咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4681-4690 订阅
排序:
A Hole Repairing Method Based on Slicing  12th
A Hole Repairing Method Based on Slicing
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Zhao, Yanni Wang, Yinghui Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
The repairing of 3D point cloud holes has an important meaning to ensure the integrity of cloud data. We present a slice-based repairing method for 3D point cloud in this paper. Firstly, the model is horizontal sliced... 详细信息
来源: 评论
AccUDNN: A GPU Memory Efficient Accelerator for Training Ultra-Deep Neural Networks
AccUDNN: A GPU Memory Efficient Accelerator for Training Ult...
收藏 引用
IEEE International Conference on computer Design: VLSI in computers and Processors, (ICCD)
作者: Jinrong Guo Wantao Liu Wang Wang Chunrong Yao Jizhong Han Ruixuan Li Yijun Lu Songlin Hu Chinese Academy of Sciences Institute of Information Engineering School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Engineering Nanjing University of Science and Technology Alibaba Cloud Computing Co. Ltd. Beijing China
With the implementation of mainstream DL frameworks, scarce GPU memory resource is the primary bottleneck that hinders the trainability and training efficiency of ultra-deep neural networks (UDNN). Prior memory optimi...
来源: 评论
An energy efficient authentication scheme using chebyshev chaotic map for smart grid environment
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Liping Zhu, Yue Ren, Wei Wang, Yinghan Xiong, Neal N. Zhang, Yan School of Computer Science China University of Geosciences Wuhan430074 China School of Computer Science China University of Geosciences Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China Key Laboratory of Network Assessment Technology CAS [Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Mathematics and Computer Science Northeastern State University OK74464 United States Department of Informatics University of Oslo Norway
Smart grid (SG) is an automatic electric power transmission network with bidirectional flows of both energy and information. As one of the important applications of smart grid, charging between electric vehicles has a... 详细信息
来源: 评论
Multi-Parameter Performance Modeling Based on Machine Learning with Basic Block Features
Multi-Parameter Performance Modeling Based on Machine Learni...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Meng Hao Weizhe Zhang Yiming Wang Dong Li Wen Xia Hao Wang Chen Lou School of Computer Science and Technology Harbin Institute of Technology China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China Department of Electrical Engineering and Computer Science University of California Merced Department of Computer Science Norwegian University of Science and Technology Norway
Considering the increasing complexity and scale of HPC architecture and software, the performance modeling of parallel applications on large-scale HPC platforms has become increasingly important. It plays an important... 详细信息
来源: 评论
Ensuring data confidentiality via plausibly deniable encryption and secure deletion-a survey
收藏 引用
cybersecurity 2018年 第1期1卷 106-125页
作者: Qionglu Zhang Shijie Jia Bing Chang Bo Chen Data Assurance and Communication Security Research Center Chinese Academy of SciencesBeijingChina State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina School of Information Systems Singapore Management UniversitySingaporeSingapore Department of Computer Science Michigan Technological UniversityHoughtonUSA
Ensuring confidentiality of sensitive data is of paramount importance,since data leakage may not only endanger data owners’privacy,but also ruin reputation of businesses as well as violate various regulations like HI... 详细信息
来源: 评论
Covid-19 public opinion and emotion monitoring system based on time series thermal new word mining
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Yixian Chen, Jieren Liu, Boyi Yang, Yifan Li, Haocheng Zheng, Xinyi Chen, Xi Ren, Tenglong Xiong, Naixue School of Information and Communication Engineering Hainan University Haikou570100 China School of Computer Science and Cyberspace Security Hainan University Haikou570100 China University of Chinese Academy of Sciences Shenzhen518000 China National University of Defense Technology Changsha410000 China Department of Mathematics and Computer Science Northeastern State University TahlequahOK United States
With the spread and development of new epidemics, it is of great reference value to identify the changing trends of epidemics in public emotions. We designed and implemented the COVID-19 public opinion monitoring syst... 详细信息
来源: 评论
RRNet: Relational reasoning network with parallel multi-scale attention for salient object detection in optical remote sensing images
arXiv
收藏 引用
arXiv 2021年
作者: Cong, Runmin Zhang, Yumo Fang, Leyuan Li, Jun Zhang, Chunjie Zhao, Yao Kwong, Sam Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Department of Computer Science City University of Hong Kong Hong Kong College of Electrical and Information Engineering Hunan University Changsha410082 China Peng Cheng Laboratory Shenzhen518000 China Guangdong Provincial Key Laboratory of Urbanization and Geosimulation School of Geography and Planning Sun Yat-sen University Guangzhou510275 China Key Laboratory of Information Perception and Systems for Public Security of MIIT Nanjing University of Science and Technology Nanjing210094 China Department of Computer Science City University of Hong Kong Hong Kong City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China
Salient object detection (SOD) for optical remote sensing images (RSIs) aims at locating and extracting visually distinctive objects/regions from the optical RSIs. Despite some saliency models were proposed to solve t... 详细信息
来源: 评论
Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks
arXiv
收藏 引用
arXiv 2020年
作者: Chen, You Li, Guyue Sun, Chen Zhang, Junqing Jorswieck, Eduard Xiao, Bin School of Cyber Science and Engineering Southeast University Nanjing210096 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China Department of Electrical Engineering and Electronics University of Liverpool LiverpoolL69 3GJ United Kingdom Institute for Communications Technology Technische Universität Braunschweig Germany Department of Computing Hong Kong Polytechnic University Hong Kong
Physical-layer key generation (PKG) in multi-user massive MIMO networks faces great challenges due to the large length of pilots and the high dimension of channel matrix. To tackle these problems, we propose a novel m... 详细信息
来源: 评论
Distortion-free watermarking scheme for compressed data in columnar database  15
Distortion-free watermarking scheme for compressed data in c...
收藏 引用
15th International Joint Conference on e-Business and Telecommunications, ICETE 2018
作者: Yaqub, Waheeb Kamel, Ibrahim Aung, Zeyar Center for Cyber Security New York University Abu Dhabi United Arab Emirates Department of Electrical and Computer Engineering University of Sharjah Sharjah United Arab Emirates Department of Computer Science Khalifa University of Science and Technology Masdar Institute Abu Dhabi United Arab Emirates
Digital watermarking is an effective technique for protecting various databases against data copyright infringement, piracy, and data tampering in the columnar database. Increasing deployments of various database syst... 详细信息
来源: 评论
Cryptanalysis of an elgamal-like cryptosystem based on matrices over group rings  1
收藏 引用
12th Chinese Conference on Trusted Computing and Information security, CTCIS 2018
作者: Jia, Jianwei Wang, Houzhen Zhang, Huanguo Wang, Shijia Liu, Jinhui Huawei Technologies Co. Ltd. Xi’an710075 China School of Cyber Science and Engineering WuhanHubei430072 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education WuhanHubei430072 China Department of Statistics and Actuarial Science Simon Fraser University Burnaby Canada School of Computer Science Shaanxi Normal University Xi’an710062 China
ElGamal cryptography is one of the most important Public Key Cryptography (PKC) since Diffie-Hellman exchanges was proposed, however these PKCs which are based on the hard problems that discrete logarithm problem and ... 详细信息
来源: 评论