咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4621-4630 订阅
排序:
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
Detecting Manipulated Smartphone Data on Android and iOS Devices  1
收藏 引用
17th International Conference on Information security, ISSA 2018
作者: Pieterse, Heloise Olivier, Martin van Heerden, Renier Defence Peace Safety and Security Council for Scientific and Industrial Research Pretoria South Africa Department of Computer Science University of Pretoria Pretoria South Africa National Integrated Cyber Infrastructure System Council for Scientific and Industrial Research Pretoria South Africa School of Information and Communication Technology Nelson Mandela University Port Elizabeth South Africa
Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly i... 详细信息
来源: 评论
Mobile Data offloading in the Vehicular Networks: A Truthful Incentive Mechanism
Mobile Data offloading in the Vehicular Networks: A Truthful...
收藏 引用
IEEE International Conference on High Performance Computing and Communications
作者: Enfang Zhong Peng Li Tao Zhang Weiyi Huang Qin Liu College of Computer Science and Technology Wuhan University of Science and Technology China Department of Computer Science New York Institute of Technology USA School of Cyber Science and Engineering Wuhan University USA
Mobile data offloading is a cost-effective and promising approach to alleviate the burden of the cellular network. In this paper, we focus on designing a truthful incentive mechanism that the auction cloud platform mo... 详细信息
来源: 评论
Graph stochastic neural networks for semi-supervised learning  20
Graph stochastic neural networks for semi-supervised learnin...
收藏 引用
Proceedings of the 34th International Conference on Neural Information Processing Systems
作者: Haibo Wang Chuan Zhou Xin Chen Jia Wu Shirui Pan Jilong Wang Department of Computer Science and Technology Tsinghua University Beijing China and Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China and School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Faculty of Science and Engineering Macquarie University Sydney Australia Faculty of Information Technology Monash University Melbourne Australia
Graph Neural Networks (GNNs) have achieved remarkable performance in the task of the semi-supervised node classification. However, most existing models learn a deterministic classification function, which lack suffici...
来源: 评论
RETRACTED ARTICLE: Cloud enabled robust authenticated key agreement scheme for telecare medical information system
收藏 引用
Connection Science 2021年 第4期33卷 I页
作者: Liu, Tian Liu, Xuchong Li, Xiong Amin, Ruhul Liang, Wei Meng-Yen, Hsieh School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan People's Republic of China Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Police Academy Changsha People's Republic of China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu People's Republic of China Department of Computer Science and Engineering Dr. SPM International Institute of Information Technology Naya Raipur India College of Computer Science and Electronic Engineering Hunan University Changsha People's Republic of China Deptment of Computer Science and Information Engineering Providence University Taichung Taiwan
We, the authors, Editors and Publisher of the journal Connection Science, have retracted the following article:Tian Liu, Xuchong Liu, Xiong Li, Ruhul Amin, Wei Liang & Meng-Yen Hsieh (2021) Cloud enabled robust au...
来源: 评论
Achieving Guaranteed Performance for Protection Traffic in Smart Grid Wide-Area Networks
Achieving Guaranteed Performance for Protection Traffic in S...
收藏 引用
IEEE International Conference on Smart Energy Grid engineering (SEGE)
作者: Charles M. Adrah Aditya K. Kamath Steinar Bjørnstad Mohit P. Tahiliani Department of Information Security and Communication Technology NTNU Trondheim Norway Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal Mangalore India
Recent years, tele-protection applications in utility grids have been deployed using Ethernet. However, Ethernet without Time Sensitive Network (TSN) mechanisms is nondeterministic. Hence, challenges of the queuing de... 详细信息
来源: 评论
Multi-level Wavelet-based Generative Adversarial Network for Perceptual Quality Enhancement of Compressed Video
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Jianyi Deng, Xin Xu, Mai Chen, Congyong Song, Yuhang School of Electronic and Information Engineering Beihang University China School of Cyber Science and Technology Beihang University China College of Software Beihang University Beijing China Hangzhou Innovation Institute Beihang University Zhejiang China Department of Computer Science University of Oxford United Kingdom
The past few years have witnessed fast development in video quality enhancement via deep learning. Existing methods mainly focus on enhancing the objective quality of compressed video while ignoring its perceptual qua... 详细信息
来源: 评论
Data sharing and privacy for patient IoT devices using blockchain  7th
Data sharing and privacy for patient IoT devices using block...
收藏 引用
7th International Conference on Smart City and Informatization, iSCI 2019
作者: Srivastava, Gautam Parizi, Reza M. Dehghantanha, Ali Choo, Kim-Kwang Raymond Department of Mathematics and Computer Science Brandon University BrandonMBR7A 6A9 Canada Research Center for Interneural Computing China Medical University Taichung40402 Taiwan College of Computing and Software Engineering Kennesaw State University KennesawGA30144 United States Cyber Science Lab School of Computer Science University of Guelph GuelphONN1G 2W1 Canada Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249 United States
Once a fitness fad, wearable and other related Internet of Things (IoT) devices are fast becoming common place in many different smart city applications such as healthcare. However, IoT devices, particularly inexpensi... 详细信息
来源: 评论
Source camera attribution of Multi-format devices
arXiv
收藏 引用
arXiv 2019年
作者: Taspinar, Samet Mohanty, Manoranjan Memon, Nasir Cyber Security New York University Abu Dhabi United Arab Emirates Department of Computer Science University of Auckland New Zealand Department of Computer Science and Engineering New York University New York United States
Photo Response Non-Uniformity (PRNU) based source camera attribution is an effective method to determine the origin camera of visual media (an image or a video). However, given that modern devices, especially smartpho... 详细信息
来源: 评论
Efficient Online Resource Allocation in Heterogeneous Clusters with Machine Variability
Efficient Online Resource Allocation in Heterogeneous Cluste...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Huanle Xu Yang Liu Wing Cheong Lau Jun Guo Alex Liu College of Computer Science and Network Security Dongguan University of Technology Department of Information Engineering The Chinese University of Hong Kong
Approximation jobs that allow partial execution of their many tasks to achieve valuable results have played an important role in today's large-scale data analytics [1], [2]. This fact can be utilized to maximize t... 详细信息
来源: 评论