咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4601-4610 订阅
排序:
A New Local-Model-Based Distributed Fault Diagnosis Scheme for Multi-Agent Systems with Actuator Faults
收藏 引用
IFAC-PapersOnLine 2018年 第24期51卷 292-299页
作者: Qin, Liguo He, Xiao Zhou, Donghua Cui, Jian Li, Fei Wang, Guo Department of Automation Tsinghua University Beijing100084 China Tsinghua University Beijing100084 China College of Electrical Engineering and Automation Shandong University of Science and Technology Qingdao266590 China School of Cyber Security and Computer Hebei University Baoding071002 China School of Electronics Engineering and Computer Science Peking University Beijing100871 China
In the paper, a new local-model-based distributed fault diagnosis (LMDFD) scheme is proposed for multi-agent systems subject to actuator faults. The proposed LMDFD scheme consists of a distributed fault detection (DFD... 详细信息
来源: 评论
Selective fuzzy ensemble learner for cognitive detection of bio-identifiable modality spoofing in MCPS  20
Selective fuzzy ensemble learner for cognitive detection of ...
收藏 引用
20th IEEE International Conference on Advanced Communication technology, ICACT 2018
作者: Mowla, Nishat Doh, Inshil Chae, Kijoon Department of Computer Science and Engineering Ewha Womans University Seoul Korea Republic of Department of Cyber Security Ewha Womans University Seoul Korea Republic of
Biometric features are widely used for user authentication and equally important to national and global technology systems. Various forms of biometric features, such as face, iris, fingerprint, are commonly used while... 详细信息
来源: 评论
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
收藏 引用
Science China(Information Sciences) 2018年 第5期61卷 291-305页
作者: Huige WANG Kefei CHEN Baodong QIN Ziyuan HU Department of Network Engineering Anhui Science and Technology University Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Mathematics Hangzhou Normal University Westone Cryptologic Research Center National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications State Key Laboratory of Cryptology
Original public-key encryption is viewed as a tool to encrypt point-to-point *** data is aimed at a particular user,where a sender encrypts a message x under a specified public key P *** this case,only the owner of th... 详细信息
来源: 评论
A customized educational booster for online students in cybersecurity education  11
A customized educational booster for online students in cybe...
收藏 引用
11th International Conference on computer Supported Education, CSEDU 2019
作者: Rahouti, Mohamed Xiong, Kaiqi Department of Electrical Engineering University of South Florida TampaFL33620 United States Cyber Florida University of South Florida TampaFL33620 United States Department of Mathematics and Statistics University of South Florida TampaFL33620 United States Intelligent Computer Networking and Security Lab University of South Florida TampaFL33620 United States
Real-world lab experiments have been an integral part of computer science and engineering curriculums. However, human and computing resources as well as financial support to courses may be limited at many universities... 详细信息
来源: 评论
Monitoring-based differential privacy mechanism against query-flooding parameter duplication attack
arXiv
收藏 引用
arXiv 2020年
作者: Yan, Haonan Li, Xiaoguang Li, Hui Li, Jiamin Sun, Wenhai Li, Fenghua State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Xi’an China department of computer and information technology Purdue University West Lafayette United States State Key Laboratory of Integrated Services Networks Institute of Information Engineering Chinese Academic of Sciences Beijing China
Public intelligent services enabled by machine learning algorithms are vulnerable to model extraction attacks that can steal confidential information of the learning models through public queries. Though there are som... 详细信息
来源: 评论
Pinching-Antenna Systems (PASS)-enabled Secure Wireless Communications
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Guangyu Mu, Xidong Guo, Li Xu, Shibiao Liu, Yuanwei Al-Dhahir, Naofal Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China National Engineering Research Center for Mobile Internet Security Technology Beijing University of Posts and Telecommunications Beijing100876 China Queen’s University Belfast BelfastBT3 9DT United Kingdom Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Department of Electrical and Computer Engineering The University of Texas at Dallas RichardsonTX75080 United States
A novel pinching-antenna systems (PASS)-enabled secure wireless communication framework is proposed. By dynamically adjusting the positions of dielectric particles, namely pinching antennas (PAs), along the waveguides... 详细信息
来源: 评论
Targeted Poisoning Attacks on Social Recommender Systems
Targeted Poisoning Attacks on Social Recommender Systems
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Rui Hu Yuanxiong Guo Miao Pan Yanmin Gong Department of Electrical and Computer Engineering University of Texas at San Antonio San Antonio TX Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX Department of Electrical and Computer Engineering University of Houston Houston TX
With the popularity of online social networks, social recommendations that rely on ones social connections to make personalized recommendations have become possible. This introduces vulnerabilities for an adversarial ... 详细信息
来源: 评论
Lightweight security solutions for IoT implementations in space
Lightweight security solutions for IoT implementations in sp...
收藏 引用
Topical Workshop on Internet of Space (TWIOS)
作者: Nikolaos Athanasios Anagnostopoulos Yufan Fan Tolga Arul Ravi Sarangdhar Stefan Katzenbeisser Security Engineering Group Computer Science Department TU Darmstadt Germany Department of Electrical Engineering and Information Technology TU Darmstadt Germany Computer Science Department TU Darmstadt Germany
In recent years, Commercial Off-The-Shelf (COTS) devices have been gaining a foothold in space applications, due to their relatively low cost. Such devices can be used to implement a segment of the Internet of Things ... 详细信息
来源: 评论
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT
arXiv
收藏 引用
arXiv 2020年
作者: Fu, Anmin Zhang, Xianglong Xiong, Naixue Gao, Yansong Wang, Huaqun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Northeastern State University Department of Mathematics and Computer Science TahlequahOK United States Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Due to the strong analytical ability of big data, deep learning has been widely applied to model the collected data in industrial IoT. However, for privacy issues, traditional data-gathering centralized learning is no... 详细信息
来源: 评论
Quasi-linear theory of forced magnetic reconnection for the transition from linear to Rutherford regime
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Wenlong Zhu, Ping School of Computer Science and Technology Anhui Engineering Laboratory for Industrial Internet Intelligent Applications Security Anhui University of Technology Anhui Ma’anshan243002 China International Joint Research Laboratory of Magnetic Confinement Fusion Plasma Physics State Key Laboratory of Advanced Electromagnetic Engineering Technology School of Electrical and Electronic Engineering Huazhong University ofScience and Technology Hubei Wuhan430074 China Department of Engineering Physics University of Wisconsin-Madison MadisonWI53706 United States
Using the in-viscid two-field reduced MHD model, a new analytical theory is developed to unify the Hahm-Kulsrud-Taylor (HKT) linear solution and the Rutherford quasi-linear regime. Adopting a quasi-linear approach, we... 详细信息
来源: 评论