咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4701-4710 订阅
排序:
Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing
收藏 引用
Journal of Hardware and Systems security 2018年 第4期2卷 333-344页
作者: Nidish Vashistha M. Tanjidur Rahman Haoting Shen Damon L. Woodard Navid Asadizanjani Mark Tehranipoor Florida Institute for Cyber Security (FICS) Research Electrical and Computer Engineering Department University of Florida Gainesville USA
Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different stages of the design and fabrication process. Different approaches have been developed to detect Trojans namely non-destru...
来源: 评论
Improved impossible differential cryptanalysis of large-block Rijndael
收藏 引用
Science China(Information Sciences) 2019年 第3期62卷 5-18页
作者: Ya LIU Yifan SHI Dawu GU Bo DAI Fengyu ZHAO Wei LI Zhiqiang LIU Zhiqiang ZENG Engineering Research Center of Optical Instrument and System Ministry of Education Shanghai Key Lab of Modern Optical System University of Shanghai for Science and Technology State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science and Technology Donghua University Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Science and Technology on Information Assurance Laboratory
Rijndael is a substitution-permutation network(SPN) block cipher for the AES development process. Its block and key sizes range from 128 to 256 bits in steps of 32 bits, which can be denoted by Rijndael-b-k, where b... 详细信息
来源: 评论
Smart Phone as Toolbox for Height Measurement
Smart Phone as Toolbox for Height Measurement
收藏 引用
IEEE National Conference on Aerospace and Electronics (NAECON)
作者: Abdul Razaque Fathi Amsaad Cai Mengjie Cherry Lin Jiahui Linda Ahmed Oun Computer Engineering and Telecommunication International IT University Almaty Kazakhstan School of Information Security Eastern Michigan University USA Computer Science Department New York Institute of Technology (NYIT) Nanjing Campus China Electrical Engineering and Computer Science Department University of Toledo USA
Many researchers focus on using smart phone as toolbox, such as measuring height via barometer on smart phone. However, none of them compared the error rate that exists in different brands of mobile phones (e.g., Sams... 详细信息
来源: 评论
Multilevel Data Encryption Using AES and RSA For Image and Textual information Data
Multilevel Data Encryption Using AES and RSA For Image and T...
收藏 引用
Innovations in Power and Advanced Computing Technologies (i-PACT)
作者: Urvi Patel Pradish Dadhania Computer Eng. (System and Network Security) Department Sardar Vallabhbhai Patel Institute of Technology Vasad Gujarat India Information Technology Engineering Department Sardar Vallabhbhai Patel Institute of Technology Vasad Gujarat India
In our day by day life day's style we moving starting with one spot then onto the next spot with writings, records over the web are the undertakings in like manner identified with puzzle PC key arrangement of PC g...
来源: 评论
Efficient SVM Based Packer Identification with Binary Diffing Measures
Efficient SVM Based Packer Identification with Binary Diffin...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Yeongcheol Kim Joon-Young Paik Seokwoo Choi Eun-Sun Cho Department of Computer Science and Engineering Chungnam National University Daejeon South Korea Department of Computer Science and Technology Tianjin Polytechnic University Tianjin China National Security Research Institute Daejeon South Korea
Packer identification is an essential process followed by further investigation on malware. For efficient packer identification, we introduce an SVM based automatized method, which uses kernel lifting with binary diff... 详细信息
来源: 评论
Exploring the back alleys: Analysing the robustness of alternative neural network architectures against adversarial attacks
arXiv
收藏 引用
arXiv 2019年
作者: Tan, Yi Xiang Marcus Elovici, Yuval Binder, Alexander ST Engineering Electronics-SUTD Cyber Security Laboratory Pillar Singapore University of Technology and Design Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Deutsche Telekom Innovation Laboratories Ben-Gurion University of the Negev
Recent discoveries in the field of adversarial machine learning have shown that Artificial Neural Networks (ANNs) are susceptible to adversarial attacks. These attacks cause misclassification of specially crafted adve... 详细信息
来源: 评论
Deep Active Learning for Anchor User Prediction
arXiv
收藏 引用
arXiv 2019年
作者: Cheng, Anfeng Zhou, Chuan Yang, Hong Wu, Jia Li, Lei Tan, Jianlong Guo, Li Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Centre for Artificial Intelligence School of Software FEIT University of Technology Sydney Australia Department of Computing Macquarie University Sydney Australia School of Computer Science and Information Engineering Hefei University of Technology China
Predicting pairs of anchor users plays an important role in the cross-network analysis. Due to the expensive costs of labeling anchor users for training prediction models, we consider in this paper the problem of mini... 详细信息
来源: 评论
A novel aircraft and missile accurate positioning and tracking system for military and intelligence using global satellite networks
A novel aircraft and missile accurate positioning and tracki...
收藏 引用
AIAA Information Systems-AIAA Infotech at Aerospace, 2018
作者: Chyad, Hayder Jabbar Al-Saedi, Firas Abdullah Thweny Data and Applications Security Branch Ministry of Science and Technology Baghdad Iraq Computer Engineering Department Al-Nahrain University Baghdad Iraq
Our novel real time system is based on gathering aircrafts and missiles information from various Radar stations all over the world to a single or multi operation centers. Also, the data gathered by each Radar station ... 详细信息
来源: 评论
Holistic digital forensic readiness framework for IoT-enabled organizations
收藏 引用
Forensic Science International: Reports 2020年 2卷 100117-100117页
作者: Kebande, Victor R. Mudau, Phathutshedzo P. Ikuesan, Richard A. Venter, H.S. Choo, Kim-Kwang Raymond Internet of Things and People (IoTaP) Research Center Department of Computer Science and Media Technology Malmö Universitet Malmö Sweden DigiForS Research Group Department of Computer Science University of Pretoria South Africa Cyber and Network Security Department Science and Technology Division Community College of Qatar Qatar Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249-0631 USA
AbstractInternet of Things (IoT) are becoming commonplace in homes, buildings, cities, and nations, and IoT networks are also getting more complex and interconnected. The complexity, interconnectivity, and heterogenei... 详细信息
来源: 评论
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image
Real-time reversible data hiding with shifting block histogr...
收藏 引用
Journal of Real-Time Image Processing
作者: Tang, Zhenjun Xu, Shijie Ye, Dengpan Wang, Jinyan Zhang, Xianquan Yu, Chuanqiang Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin541004 China School of Cyber Science and Engineering Wuhan University Wuhan430072 China School of Computer Science and Information Technology Guangxi Normal University No. 15 YuCai Road Guilin541004 China
Reversible data hiding in encrypted image (RDH-EI) is a hot topic of data hiding in recent years. Most RDH-EI algorithms do not reach desirable embedding rate and their computational costs are not suitable for real-ti... 详细信息
来源: 评论