咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4671-4680 订阅
排序:
Secure Cryptography Infrastructures in the Cloud
Secure Cryptography Infrastructures in the Cloud
收藏 引用
IEEE Global Communications Conference
作者: Dawei Chu Kaijie Zhu Quanwei Cai Jingqiang Lin Fengjun Li Le Guan Lingchen Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences National Digital Switching System Engineering & Technological R&D Center CHINA Data Assurance and Communication Security Research Center Chinese Academy of Sciences Department of Electrical Engineering and Computer Science The University of Kansas USA Department of Computer Science University of Georgia USA
Information systems are deployed in clouds as virtual machines (VMs) for better agility, elasticity and reliability. It is necessary to safekeep their cryptographic keys, e.g., the private keys used in TLS and SSH, ag... 详细信息
来源: 评论
TEAGS: Time-aware text embedding approach to generate subgraphs
arXiv
收藏 引用
arXiv 2019年
作者: Hosseini, Saeid Najafipour, Saeed Cheung, Ngai-Man Yin, Hongzhi Kangavari, Mohammad Reza Zhou, Xiaofang ST Electronics - SUTD Cyber Security Lab. Singapore University of Technology and Design Singapore School of Information Technology and Electrical Engineering University of Queensland Brisbane Australia Computational Cognitive Model Research Lab. School of Computer Engineering Iran University of Science and Technology Iran
Given a graph over which the contagions (e.g. virus, gossip) propagate, leveraging subgraphs with highly correlated nodes is beneficial to many applications. Yet, challenges abound. First, the propagation pattern betw... 详细信息
来源: 评论
Intelligence security Check System Using Face Recognition Algorithm: A Review
Intelligence Security Check System Using Face Recognition Al...
收藏 引用
International Conference on Electronics, computer and Computation (ICECCO)
作者: Lateefah Abdul-azeez Abiodun Musa Aibinu Sodiq Olanrewaju Akanmu Taliha Abiodun Folorunso Momoh-Jimoh E. Salami Department of Cyber Security Science Federal University of Technology Minna Niger state Nigeria Department of Mechatronics Engineering Federal University of Technology Minna Niger state Nigeria Elizade University Ilara-Mokin Ondo State Nigeria
One of the famous biometric in use is the facial recognition, which uses statistical measurement of an individual face features to discover or determine his/her identity. Human are prone to errors or mistakes, therefo... 详细信息
来源: 评论
An algorithm for computing the factor ring of an ideal in a Dedekind domain with finite rank
收藏 引用
Science China Mathematics 2018年 第5期61卷 783-796页
作者: Dandan Huang Yingpu Deng Department of Cyber Space Security School of Software EngineeringJinling Institute of Technology Key Laboratory of Mathematics Mechanization National Center for Mathematics and Interdisciplinary SciencesAcademy of Mathematics and Systems Science Chinese Academy of Sciences School of Mathematical Sciences University of Chinese Academy of Sciences
We give an algorithm for computing the factor ring of a given ideal in a Dedekind domain with finite rank, which runs in deterministic and polynomial time. We provide two applications of the algorithm:judging whether ... 详细信息
来源: 评论
Corrigendum to “Fabrication of efficient and economical dye-sensitized solar cells using carbon-coated nanotextured silicon wafers counter electrodes” [Synth. Met. 301 (2024) 117537]
收藏 引用
Synthetic Metals 2024年 302卷
作者: Ahmed F. Abdelaal Muhammad Younas Ryan N. Iman Asrar Damdam Amal M. Al-Amri Turki N. Baroud Department of Mechanical Engineering King Fahd University of Petroleum & Minerals Dhahran 31261 Saudi Arabia Core Research Facilities King Fahd University of Petroleum & Minerals 31261 Dhahran Saudi Arabia Department of Physics King Fahd University of Petroleum and Minerals Dhahran 31261 Saudi Arabia Computer Electrical and Mathematical Science and Engineering Division King Abdullah University of Science and Technology (KAUST) Thuwal 23955-6900 Saudi Arabia Department of Physics College of Science and Arts King Abdulaziz University Rabigh 21911 Saudi Arabia Materials Science and Engineering Department King Fahd University of Petroleum and Minerals Dhahran 31261 Saudi Arabia Interdisciplinary Research Center for Membranes and Water Security KFUPM Dhahran 31261 Saudi Arabia
来源: 评论
A Vigorous Chaotic Function Based Image Authentication Structure
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1854卷
作者: Amit Kumar Singh Vaibhav C. Gandhi M. Madhusudhana Subramanyam Sarvesh Kumar Sandeep Aggarwal Shivam Tiwari Department of Information Technology Amity institute of Information Technology Amity University Rajasthan Jaipur India Department of Computer Science & Engineering Department Navrachana University Vadodara Gujarat Department of Computer Science College of Arts & Science King Khalid University Dhahran Al janoub Kingdom of Saudi Arabia Department of Cloud Technology & Information Security Integral University Lucknow Uttar Pradesh Department of Computer Science and Applications DAV College Abohar
In this work framework request picture square size and tumultuous capacity control as a piece of information. Here this builds the adaptability and mix of a secret phrase. As the quality of a secret key relies upon nu...
