咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4561-4570 订阅
排序:
D-ALICE: Domain Adaptation-based Labeling the human In Cartoon imagE
D-ALICE: Domain Adaptation-based Labeling the human In Carto...
收藏 引用
International Conference on Robot Intelligence technology and Applications (RiTA)
作者: Hyungho Kim Hyeon Cho Ouk Choi Wonjun Hwang Department of Cyber Security Ajou University Suwon Korea Department of Software and Computer Engineering Ajou University Suwon Korea Incheon National University Incheon Korea
How did Alice, who went to the Wonderland, solve the problems? In this paper, as Alice solved problems by changing the size of her body in the Wonderland, we classified the person by changing the style using the image... 详细信息
来源: 评论
Boost AI power: Data augmentation strategies with unlabelled data and conformal prediction, a case in alternative herbal medicine discrimination with electronic nose
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Li Zhan, Xianghao Wu, Rumeng Guan, Xiaoqing Wang, Zhan Zhang, Wei Pilanci, Mert Wang, You Luo, Zhiyuan Li, Guang The State Key Laboratory of Industrial Control Technology Institute of Cyber-Systems and Control Zhejiang University Hangzhou310027 China Department of Bioengineering Stanford University StanfordCA94305 United States The Computer Learning Research Center Royal Holloway University of London Egham Hill Surrey EghamTW20 0EX United Kingdom Department of Electrical Engineering Stanford University StanfordCA94305 United States
Electronic nose has been proven effective in alternative herbal medicine classification, but due to the nature of supervised learning, previous research heavily relies on the labelled training data, which are time-cos... 详细信息
来源: 评论
A blockchain future for internet of things security: a position paper
收藏 引用
Digital Communications and Networks 2018年 第3期4卷 149-160页
作者: Mandrita Banerjee Junghee Lee Kim-Kwang Raymond Choo Department of Electrical and Computer Engineering University of Texas at San Antonio San Antonio TX 78249 USA Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249 USA
Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Th... 详细信息
来源: 评论
Univariate Forecasting of time series data Based on Seq2Seq Model  20
Univariate Forecasting of time series data Based on Seq2Seq ...
收藏 引用
Proceedings of the 2020 4th International Conference on Electronic Information technology and computer engineering
作者: Yanwen Guo Tao Wu Yanbing Liu Yixin Jiang Department of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China Chongqing Engineering Laboratory of Internet and Information Sccurity Chongqing University of Posts and Telecommunications Chongqing China Electric Power Research Institute CSG Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
With the release of country's 2020 new infrastructure projects, the increasing demand for electricity in various projects has further promoted the intelligent upgrade of the power grid. The processing of grid data... 详细信息
来源: 评论
Budgeted online selection of candidate iot clients to participate in federated learning
arXiv
收藏 引用
arXiv 2020年
作者: Mohammed, Ihab Tabatabai, Shadha Al-Fuqaha, Ala El Bouanani, Faissal Qadir, Junaid Qolomany, Basheer Guizani, Mohsen School of Computer Sciences Western Illinois University MacombIL61455 United States Department of Computer Science Western Michigan University and Computer Science Department Al-Nahrain University Iraq Information and Computing Technology Division Hamad Bin Khalifa University and Computer Science Department Western Michigan University United States Mohammed V University Rabat Morocco Information Technology University Lahore Pakistan Department of Cyber Systems College of Business & Technology University of Nebraska at Kearney KearneyNE68849 United States Computer Science and Engineering Department Qatar University Doha Qatar
Machine Learning (ML), and Deep Learning (DL) in particular, play a vital role in providing smart services to the industry. These techniques however suffer from privacy and security concerns since data is collected fr... 详细信息
来源: 评论
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Under Spectrum Sharing
Trading Based Service-Oriented Spectrum-Aware RAN-Slicing Un...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Kajia Jiao Xuanheng Li Miao Pan Fan Jiang Ming Li School of Information and Communication Engineering Dalian University of Technology Dalian China Department of Electrical and Computer Engineering University of Houston Houston TX USA Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xian Shaanxi China
The fast development on emerging services makes our telecommunications networks witness two key problems. One is the flexibility to fulfill the diverse service requests and the other is the shortage on spectrum. Netwo...
来源: 评论
That’s Not Me! Designing Fictitious Profiles to Answer securityQuestions
arXiv
收藏 引用
arXiv 2019年
作者: Micallef, Nicholas Gamagedara Arachchilage, Nalin Asanka UNSW Canberra Cyber School of Engineering and Information Technology University of New South Wales Canberra Australia Optus La Trobe Cyber Security Research Hub Department of Computer Science IT School of Engineering and Mathematical Sciences La Trobe University VIC3086 Australia
Although security questions are still widely adopted, they still have several limitations. Previous research found that using system-generated information to answer security questions could be more secure than users’... 详细信息
来源: 评论
Random Sampling on an High-Dimensional Sphere for Solving SVP
Random Sampling on an High-Dimensional Sphere for Solving SV...
收藏 引用
Computing Conference, 2019
作者: Qin, Ling Zhang, Xue Wang, Xiaoyun Zheng, Zhongxiang Qi, Wenfeng National Digital Switching System Engineering & Technological Research Center Zhengzhou China Institute for Advanced Study Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Science and Technology on Communication Security Laboratory Chengdu China
In this paper, we present a random sampling algorithm to solve the shortest vector problem (SVP). The idea of our algorithm comes from the Gaussian hypothesis, which is one of the most important and commonly used hypo... 详细信息
来源: 评论
Edge Learning for B5G Networks with Distributed Signal Processing: Semantic Communication, Edge Computing, and Wireless Sensing
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Wei Yang, Zhaohui Ng, Derrick Wing Kwan Levorato, Marco Eldar, Yonina C. Debbah, Mérouane The National Mobile Communications Research Lab Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China The Department of Electronic and Electrical Engineering University College London LondonWC1E 6BT United Kingdom The School of Electrical Engineering and Telecommunications The University of New South Wales Australia The Department of Computer Science University of California IrvineCA92697 United States The Faculty of Math and CS Weizmann Institute of Science Rehovot7610001 Israel The Technology Innovation Institute The Mohamed Bin Zayed University of Artificial Intelligence Masdar City Abu Dhabi9639 United Arab Emirates
To process and transfer large amounts of data in emerging wireless services, it has become increasingly appealing to exploit distributed data communication and learning. Specifically, edge learning (EL) enables local ... 详细信息
来源: 评论
An Intelligent Wireless Displacement Sensor for Landslide Monitoring and Early Warning
收藏 引用
IOP Conference Series: Earth and Environmental Science 2021年 第7期861卷
作者: Xing Zhu Hewei Xi Zhaoqing He Liu Yang State Key Laboratory Geohazard Prevention and Geoenvironment Protection Chengdu University of Technology Chengdu 610059 China College of Computer Science and Cyber Security Chengdu Univeristy of Technology Chengdu 610059 China College of Nuclear Technology and Automation Engineering Chengdu University of Technology Chengdu 610059 China
Landslide poses a great threat to the safety of local communities, engineering construction and operation. Accurate monitoring and successful early-warning of rapid landslides using conventional techniques with consta...
来源: 评论