咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4611-4620 订阅
排序:
Smart City cybersecurity Projects Financing Model in Case of Description of Investors’ Resources With Fuzzy Sets
Smart City Cybersecurity Projects Financing Model in Case of...
收藏 引用
IEEE International Conference on Advanced Trends in Information Theory (ATIT)
作者: Valeriy Lakhno Yurii Matus Volodymyr Malyukov Alyona Desyatko Tetyana Hnatchenko Department of Computer systems and networks National University of Life and Environmental Sciences of Ukraine Kyiv Ukraine Department of Software Engineering and Cyber Security National University of Trade and Economics Kyiv Ukraine
The paper describes the model of choosing mutual investment strategies for Smart City cybersecurity projects with incomplete information on the financial resources of the second investor. The case when the financial r... 详细信息
来源: 评论
Toward Privacy-Preserving Personalized Recommendation Services
收藏 引用
engineering 2018年 第1期4卷 21-28页
作者: CongWang Yifeng Zheng Jinghua Jiang Kui Ren Department of Computer Science City University of Hong Kong Hong Kong China City University of Hong Kong Shenzhen Research Institute Shenzhen Guangdong 518057 China Department of Computer Science and Technology Xi'an fiaotong University Xi'an 710049 China Institute of Cyber Security Research Zhejiang University Hangzhou Zhejiang 310058 China
Recommendation systems are crucially important for the delivery of personalized services to users. With personalized recommendation services, users can enjoy a variety of targeted recommendations such as movies, hooks... 详细信息
来源: 评论
NTIRE 2021 challenge on video super-resolution
arXiv
收藏 引用
arXiv 2021年
作者: Son, Sanghyun Lee, Suyoung Nah, Seungjun Timofte, Radu Lee, Kyoung Mu Chan, Kelvin C.K. Zhou, Shangchen Xu, Xiangyu Loy, Chen Change Jiang, Boyuan Lin, Chuming Dong, Yuchun Luo, Donghao Chu, Wenqing Ji, Xiaozhong Yang, Siqian Tai, Ying Wang, Chengjie Li, Jilin Huang, Feiyue Chen, Chengpeng Chu, Xiaojie Zhang, Jie Lu, Xin Chen, Liangyu Lin, Jing Du, Guodong Hao, Jia Zou, Xueyi Zhang, Qi Jiang, Lielin Li, Xin Zheng, He Liu, Fanglong He, Dongliang Li, Fu Dang, Qingqing Yi, Peng Wang, Zhongyuan Jiang, Kui Jiang, Junjun Ma, Jiayi Chen, Yuxiang Wang, Yutong Liu, Ting Sun, Qichao Liang, Huanwei Li, Yiming Li, Zekun Ruan, Zhubo Shang, Fanjie Guo, Chen Li, Haining Luo, Renjun Shen, Longjie Zafirouli, Kassiani Karageorgos, Konstantinos Konstantoudakis, Konstantinos Dimou, Anastasios Daras, Petros Song, Xiaowei Zhuo, Xu Liu, Hanxi Guo, Mengxi Li, Junlin Li, Yu Zhu, Ye Wang, Qing Zhao, Shijie Sun, Xiaopeng Zhan, Gen Xie, Tangxin Jia, Yu Lu, Yunhua Zhang, Wenhao Sun, Mengdi Michelini, Pablo Navarrete Zhang, Xueheng Jiang, Hao Chen, Zhiyu Chen, Li Xiong, Zhiwei Xiao, Zeyu Xu, Ruikang Cheng, Zhen Fu, Xueyang Song, Fenglong Luo, Zhipeng Yao, Yuehan Dutta, Saikat Shah, Nisarg A. Das, Sourya Dipta Zhao, Peng Shi, Yukai Liu, Hongying Shang, Fanhua Liu, Yuanyuan Chen, Fei Yu, Fangxu Gao, Ruisheng Bai, Yixin Heo, Jeonghwan Yue, Shijie Li, Chenghua Li, Jinjing Zheng, Qian Gang, Ruipeng Song, Ruixia Wee, Seungwoo Jeong, Jechang Li, Chen Wen, Geyingjie Chai, Xinning Song, Li Department of ECE ASRI SNU Korea Republic of Computer Vision Lab ETH Zurich Switzerland S-Lab Nanyang Technological University Singapore YouTu Lab Tencent East China Normal University China Megvii Peking University China Fudan University China Noah's Ark Lab Huawei Canada Technologies Co. Ltd Baidu Inc National Engineering Research Center for Multimedia Software Wuhan University China School of Computer Science and Technology Harbin Institute of Technology China Electronic Information School Wuhan University China School of Computer Science and Engineering University of Electronic Science and Technology of China China MTlab Meitu Inc Xidian university China ITI CERTH Greece Southeast University China Tencent PCG South China University of Technology China ByteDance Sun Yat-Sen University China Electronic Technology Cyber Security Co. Ltd. AIoT R&D Centre BOE Technology Group Co. Ltd. Shanghai Jiao Tong University China University of Science and Technology of China China Huawei Noah's Ark Lab DeepBlue Technology Shanghai Co. Ltd Indian Institute of Technology Madras India Indian Institute of Technology Jodhpur India Jadavpur University India Xidian University China Hanyang University Korea Republic of NCUT China CASIA China CUC China NRTA China
Super-Resolution (SR) is a fundamental computer vision task that aims to obtain a high-resolution clean image from the given low-resolution counterpart. This paper reviews the NTIRE 2021 Challenge on Video Super-Resol... 详细信息
来源: 评论
On the Design of Blockchain-Based Access Control Protocol for IoT-Enabled Healthcare Applications
On the Design of Blockchain-Based Access Control Protocol fo...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Sourav Saha Anil Kumar Sutrala Ashok Kumar Das Neeraj Kumar Joel J. P. C. Rodrigues Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India CA Technologies – A Broadcom Company Hyderabad India Department of Computer Science and Engineering Thapar University Patiala India Federal University of Piauí Teresina - PI Brazil
Access control is one of the important security services that is essential for an Internet of Things (IoT)-enabled authorized user using his/her smart mobile device to authenticate with the trusted Hospital Authority ... 详细信息
来源: 评论
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices
Towards Fine-grained Fingerprinting of Firmware in Online Em...