来源: 评论
Solution Path Algorithm for Twin Multi-class Support Vector Machine
arXiv
收藏 引用
arXiv 2020年
作者: Chen, Liuyuan Zhou, Kanglei Jing, Junchang Fan, Haiju Li, Juntao Journal Editorial Department Henan Normal University Xinxiang453007 China School of Computer Science and Engineering Beihang University Beijing100191 China Henan International Joint Laboratory of Cyberspace Security Applications Information Engineering College Henan University of Science and Technology Luoyang471023 China College of Computer and Information Engineering Henan Normal University Xinxiang453007 China College of Mathematics and Information Science Henan Normal University Xinxiang453007 China
The twin support vector machine and its extensions have made great achievements in dealing with binary classification problems. However, it suffers from difficulties in effective solution of multi-classification and f... 详细信息
来源: 评论
Heterogeneity of human brain tumor with lesion identification, localization, and analysis from MRI
收藏 引用
Informatics in Medicine Unlocked 2018年 13卷 139-150页
作者: Roy, Sudipta Bhattacharyya, Debnath Bandyopadhyay, Samir Kumar Kim, Tai-Hoon Department of Computer Science & Engineering Institute of Computer Technology Ganpat University Kherva Mehsana 384012 Gujarat India Department of Computer Science & Engineering Vignan's Institute of Information Technology Visakhapatnam 530049 India Department of Computer Science & Engineering Calcutta University Technology Campus Kolkata 700098 India Department of Convergence Security Sungshin Women's University Seoul 136-742 South Korea
Objective: Accurate identification of brain tumor and its heterogeneity is a critical task in planning for proper therapy. A reliable fully automatic detection and analysis method for the brain tumor is necessary for ... 详细信息
来源: 评论
Problems and Prospects of Internet of Things to the Automobile Industry in Nigeria
Problems and Prospects of Internet of Things to the Automobi...
收藏 引用
International Conference of the IEEE Nigeria computer Chapter (NigeriaComputConf)
作者: Aliyu Mustapha Abdullahi Kutiriko Abubakar Haruna Dokoro Ahmed Isah Abubakar Ndakara Abubakar Mohammed Idris Abdullahi Raji Egigogo Mohammed Abdulkadir Department of Industrial and Technology Education Federal University of Technology Minna Nigeria Department of Informatics Kings College London Department of Computer Science Gombe State Polytechnic Bajoga Nigeria Electrical and Electronics Department Federal University of Technology Minna Nigeria Department of Cyber Security Science Federal University of Technology Minna Nigeria
This study was carried out to identify the problems and prospects of the Internet of Things to the automobile industry in Nigeria. Two research questions were answered. The descriptive survey design was employed and t... 详细信息
来源: 评论
A Hole Repairing Method Based on Edge-Preserving Projection  12th
A Hole Repairing Method Based on Edge-Preserving Projection
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Wang, Yinghui Zhao, Yanni Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
A point cloud hole repairing method based on edge-preserving projection is proposed in order to maintain sharp features of holes. First, the hole boundary points are acquired by quadrants and angles, then connections ... 详细信息
来源: 评论