咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4571-4580 订阅
排序:
Eliminating NB-IoT interference to LTE system: A sparse machine learning based approach
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Sicong Xiao, Liang Han, Zhu Tang, Yuliang Department of Communication Engineering Key Laboratory of Digital Fujian on IoT Communication Architecture and Security Technology Xiamen University Xiamen361005 China University of Houston HoustonTX77004 United States Department of Computer Science and Engineering Kyung Hee University Seoul446-701 Korea Republic of
—Narrowband internet-of-things (NB-IoT) is a competitive 5G technology for massive machine-type communication scenarios, but meanwhile introduces narrowband interference (NBI) to existing broadband transmission such ... 详细信息
来源: 评论
A survey on computational spectral reconstruction methods from RGB to hyperspectral imaging
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Jingang Su, Runmu Fu, Qiang Ren, Wenqi Heide, Felix Nie, Yunfeng School of Future Technology University of Chinese Academy of Sciences Beijing100039 China School of Computer Science and Technology Xidian University Xi’an710071 China King Abdullah University of Science and Technology Thuwal23955-6900 Saudi Arabia State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Computational Imaging Lab Princeton University PrincetonNJ08544 United States Department of Applied Physics and Photonics Vrije Universiteit Brussel Brussels1050 Belgium
Hyperspectral imaging enables many versatile applications for its competence in capturing abundant spatial and spectral information, which is crucial for identifying substances. However, the devices for acquiring hype... 详细信息
来源: 评论
Integrating privacy enhancing techniques into blockchains using sidechains
arXiv
收藏 引用
arXiv 2019年
作者: Parizi, Reza M. Homayoun, Sajad Yazdinejad, Abbas Dehghantanha, Ali Choo, Kim-Kwang Raymond Department of Software Engineering and Game Development Kennesaw State University GA United States Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran Faculty of Computer Engineering University of Isfahan School of Computer Science University of Guelph ON Canada Department of Information Systems and Cyber Security University of Texas San AntonioTX United States
Blockchains are turning into decentralized computing platforms and are getting worldwide recognition for their unique advantages. There is an emerging trend beyond payments that blockchains could enable a new breed of... 详细信息
来源: 评论
The impact of AI on engineering design procedures for dynamical systems
arXiv
收藏 引用
arXiv 2024年
作者: de Payrebrune, Kristin M. Flaßkamp, Kathrin Ströhla, Tom Sattel, Thomas Bestle, Dieter Röder, Benedict Eberhard, Peter Peitz, Sebastian Stoffel, Marcus Rutwik, Gulakala Aditya, Borse Wohlleben, Meike Sextro, Walter Raff, Maximilian Remy, C. David Yadav, Manish Stender, Merten van Delden, Jan Lüddecke, Timo Langer, Sabine C. Schultz, Julius Blech, Christopher RPTU Kaiserslautern-Landau Institute for Computational Physics in Engneering Gottlieb-Daimler-Straße 74 Kaiserslautern67663 Germany Saarland University Systems Engineering Systems Modeling and Simulation Campus Saarbrücken66123 Germany TU Ilmenau Mechatronics group Max-Planck-Ring 12 Ilmenau98693 Germany Brandenburg University of Technology Cottbus-Senftenberg Chair of Engineering Mechanics and Vehicle Dynamics Siemens-Halske-Ring 14 Cottbus03046 Germany University of Stuttgart Institute of Engineering and Computational Mechanics Pfaffenwaldring 9 Stuttgart70569 Germany TU Dortmund Department of Computer Science & Lamarr Institute Joseph-von-Fraunhofer-Str. 25 Dortmund44227 Germany RWTH Aachen University Institute of General Mechanics Eilfschornsteinstraße 18 Aachen52062 Germany Paderborn University Faculty of Mechanical Engineering Dynamics and Mechatronics Warburger Str. 100 Paderborn33098 Germany University of Stuttgart Institute for Nonlinear Mechanics Pfaffenwaldring 9 Stuttgart70569 Germany Technische Universität Berlin Chair of Cyber-Physical Systems in Mechanical Engineering Straße des 17. Juni 135 Berlin10623 Germany University of Göttingen Institute of Informatics Goldschmidtstr. 7 Göttingen37077 Germany Technische Universität Braunschweig Institute for Acoustics and Dynamics Langer Kamp 19 Braunschweig38106 Germany
Artificial intelligence (AI) is driving transformative changes across numerous fields, revolutionizing conventional processes and creating new opportunities for innovation. The development of mechatronic systems is un... 详细信息
来源: 评论
Privacy-Preserving Location-Based Query Over Encrypted Data in Outsourced Environment
Privacy-Preserving Location-Based Query Over Encrypted Data ...
