咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4591-4600 订阅
排序:
Fine-grained iterative attention network for temporal language localization in videos
arXiv
收藏 引用
arXiv 2020年
作者: Qu, Xiaoye Tang, Pengwei Zou, Zhikang Cheng, Yu Dong, Jianfeng Zhou, Pan Xu, Zichuan School of Electronic Information and Communication Huazhong University of Science and Technology Huawei Tech. Hangzhou China School of Electronic Information and Communication Huazhong University of Science and Technology China Baidu Inc. China Microsoft Dynamics 365 AI Research RedmondWA United States School of Computer and Information Engineering Zhejiang Gongshang University China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Dalian University of Technology China
Temporal language localization in videos aims to ground one video segment in an untrimmed video based on a given sentence query. To tackle this task, designing an effective model to extract grounding information from ... 详细信息
来源: 评论
A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking
A Novel Congestion-Aware Interest Flooding Attacks Detection...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Ahmed Benmoussa Abdou el Karim Tahari Nasreddine Lagaa Abderrahmane Lakas Farhan Ahmad Rasheed Hussain Chaker Abdelaziz Kerrache Fatih Kurugollu Department of Computer Science University of Laghouat Algeria College of Information Technology United Arab Emirates University Al Ain UAE Cyber Security Research Group University of Derby Derby UK Institute of Security and Cyber-Physical Systems Innopolis University Innopolis Russia Department of Maths and Computer Science University of Ghardaia Ghardaia Algeria
Named Data Networking (NDN) is a promising candidate for future internet architecture. It is one of the implementations of the Information-Centric Networking (ICN) architectures where the focus is on the data rather t... 详细信息
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
Infrared and Visible Image Fusion via Multi-discriminators Wasserstein Generative Adversarial Network
Infrared and Visible Image Fusion via Multi-discriminators W...
收藏 引用
International Conference on Machine Learning and Applications (ICMLA)
作者: Jing Li Hongtao Huo Kejian Liu Chang Li Shuo Li Xin Yang School of Information Technology and Cyber Security People’s Public Security University of China BeiJing China Remote sensing center of public security People’s Public Security University of China BeiJing China Department of Biomedical Engineering Hefei University of Technology Hefei China
Generative adversarial network (GAN) has been widely applied to infrared and visible image fusion. However, the existing GAN-based image fusion methods only establish one discriminator in the network to make the fused... 详细信息
来源: 评论
Correction to: A biometric cryptosystem scheme based on random projection and neural network
收藏 引用
Soft Computing 2021年 第11期25卷 7671-7671页
作者: Peng, Jialiang Yang, Bian Gupta, B. B. El-Latif, Ahmed A. Abd School of Data Science and Technology Heilongjiang University Harbin China Guangxi Key Laboratory of Cryptography and Information Security Guilin China Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Computer Engineering Department NIT Kurukshetra Kurukshetra India Department of Computer Science and Information Engineering Asia University Taichung Taiwan Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt
A correction to this paper has been published: https://***/10.1007/s00500-021-05804-3
来源: 评论
Task-feature collaborative learning with application to personalized attribute prediction
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Zhiyong Xu, Qianqian Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China University of Chinese Academy of Sciences Beijing101408 Peng Cheng Laboratory Shenzhen518055 China
As an effective learning paradigm against insufficient training samples, Multi-Task Learning (MTL) encourages knowledge sharing across multiple related tasks so as to improve the overall performance. In MTL, a major c... 详细信息
来源: 评论
A blockchain-based framework for detecting malicious mobile applications in app stores
arXiv
收藏 引用
arXiv 2019年
作者: Homayoun, Sajad Dehghantanha, Ali Parizi, Reza M. Choo, Kim-Kwang Raymond Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran School of Computer Science University of Guelph Ontario Canada Department of Software Engineering Game Development Kennesaw State University MariettaGA30060 United States Department of Information Systems Cyber Security Department of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX78249 United States
The dramatic growth in smartphone malware shows that malicious program developers are shifting from traditional PC systems to smartphone devices. Therefore, security researchers are also moving towards proposing novel... 详细信息
来源: 评论
Adaptive feedforward neural network control with an optimized hidden node distribution
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Qiong Li, Dongyu Ge, Shuzhi Sam Ouyang, Zhong Tsinghua-Berkeley Shenzhen Institute Tsinghua University Shenzhen Guangdong518055 China The School of Cyber Science and Technology Beihang University Beijing100191 China Department of Electrical and Computer Engineering National University of Singapore Singapore117576 Singapore Department of Mechanical and Aerospace Engineering The Ohio State University ColumbusOH43202 United States
Composite adaptive radial basis function neural network (RBFNN) control with a lattice distribution of hidden nodes has three inherent demerits: 1) the approximation domain of adaptive RBFNNs is difficult to be determ... 详细信息
来源: 评论
An Enhanced Feature Selection Approach based on Mutual Information for Breast Cancer Diagnosis  6
An Enhanced Feature Selection Approach based on Mutual Infor...
收藏 引用
6th International Conference on Image and Signal Processing and their Applications, ISPA 2019
作者: Zemmal, Nawel Azizi, Nabiha Ziani, Amel Benzebouchi, Nacer Eddine Aldwairi, Monther Badji Mokhtar University Labged Laboratory Annaba23000 Algeria Department of Mathematics and Computer Science Mohamed Cherif Messaadia University Souk-Ahras41000 Algeria Lri Laboratory: Information Research Laboratory Computer Science Department Annaba23000 Algeria Jordan University of Science and Technology Department of Network Engineering and Security Irbid22110 Jordan
Breast cancer is the most feared disease in the female population. Early detection plays an important role to improve prognosis. Mammography is the best examination for the detection of breast cancer. However, in some... 详细信息
来源: 评论
COVID-19: The information warfare paradigm shift
arXiv
收藏 引用
arXiv 2020年
作者: Kallberg, Jan Burk, Rosemary A. Thuraisingham, Bhavani Army Cyber Institute at West Point U.S. Military Academy West PointNY United States Department of Social Sciences U.S. Military Academy West PointNY United States U.S. Fish and Wildlife Service Department of the Interior Head Quarters Falls ChurchVA United States Cyber Security Institute Erik Jonsson School of Engineering and Computer Science University of Texas at Dallas RichardsonTX United States
来源: 评论