咨询与建议

限定检索结果

文献类型

  • 3,528 篇 会议
  • 2,339 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,693 篇 工学
    • 2,823 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 972 篇 信息与通信工程
    • 552 篇 控制科学与工程
    • 517 篇 电气工程
    • 419 篇 生物工程
    • 335 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 195 篇 安全科学与工程
    • 180 篇 光学工程
    • 150 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,577 篇 理学
    • 832 篇 数学
    • 452 篇 生物学
    • 324 篇 物理学
    • 265 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 140 篇 化学
  • 970 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 400 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 302 篇 法学
    • 192 篇 社会学
  • 271 篇 医学
    • 221 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 125 篇 公共卫生与预防医...
  • 128 篇 经济学
    • 127 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 219 篇 accuracy
  • 197 篇 deep learning
  • 183 篇 feature extracti...
  • 181 篇 machine learning
  • 179 篇 security
  • 158 篇 internet of thin...
  • 156 篇 training
  • 142 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 105 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 94 篇 cryptography
  • 87 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 214 篇 school of cyber ...
  • 169 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 58 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 muhaidat sami
  • 26 篇 hai jin
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 deqing zou

语言

  • 5,318 篇 英文
  • 532 篇 其他
  • 61 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5910 条 记 录,以下是4551-4560 订阅
排序:
An improvement of PAA on trend-based approximation for time series
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Chunkai Chen, Yingyang Yin, Ao Qin, Zhen Zhang, Xing Zhang, Keli Jiang, Zoe L. Department of Computer Science and Technology Harbin Institute of Technology Shenzhen China Engineering Laboratory for Big Data Collaborative Security Technology
Piecewise Aggregate Approximation (PAA) is a competitive basic dimension reduction method for high-dimensional time series mining. When deployed, however, the limitations are obvious that some important information wi... 详细信息
来源: 评论
Dynamic data fusion using multi-input models for malware classification
arXiv
收藏 引用
arXiv 2019年
作者: Zenkov, Viktor Laska, Jason Department of Computer Science and Electrical Engineering University of Tennessee Knoxville United States Cyber and Information Security Research Group Oak Ridge National Laboratory
来源: 评论
Floor Based Sensors Walk Identification System Using Dynamic Time Warping with Cloudlet Support
Floor Based Sensors Walk Identification System Using Dynamic...
收藏 引用
International Conference on Semantic Computing
作者: Robert Hughes Fadi Muheidat Mason Lee Lo'ai A. Tawalbeh Electrical and Computer Engineering Department Univeristy of the Pacific Stockton CA USA Department of Computing and Cyber Security Texas A&M University San Antonio TX USA
Current advances in sensor design technologies and computing power (computational and artificial intelligence) have made it possible to build smart assistive living systems that can improve the lives of people. Becaus... 详细信息
来源: 评论
Detecting Bogus Information Attack in Vehicular Ad Hoc Network: A Context-Aware Approach  16
Detecting Bogus Information Attack in Vehicular Ad Hoc Netwo...
收藏 引用
16th International Learning and technology Conference, L and T 2019
作者: Ghaleb, Fuad A. Zainal, Anazida Maroof, Mohd Aizaini Rassam, Murad A. Saeed, Faisal Cybersecurity X Lap Information Assurance and Security Research Group School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor81310 Malaysia Department of Computer and Electronic Engineering Sana'a Community College Sana'a5695 Yemen Faculty of Engineering and Information Technology Taiz University Taiz6803 Yemen College of Computer Science and Engineering University of Taibah Medina Saudi Arabia
Most of Vehicular Ad Hoc Network's (VANET) and Fly Ad Hoc Network (FANET) applications, protocols, and service rely on cooperativeness among network participants. Vehicles, could be unmanned aerial vehicles (e.g. ... 详细信息
来源: 评论
Unextendible product operator basis
arXiv
收藏 引用
arXiv 2021年
作者: Hu, Mengyao Chen, Lin Shi, Fei Zhang, Xiande Tura, Jordi School of Mathematical Sciences Beihang University Beijing100191 China Instituut-Lorentz Universiteit Leiden P.O. Box 9506 Leiden2300 RA Netherlands LMIB Beihang University Ministry of Education China International Research Institute for Multidisciplinary Science Beihang University Beijing100191 China Department of Computer Science The University of Hong Kong Pokfulam Road Hong Kong School of Cyber Security University of Science and Technology of China Hefei230026 China School of Mathematical Sciences University of Science and Technology of China Hefei230026 China Hefei National Laboratory University of Science and Technology of China Hefei230088 China
