咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是301-310 订阅
排序:
Clustering Network Based on Pre-Clustering Center Codebook  18
Clustering Network Based on Pre-Clustering Center Codebook
收藏 引用
18th International Conference on Intelligent Systems and Knowledge engineering, ISKE 2023
作者: An, Qiulong Wu, Jianning Huang, Tianqiang Huang, Liqing Luo, Haifeng Ye, Feng College of Computer and Cyber Security Fujian Normal University Digital Fujian Institute of Big Data Security Technology Fujian Provincial Engineering Research Center of Big Data Analysis and Application Fuzhou China
Most existing deep clustering models attempt to group similar datas by using autoencoders to simultaneously minimize the clustering loss and reconstruction losses. However, these methods do not impose any constraints ... 详细信息
来源: 评论
Threats Detection and Analysis Based on SYSMON Tool  13
Threats Detection and Analysis Based on SYSMON Tool
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Bahniuk, Nataliia Oleksandr, Linchuk Kateryna, Bortnyk Inna, Kondius Kateryna, Melnyk Kondius, Kostiantyn Lutsk National Technical University Department of Computer Engineering and Cyber Security Lutsk Ukraine Lutsk National Technical University Dean of the Faculty of Computer and Information Technologies Lutsk Ukraine
In this work, an nalysis for the study of threats in a real environment with the possibility of conducting a full-fledged analysis of threats, as well as their simulationhas been developed for research purposes. Desig... 详细信息
来源: 评论
An Analysis of security Protocols for Cloud Computing Algorithms in Mobile Ad Hoc Networks  3
An Analysis of Security Protocols for Cloud Computing Algori...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Mohammed, Abdul Sajid Dasari Sreeramulu, Madhusudhan Neravetla, Anuteja Reddy Gupta, Ketan Yuvaraj, N. University of the Cumberlands Dept of School of Computer and Information Sciences KY United States American Express Dept of Cyber Security United States University of the Cumberlands Department of Information Technology KY United States University of the Cumberlands Department of Information Technology WilliamsburgKY United States Sri Shakthi Institute of Engineering and Technology Computer Science and Engineering Tamil Nadu Coimbatore641062 India
Cellular ad Hoc Networks (MANETs) have become increasingly popular in cell computing packages, inclusive of cellular computing, fitness care, automobile, and army packages. As such, safety protocols used in the transm... 详细信息
来源: 评论
Collecting and analyzing key-value data under shuffled differential privacy
收藏 引用
Frontiers of computer Science 2023年 第2期17卷 241-243页
作者: Ning WANG Wei ZHENG Zhigang WANG Zhiqiang WEI Yu GU Peng TANG Ge YU Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Lab of Cryptologic Technology and Information Security Ministry of EducationShandong UniversityQingdao 266200China School of Cyber Science and Technology Shandong UniversityQingdao 266200China
1 Introduction Key-value data,as NoSQL data widely used in recent years,has been frequently collected and used for analysis in major websites and mobile *** frequency distribution estimation on the key domain,as well ... 详细信息
来源: 评论
Characterization and Properties of Bent-Negabent Functions
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 786-792页
作者: JIANG Niu ZHAO Min YANG Zhiyao ZHUO Zepeng CHEN Guolong School of Mathematical Sciences Huaibei Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University School of Cyber Science University of Science and Technology of China School of Computer Engineering Bengbu University
A further characterization of the bentnegabent functions is presented. Based on the concept of complete mapping polynomial, we provide a necessary and sufficient condition for a class of quadratic Boolean functions to... 详细信息
来源: 评论
MODELGUARD: information-theoretic defense against model extraction attacks  24
MODELGUARD: information-theoretic defense against model extr...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Minxue Tang Anna Dai Louis DiValentin Aolin Ding Amin Hass Neil Zhenqiang Gong Yiran Chen Hai Helen Li Department of Electrical and Computer Engineering Duke University Cyber Security Lab Accenture
Malicious utilization of a query interface can compromise the confidentiality of ML-as-a-Service (MLaaS) systems via model extraction attacks. Previous studies have proposed to perturb the predictions of the MLaaS sys...
来源: 评论
ELI-Net: Ensemble learning interpretable networks for the classification of remote sensing images  11
ELI-Net: Ensemble learning interpretable networks for the cl...
收藏 引用
11th International Conference on Information Systems and Computing technology, ISCTech 2023
作者: Ai, Yizhuo Wei, Qin Tang, Hao Wu, Yuling Oxford Brookes University Chengdu University of Technology College of Computer and Cyber Security Chengdu China Southwest Jiaotong University School of Mechanical Engineering Chengdu China
Fine-grained target classification in optical remote sensing images is becoming one of the hotspots in the field of remote sensing image classification. Although many deep learning models have demonstrated good perfor... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Development of Authentication Framework Using GAIT for IoT Communication Models
Development of Authentication Framework Using GAIT for IoT C...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Nishat, Humaira Balaji, T.S. Shargunam, S. Sasikala, R. Rani, K. Cvr College of Engineering Department of Electronics and Communication Engineering Telangana Hyderabad India Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Electronics and Communication Engineering Tamilnadu Chennai600026 India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu Srivilliputhur India Karpagam College of Engineering Department of Cyber Security Tamilnadu Coimbatore641032 India M. Kumarasamy College of Engineering Department of Information Technology Tamilnadu Karur India
The data collected by the authorised sensor devices is transferred to the cloud for safe storage. Communication occurs via a secure key management system designed for a decentralised network. Subsequently, it is impor... 详细信息
来源: 评论
A Privacy-Preserving System Design for Digital Presence Protection
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3091-3110页
作者: Eric Yocam Ahmad Alomari Amjad Gawanmeh Wathiq Mansoor Department of Computer and Cyber Sciences The Beacom CollegeDakota State UniversitySouth DakotaUSA Department of Software Engineering and Information Technology Ecole de Technologie Superieure(ETS)MontrealCanada College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
A person’s privacy has become a growing concern,given the nature of an expansive reliance on real-time video activities with video capture,stream,and *** paper presents an innovative system design based on a privacy-... 详细信息
来源: 评论