咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4541-4550 订阅
排序:
Opportunistic ambient backscatter communication in RF-Powered cognitive radio networks
Opportunistic ambient backscatter communication in RF-Powere...
收藏 引用
作者: Kishore, Rajalekshmi Gurugopinath, Sanjeev Sofotasios, Paschalis C. Muhaidat, Sami Al-Dhahir, Naofal Department of Electrical and Computer Engineering Khalifa University Abu Dhabi127788 United Arab Emirates Goa403726 India Department of Electronics and Communication Engineering PES University Bengaluru560085 India Department of Electrical and Computer Engineering Center for Cyber-Physical Systems Khalifa University Abu Dhabi127788 United Arab Emirates Department of Electronics and Communications Engineering Tampere University of Technology Tampere33101 Finland Department of Electrical Engineering University of Texas at Dallas DallasTX75080 United States
In the present contribution, we propose a novel opportunistic ambient backscatter communication (ABC) framework for radio frequency (RF)-powered cognitive radio (CR) networks. This framework considers opportunistic sp... 详细信息
来源: 评论
Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators
Cooperative Game Model of Delegation Computing: Verifier Sep...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Duo Zhang Youliang Tian Linjie Wang Sheng Gao Jianfeng Ma State Key Laboratory of Public Big Data College of Computer Science and Technology College of Mathematics and Statistics Guizhou University Guiyang China State Key Laboratory of Public Big Data College of Computer Science and Technology Institute of Cryptography and Date Security Guizhou University Guiyang China State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Information Central University of Finance and Economics Beijing China School of Cyber Engineering College of Computer Science and Technology Xi'dian University Xi'an China
In cloud computing, the delegation computation service is required because end users usually are resource-constrained, and at the same time the correctness of computing results needs to be verified. However, all the e... 详细信息
来源: 评论
UAV Communication Channel Measurement, Modeling, and Application
收藏 引用
Journal of Communications and Information Networks 2019年 第4期4卷 32-43页
作者: Xiang Cheng Yiran Li Lin Bai State Key Laboratory of Advanced Optical Communication Systems and Networks Department of ElectronicsSchool of Electronics Engineering and Computer SciencePeking UniversityBeijing 100871China Shenzhen Research Institute of Big Data Shenzhen 518000China School of Cyber Science and Technology Beihang UniversityBeijing 100191China
As unmanned aerial vehicles(UAV)deploy-ment is shifting from military to civilian sectors,and in particular as a means of facilitating more flexible and versatile wireless communications,the UAV channels that were pre... 详细信息
来源: 评论
Classification of radio signals using truncated Gaussian discriminant analysis of convolutional neural network-derived features
arXiv
收藏 引用
arXiv 2020年
作者: Persons, Jeffrey B. Wong, L.J. Headley, W.C. Fowler, M.C. Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States Intel Corporation San JoseCA United States Hume Center for National Security and Technology Virginia Tech United States
To improve the utility and scalability of distributed radio frequency (RF) sensor and communication networks, reduce the need for convolutional neural network (CNN) retraining, and efficiently share learned informatio... 详细信息
来源: 评论
Cost-efficient and skew-aware data scheduling for incremental learning in 5G network
arXiv
收藏 引用
arXiv 2020年
作者: Pu, Lingjun Yuan, Xinjing Xu, Xiaohang Chen, Xu Zhou, Pan Xu, Jingdong The College of Computer Science Nankai University Tianjin300071 China The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710126 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The Pazhou Lab. Guangzhou510335 China The Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
To facilitate the emerging applications in 5G networks, mobile network operators will provide many network functions in terms of control and prediction. Recently, they have recognized the power of machine learning (ML... 详细信息
来源: 评论
Facilitation of cybersecurity learning through real-world hands-on labs  126
Facilitation of cybersecurity learning through real-world ha...
收藏 引用
126th ASEE Annual Conference and Exposition: Charged Up for the Next 125 Years, ASEE 2019
作者: Rahouti, Mohamed Xiong, Kaiqi Department of Electrical Engineering University of South Florida Tampa33620 United States Cyber Florida University of South Florida Tampa33620 United States Department of Mathematics and Statistics University of South Florida Tampa33620 United States Intelligent Computer Networking and Security Lab University of South Florida Tampa33620 United States
来源: 评论
Second-Order Asymptotically Optimal Outlier Hypothesis Testing
arXiv
收藏 引用
arXiv 2020年
作者: Zhou, Lin Wei, Yun Hero, Alfred School of Cyber Science and Technology Beihang University Beijing100083 China Department of Statistical Science Duke University DurhamNC27708 United States Department of Electrical Engineering and Computer Science University of Michigan Ann ArborMI48109 United States
We revisit the outlier hypothesis testing framework of Li et al. (TIT 2014) and derive fundamental limits for the optimal test under the generalized Neyman-Pearson criterion. In outlier hypothesis testing, one is give... 详细信息
来源: 评论
Understanding global environment for network innovations (GENI) and software-defined networking (SDN) for computer networking and security education  126
Understanding global environment for network innovations (GE...
收藏 引用
126th ASEE Annual Conference and Exposition: Charged Up for the Next 125 Years, ASEE 2019
作者: Rahouti, Mohamed Xiong, Kaiqi Department of Electrical Engineering University of South Florida Tampa33620 United States Cyber Florida University of South Florida Tampa33620 United States Department of Mathematics and Statistics University of South Florida Tampa33620 United States Intelligent Computer Networking and Security Lab University of South Florida Tampa33620 United States
Hands-on modules and experiments are considered essential and fundamental components in cyber security curriculums. However, because of the significant increase in student enrollments in both online and face-to-face c... 详细信息
来源: 评论
An IoT and blockchain-based multi-sensory in-home quality of life framework for cancer patients  15
An IoT and blockchain-based multi-sensory in-home quality of...
收藏 引用
15th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2019
作者: Rahman, Md. Abdur Rashid, Mamunur Barnes, Stuart Shamim Hossain, M. Hassanain, Elham Guizani, Mohsen Cyber Security and Forensic Computing Department University of Prince Mugrin Madinah Saudi Arabia Research Centre King's College London United Kingdom Department of Software Engineering King Saud University Riyadh11543 Saudi Arabia Dept. of Electrical and Computer Engineering University of Idaho MoscowID83844-1023 United States Dept. of Computer Science Umm Al-Qura University Makkah Saudi Arabia
Once a subject is diagnosed with cancer, a patient goes through a series of diagnosis and tests, referred to as after cancer treatment. Due to the nature of the treatment and side effects on regular lifestyles, mainta... 详细信息
来源: 评论
LOFFS: A Low-Overhead File System for Large Flash Memory on Embedded Devices
LOFFS: A Low-Overhead File System for Large Flash Memory on ...
收藏 引用
Design Automation Conference
作者: Runyu Zhang Duo Liu Xianzhang Chen Xiongxiong She Chaoshu Yang Yujuan Tan Zhaoyan Shen Zili Shao College of Computer Science Chongqing University Chongqing China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University College of Computer Science Shandong University Qingdao China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China
Emerging applications like machine learning in embedded devices (e.g., satellite and vehicles) require huge storage space, which recently stimulates the widespread deployment of large-capacity flash memory in IoT devi... 详细信息
来源: 评论