篇 数学
    • 455 篇 生物学
    • 330 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 217 篇 系统科学
    • 146 篇 化学
  • 1,022 篇 管理学
    • 657 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 310 篇 工商管理
  • 312 篇 法学
    • 201 篇 社会学
  • 295 篇 医学
    • 227 篇 临床医学
    • 208 篇 基础医学(可授医学...
    • 146 篇 公共卫生与预防医...
  • 136 篇 经济学
    • 135 篇 应用经济学
  • 58 篇 农学
  • 53 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 235 篇 accuracy
  • 212 篇 deep learning
  • 197 篇 security
  • 196 篇 feature extracti...
  • 187 篇 machine learning
  • 162 篇 internet of thin...
  • 159 篇 training
  • 149 篇 computational mo...
  • 128 篇 authentication
  • 124 篇 real-time system...
  • 104 篇 privacy
  • 101 篇 support vector m...
  • 101 篇 blockchain
  • 99 篇 predictive model...
  • 96 篇 cryptography
  • 95 篇 protocols
  • 91 篇 artificial intel...
  • 86 篇 convolutional ne...
  • 81 篇 optimization
  • 80 篇 data models

机构

  • 220 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 72 篇 college of cyber...
  • 59 篇 school of comput...
  • 59 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 55 篇 school of comput...
  • 55 篇 school of cyber ...
  • 53 篇 school of cyber ...
  • 43 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 university of bu...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 36 篇 yeshwantrao chav...
  • 36 篇 department of co...
  • 35 篇 department of co...
  • 32 篇 school of comput...

作者

  • 53 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 34 篇 das ashok kumar
  • 31 篇 huang qingming
  • 26 篇 muhaidat sami
  • 26 篇 cao xiaochun
  • 25 篇 mohammad kamrul ...
  • 24 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 walid el-shafai
  • 17 篇 ma jianfeng
  • 17 篇 naglaa f.soliman
  • 16 篇 guo yuanxiong
  • 16 篇 zhang leo yu