Quantum nonlocality is associated with the local indistinguishability of orthogonal states. Unextendible product basis (UPB), a widely used tool in quantum information, exhibits nonlocality which is the powerful resou... 详细信息
来源: 评论
Dynamical Interaction Between Information and Disease Spreading in Populations of Moving Agents
收藏 引用
computers, Materials & Continua 2018年 第10期57卷 123-144页
作者: Lingling Xia Bo Song Zhengjun Jing Yurong Song Liang Zhang Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China College of Telecommunications and Information Engineering Nanjing University of Posts and TelecommunicationsNanjing210003China Global Big Data Technologies Centre University of Technology SydneySydney2007Australia College of Computer Engineering Jiangsu University of TechnologyChangzhou213001China College of Automation Nanjing University of Posts and TelecommunicationsNanjing210003China
Considering dynamical disease spreading network consisting of moving individuals,a new double-layer network is constructed,one where the information dissemination process takes place and the other where the dynamics o... 详细信息
来源: 评论
Dense attention fluid network for salient object detection in optical remote sensing images
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Qijian Cong, Runmin Li, Chongyi Cheng, Ming-Ming Fang, Yuming Cao, Xiaochun Zhao, Yao Kwong, Sam The Department of Computer Science City University of Hong Kong Hong Kong The Institute of Information Science Beijing Jiaotong University Beijing100044 China The Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China The School of Computer Science and Engineering Nanyang Technological University Singapore The College of Computer Science Nankai University Tianjin300071 China School of Information Technology Jiangxi University of Finance and Economics NanchangJiangxi330032 China The State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
Despite the remarkable advances in visual saliency analysis for natural scene images (NSIs), salient object detection (SOD) for optical remote sensing images (RSIs) still remains an open and challenging problem. In th... 详细信息
来源: 评论
A manifold-based adversarial autoencoder with Fourier convolution for hyperspectral unmixing
收藏 引用
Applied Soft Computing 2025年 177卷
作者: Guo, Ziyang Xiao, Meixia Zhu, Fa Chen, Xingchi Shankar, Achyut Zamani, Mazdak Singh, Sushil Kumar Department of Artificial Intelligence Nanjing University of Information Science and Technology No. 129 of Ningliu Road Nanjing210044 China Research Center of Nonlinear Science School of Mathematical and Physical Sciences Wuhan Textile University Wuhan China College of Information Science and Technology & College of Artificial Intelligence Nanjing Forestry University Nanjing210037 China Department of Mathematics and Theories Peng Cheng Laboratory Shenzhen518000 China Department of Cyber Systems Engineering WMG University of Warwick CoventryCV74AL United Kingdom State University of New York - Empire State University New York10016 United States Department of Computer Engineering Marwadi University Gujarat Rajkot India
Hyperspectral unmixing aims to decompose each subpixel into their pure endmembers and the corresponding proportions. But existing deep autoencoder-based hyperspectral unmixing methods often suffer from obstacles like ... 详细信息
来源: 评论
Efficient Context-aware File System Approach
Efficient Context-aware File System Approach
收藏 引用
International Conference on Software Defined Systems (SDS)
作者: Abdul Razaque Fathi Amsaad Muder Almiani Wan Xiaoya Li Shiyu Raouf Ganda Majdi Rawashdeh Amer AlRahayfeh Dept. of Computer Engineering and Telecommunication School of Information Security Eastern Michigan University US College of Information Technology Al-Hussein Bin Talal University Jordan Dept. of Computer Science NYIT Nanjing China Yale School of Management Yale University USA Department of Business Information Technology Princess Sumaya University for Technology Amman Jordan
With the rapid development of science and technology, wireless networks are now widely used throughout the world. Given the requirement to improve the usability of computers, a context-aware file system has been rende... 详细信息
来源: 评论
HideMe: Privacy-Preserving Photo Sharing on Social Networks
HideMe: Privacy-Preserving Photo Sharing on Social Networks
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Fenghua Li Zhe Sun Ang Li Ben Niu Hui Li Guohong Cao School of Cyber Security University of Chinese Academy of Sciences China Department of Computer Science and Computer Engineering University of Arkansas USA Chinese Academy of Sciences Institute of Information Engineering China State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University China Department of Computer Science and Engineering The Pennsylvania State University PA USA
Photo sharing on Online Social Networks (OSNs) has become one of the most popular social activities in our daily life. However, some associated friends or bystanders in the photos may not want to be viewed due to priv... 详细信息
来源: 评论