收藏 引用
IEEE International Conference on Data Science in cyberspace (DSC)
作者: Huijuan Lian Weidong Qiu Di Yan Zheng Huang Peng Tang School of Cyber Security Shanghai Jiao Tong University Shanghai China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
The location-based services in the outsourced environment has become a research hotspot with the rise of cloud computing. Meanwhile, various privacy issues have been increasingly prominent. We propose an efficient spa... 详细信息
来源: 评论
Hierarchical bi-directional self-attention networks for paper review rating recommendation
arXiv
收藏 引用
arXiv 2020年
作者: Deng, Zhongfen Peng, Hao Xia, Congying Li, Jianxin He, Lifang Yu, Philip S. Department of Computer Science University of Illinois at Chicago ChicagoIL United States Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Department of Computer Science and Engineering Lehigh University BethlehemPA United States
Review rating prediction of text reviews is a rapidly growing technology with a wide range of applications in natural language processing. However, most existing methods either use handcrafted features or learn featur... 详细信息
来源: 评论
An improvement of PAA on trend-based approximation for time series
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Chunkai Chen, Yingyang Yin, Ao Qin, Zhen Zhang, Xing Zhang, Keli Jiang, Zoe L. Department of Computer Science and Technology Harbin Institute of Technology Shenzhen China Engineering Laboratory for Big Data Collaborative Security Technology
Piecewise Aggregate Approximation (PAA) is a competitive basic dimension reduction method for high-dimensional time series mining. When deployed, however, the limitations are obvious that some important information wi... 详细信息
来源: 评论
Dynamic data fusion using multi-input models for malware classification
arXiv
收藏 引用
arXiv 2019年
作者: Zenkov, Viktor Laska, Jason Department of Computer Science and Electrical Engineering University of Tennessee Knoxville United States Cyber and Information Security Research Group Oak Ridge National Laboratory
来源: 评论
Floor Based Sensors Walk Identification System Using Dynamic Time Warping with Cloudlet Support
Floor Based Sensors Walk Identification System Using Dynamic...
收藏 引用
International Conference on Semantic Computing
作者: Robert Hughes Fadi Muheidat Mason Lee Lo'ai A. Tawalbeh Electrical and Computer Engineering Department Univeristy of the Pacific Stockton CA USA Department of Computing and Cyber Security Texas A&M University San Antonio TX USA
Current advances in sensor design technologies and computing power (computational and artificial intelligence) have made it possible to build smart assistive living systems that can improve the lives of people. Becaus... 详细信息
来源: 评论
Detecting Bogus Information Attack in Vehicular Ad Hoc Network: A Context-Aware Approach  16
Detecting Bogus Information Attack in Vehicular Ad Hoc Netwo...
收藏 引用
16th International Learning and technology Conference, L and T 2019
作者: Ghaleb, Fuad A. Zainal, Anazida Maroof, Mohd Aizaini Rassam, Murad A. Saeed, Faisal Cybersecurity X Lap Information Assurance and Security Research Group School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor81310 Malaysia Department of Computer and Electronic Engineering Sana'a Community College Sana'a5695 Yemen Faculty of Engineering and Information Technology Taiz University Taiz6803 Yemen College of Computer Science and Engineering University of Taibah Medina Saudi Arabia
Most of Vehicular Ad Hoc Network's (VANET) and Fly Ad Hoc Network (FANET) applications, protocols, and service rely on cooperativeness among network participants. Vehicles, could be unmanned aerial vehicles (e.g. ... 详细信息
来源: 评论