语言

  • 4,657 篇 英文
  • 1,357 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
6065 条 记 录,以下是1341-1350 订阅
排序:
Moye: A Wallbreaker for Monolithic Firmware
Moye: A Wallbreaker for Monolithic Firmware
收藏 引用
International Conference on Software engineering (ICSE)
作者: Jintao Huang Kai Yang Gaosheng Wang Zhiqiang Shi Zhiwen Pan Shichao Lv Limin Sun Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Electronics and Information Guangxi University Nanning China
As embedded devices become increasingly popular, monolithic firmware, known for its execution efficiency and simplicity, is widely used in resource-constrained devices. Different from ordinary firmware, the monolithic... 详细信息
来源: 评论
TMAS:A transaction misbehavior analysis scheme for blockchain
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 42-52页
作者: Shiyong Huang Xiaohan Hao Yani Sun Chenhuang Wu Huimin Li Wei Ren Kim-Kwang Raymond Choo School of Computer Science China University of GeosciencesWuhan430074China Artificial Intelligence Thrust Information HubHong Kong University of Science and TechnologyGuangzhou511400China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Institute of Beihang UniversityKunming650233China Fujian Key Laboratory of Financial Information Processing Putian UniversityPutian351100China Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX 78249-0631USA
Blockchain-based cryptocurrencies,such as Bitcoins,are increasingly ***,the decentralized and anonymous nature of these currencies can also be(ab)used for nefarious activities such as money laundering,thus reinforcing... 详细信息
来源: 评论
An Efficient and Explainable Machine Learning Framework for Alzheimer's Disease Detection
An Efficient and Explainable Machine Learning Framework for ...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Emad Arafah Rejwan Bin Sulaiman Mohammad Ahmad Md. Simul Hasan Talukder Department of Computer Science University of Petra Amman Jordan Lecturer of AI and Cyber Security Northumbria University Newcastle upon Tyne UK Lecturer of Computer Science University of Bedfordshire Luton UK Electrical and Electronic Engineering Dhaka University of Engineering & Technology Gazipur Bangladesh
Alzheimer's disease detection is of paramount importance as it is a global health problem in terms of early detection, interventions, and management. The study applies prominent machine learning classification to ... 详细信息
来源: 评论
Secure Cloud Computing: Mitigating Network Vulnerabilities
Secure Cloud Computing: Mitigating Network Vulnerabilities
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Santhosh Kumar Gopal Abdul Sajid Mohammed Madhusudhan Dasari Sreeramulu Dhamodharan Srinivasan Technology Lead Charlotte NC USA Dept of School of Computer and Information Sciences University of the Cumberlands Kentucky USA Dept of Cyber Security American Express Department of Computer and Communication Engineering Sri Eshwar College of Engineering Coimbatore Tamil Nadu India
As businesses increasingly depend on these cloud-based services, secure cloud computing is vital. There is no free way with the cloud network, and our information is susceptible to vulnerability. Mitigation strategies... 详细信息
来源: 评论
An Efficient Post-quantum Identity-Based Signature
收藏 引用
Chinese Journal of Electronics 2021年 第2期30卷 238-248页
作者: YANG Zhichao DUNG H.Duong WILLY Susilo YANG Guomin LI Chao CHEN Rongmao College of Liberal Arts and Sciences National University of Defence Technology Department of Information Security Naval University of Engineering School of Computing and Information Technology University of Wollongong College of Computer National University of Defence Technology
Digital signature is one of the most important cryptography primitives. Recently, more and more works have been done to construct signatures over lattice problems to keep them secure in the quantum age. Among them, a ... 详细信息
来源: 评论
Malware analysis and multi-label category detection issues: Ensemble-based approaches  3
Malware analysis and multi-label category detection issues: ...
收藏 引用
3rd International Conference on Intelligent Data Science Technologies and Applications, IDSTA 2022
作者: Alsmadi, Izzat Al-Ahmad, Bilal Alsmadi, Mohammad Department of Computing and Cyber Security Texas A&m San Antonio United States The University of Jordan Computer Information Systems Department Aqaba Jordan Applied Science University Information Technology Amman Jordan
Detection of malware and security attacks is a complex process that can vary in its details and analysis activities. As part of the detection process, malware scanners try to categorize a malware once it is detected u... 详细信息
来源: 评论
Differential privacy protection method for trip-oriented shared data
Differential privacy protection method for trip-oriented sha...
收藏 引用
作者: Du, Danlei Luo, Entao Yi, Yang Peng, Tao Li, Xubin Zhang, Shaobo Jiang, Xu Wang, Tian School of Information Engineering Hunan University of Science and Engineering YongZhou China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Department of Computer Science Northeastern Illinois University ChicagoIL United States School of Computer Science and Engineering Guangzhou University Guangzhou China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China School of Computer Science and Engineering Nanjing University of Science and Technology NanJing China Zhuhai China Zhuhai China
While location information sharing technology provides convenience for unmanned driving and journey navigation, user journey information sharing has also become a disaster for privacy information leakage. The traditio... 详细信息
来源: 评论
New Constructions for Linear Maximum Sum-Rank Distance Codes
New Constructions for Linear Maximum Sum-Rank Distance Codes
收藏 引用
IEEE International Symposium on Information Theory
作者: Huimin Lao Yeow Meng Chee Hao Chen Van Khu Vu Department of Industrial Systems Engineering and Management National University of Singapore Singapore College of Information Science and Technology/Cyber Security Jinan University China
Sum-rank-metric codes have attracted lots of attention due to their numerous applications, including muti-shot linear network coding, space-time coding, and distributed storage systems. In this paper, we focus on cons... 详细信息
来源: 评论
Enhanced Reinforcement of Filler in Polyurethane Foam - Mechanical and Thermal Properties  2
Enhanced Reinforcement of Filler in Polyurethane Foam - Mech...
收藏 引用
2nd IEEE International Conference on Emerging Trends in engineering and Medical Sciences, ICETEMS 2024
作者: Sathish, T. Giri, Jayant Al Sherideh, Ala'a Saveetha School of Engineering SIMATS Saveetha University Thandalam Department of Mechanical Engineering Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India College of Information Technology Zarga University Department of Cyber Security Zarqa Jordan University of Business and Technology Jeddah 21448 Saudi Arabia
Al2O3 synthetic filler represents one of the most readily accessible supplies for applications evaluating performance, cost, and benefit. In the present research, pure polyurethane foam was mixed with the previously d... 详细信息
来源: 评论
AdaSin: Enhancing Hard Sample Metrics with Dual Adaptive Penalty for Face Recognition
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Qiqi Zheng, Zhuowen Yang, Guanghua Liu, Zhiquan Li, Xiaofan Li, Jianqing Tian, Jinyu Gong, Xueyuan School of Intelligent Systems Science and Engineering Jinan University Guangdong China College of Cyber Security Jinan University Guangdong China School of Computer Science and Engineering Macau University of Science and Technology China
In recent years, the emergence of deep convolutional neural networks has positioned face recognition as a prominent research focus in computer vision. Traditional loss functions, such as margin-based, hard-sample mini... 详细信息
来源: 评论