收藏 引用
2018 IEEE Conference on computer Communications, INFOCOM 2018
作者: Li, Qiang Feng, Xuan Wang, Raining Li, Zhi Sun, Limin School of Computer and Information Technology Beijing Jiaotong University China Beijing Key Laboratory of IOT Information Security Technology Institute of Information Enzineering CAS China Department of Electrical and Computer Engineering University of Delaware United States School of Cyber Security University of Chinese Academy of Sciences China
An increasing number of embedded devices are connecting to the Internet at a surprising rate. Those devices usually run firmware and are exposed to the public by device search engines. Firmware in embedded devices com... 详细信息
来源: 评论
Enhancing Collaborative Inference on Heterogeneous Edge Devices via Adaptive Ensemble Knowledge Distillation
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Wu, Shangrui Li, Yupeng Wang, Wenhua Guo, Jianxiong Fan, Wentao Liu, Qin Jia, Weijia Yu, Shui Cao, Jiannong Wang, Tian Beijing Normal-Hong Kong Baptist University Guangdong Provincial/Zhuhai Key Laboratory of IRADS Department of Computer Science Zhuhai China Hong Kong Baptist University Hong Kong Hong Kong Hong Kong Baptist University Department of Interactive Media Hong Kong Hong Kong Beijing Normal University Institute of Artificial Intelligence and Future Networks Zhuhai China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi'an China Hunan University College of Computer Science and Electronic Engineering Changsha China University of Technology Sydney School of Computer Science Sydney Australia The Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
The integration of edge computing with deep neural networks (DNNs) is crucial for intelligent industrial cyber-physical systems. Typically, deploying DNNs on heterogeneous edge devices relies on methods like model com... 详细信息
来源: 评论
A power flow tracing based load curtailment technique
A power flow tracing based load curtailment technique
收藏 引用
2019 IEEE PES Innovative Smart Grid Technologies Asia, ISGT 2019
作者: Wu, Tao Hu, Bo Xie, Kaigui Tai, Heng-Ming Wang, Shuocheng Li, Bo State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing China Department of Electrical and Computer Engineering University of Tulsa Tulsa United States State Grid Chongqing Economic Research Institute Chongqing China
A reasonable and efficient load curtailment method enables to restore the system quickly as well as reduce the economic losses both for the power providers and customers when the electrical power system is under conti... 详细信息
来源: 评论
An Acute Kidney Injury Prediction Model Based on Ensemble Learning Algorithm
An Acute Kidney Injury Prediction Model Based on Ensemble Le...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Yuan Wang Yake Wei Qin Wu Hao Yang Jingwei Li College of Computer Science and Information Engineering Tianjin University of Science and Technology Population and Precision Health Care (Tianjin) Ltd Center for Cyber Security University of Electronic Science and Technology of China Department of critical care medicine Sichuan University State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences
Acute Kidney Injury (AKI), a common disease in Intensive Care Unit (ICU) patients, is related to high cost, morbidity and mortality. The early prediction of AKI is critical for improving patients' outcome. However... 详细信息
来源: 评论
Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks
arXiv
收藏 引用
arXiv 2019年
作者: Yazdinejad, Abbas Parizi, Reza M. Dehghantanha, Ali Choo, Kim-Kwang Raymond Faculty of Computer Engineering University of Isfahan Iran Department of Software Engineering and Game Development Kennesaw State University GA30060 United States Cyber Science Lab School of Computer Science University of Guelph ON Canada Department of Information Systems and Cyber Security University of Texas at San Antonio TX United States
5G mobile networks provide additional benefits in terms of lower latency, higher data rates, and more coverage, in comparison to 4G networks, and they are also coming close to standardization. For example, 5G has a ne... 详细信息
来源: 评论
SoulMate: Short-text author linking through Multi-aspect temporal-textual embedding
arXiv
收藏 引用
arXiv 2019年
作者: Najafipour, Saeed Hosseini, Saeid Hua, Wen Kangavari, Mohammad Reza Zhou, Xiaofang Computational Cognitive Model Research Lab School of Computer Engineering Iran University of Science and Technology Iran Cyber Security Lab. Singapore University of Technology and Design Singapore School of Information Technology and Electrical Engineering University of Queensland Brisbane Australia
Linking authors of short-text contents has important usages in many applications, including Named Entity Recognition (NER) and human community detection. However, certain challenges lie ahead. Firstly, the input short... 详细信息
来源: 评论