咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4721-4730 订阅
排序:
Improved upper bounds on the hermite and KZ constants
arXiv
收藏 引用
arXiv 2019年
作者: Wen, Jinming Chang, Xiao-Wen Weng, Jian College of Information Science and Technology College of Cyber Security Jinan University Guangzhou510632 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 School of Computer Science McGill University MontrealH3A 0E9 Canada
The Korkine-Zolotareff (KZ) reduction is a widely used lattice reduction strategy in communications and cryptography. The Hermite constant, which is a vital constant of lattice, has many applications, such as bounding...
来源: 评论
Characterization of the MSE Region under a Total Power Budget for Asynchronous Two-Way Relay Networks
Characterization of the MSE Region under a Total Power Budge...
收藏 引用
Asilomar Conference on Signals, Systems & computers
作者: Razgar Rahimi Shahram Shahbazpanahi Björn Ottersten Department of Electrical Computer and Software Engineering Univ. of Ontario Institute of Technology Oshawa Canada Interdisciplinary Centre for Security Reliability and Trust (SnT) University of Luxembourg Luxembourg
We consider a single-carrier bi-directional asynchronous relay network, where two single-antenna transceivers exchange information with the help of multiple single-antenna amplify-and-forward relays. This network is a... 详细信息
来源: 评论
BlockCAM: A blockchain-based cross-domain authentication model  3
BlockCAM: A blockchain-based cross-domain authentication mod...
收藏 引用
3rd IEEE International Conference on Data Science in cyberspace, DSC 2018
作者: Wang, Wentong Hu, Ning Liu, Xin School of Cyberspace Security National University of Defense Technology Changsha China Department of Computer Engineering and Applied Math Changsha University Changsha China
In a distributed network environment, companies and institutions have their own sharing resource. To prevent unauthorized users to access these shared resources, cross-domain authentication is necessary. For ensuring ... 详细信息
来源: 评论
Front Cover: International Journal of Intelligent Systems, Volume 37 Issue 11 November 2022
收藏 引用
International Journal of Intelligent Systems 2022年 第11期37卷
作者: Xianjia Meng Yong Yang Ximeng Liu Nan Jiang School of Information Science and Technology Northwest University Xi'an People's Republic of China Fujian Province Key Laboratory of Information Security of Network System and College of Computer and Data Science Fuzhou University Fuzhou People's Republic of China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen People's Republic of China Department of Internet of Things School of Information Engineering East China Jiao Tong University Nanchang People's Republic of China
来源: 评论
A blockchain-based architecture framework for secure sharing of personal health data  20
A blockchain-based architecture framework for secure sharing...
收藏 引用
20th IEEE International Conference on e-Health Networking, Applications and Services, Healthcom 2018
作者: Amofa, Sandro Sifah, Emmanuel Boateng Obour Agyekum, Kwame O.-B. Abla, Smahi Xia, Qi Gee, James C. Gao, Jianbin School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Center for Cyber Security University of Electronic Science and Technology of China Chengdu China Department of Radiology University of Pennsylvania Philadelphia United States School of Resource and Enviroment Center for Digital Health University of Electronic Science and Technology China
Health information exchanges have been popular for some time with their advantages known and widely researched. In spite of their utility in increasing provider efficiency and decreasing administrative costs, one chal... 详细信息
来源: 评论
Adversarial multiscale feature learning for overlapping chromosome segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Mei, Liye Yu, Yalan Weng, Yueyun Guo, Xiaopeng Liu, Yan Wang, Du Liu, Sheng Zhou, Fuling Lei, Cheng The Institute of Technological Sciences Wuhan University Wuhan430072 China The Department of Hematology Zhongnan Hospital of Wuhan University Wuhan430071 China The School of Power and Mechanical Engineering Wuhan University Wuhan430072 China The Wangxuan Institute of Computer Technology Peking University Beijing100080 China The Alipay Tian Qian Security Lab Beijing100020 China
Chromosome karyotype analysis is of great clinical importance in the diagnosis and treatment of diseases, especially for genetic diseases. Since manual analysis is highly time and effort consuming, computer-assisted a... 详细信息
来源: 评论
Intelligent Knowledge Distribution: Constrained-Action POMDPs for Resource-Aware Multi-Agent Communication
arXiv
收藏 引用
arXiv 2019年
作者: Fowler, Michael C. Charles Clancy, T. Williams, Ryan K. Hume Center for National Security and Technology Electrical and Computer Engineering Virginia Tech BlacksburgVA24060 United States Department of Electrical Engineering Virginia Tech BlacksburgVA24060 United States
This paper addresses a fundamental question of multi-Agent knowledge distribution: what information should be sent to whom and when, with the limited resources available to each agent? Communication requirements for m... 详细信息
来源: 评论
Identifying Crashing Fault Residence Based on Cross Project Model
Identifying Crashing Fault Residence Based on Cross Project ...
收藏 引用
International Symposium on Software Reliability engineering (ISSRE)
作者: Zhou Xu Tao Zhang Yifeng Zhang Yutian Tang Jin Liu Xiapu Luo Jacky Keung Xiaohui Cui School of Computer Science Wuhan University China Department of Computing The Hong Kong Polytechnic University China College of Computer Science and Technology Harbin Engineering University China Key Laboratory of Network Assessment Technology Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science City University of Hong Kong China School of Cyber Science and Engineering Wuhan University China
Analyzing the crash reports recorded upon software crashes is a critical activity for software quality assurance. Predicting whether or not the fault causing the crash (crashing fault for short) resides in the stack t... 详细信息
来源: 评论
Maximum Lifetime Optimized Collaboration of Data and Energy Routing in VANET
Maximum Lifetime Optimized Collaboration of Data and Energy ...
收藏 引用
2019虚拟现实与智能系统国际会议
作者: Ming Hu Hanlin Chen Jiejun Hu Hui Yan Ping Yu Platform of Jilin Province Science and Technology (S&T) Department "Jilin Province S&T Innovation Center for Physical Simulation and Security of Water resources and Electric Power Engineering" Changchun Institute of Technology College of Computer Science and Technology Changchun University of Technology School of Computer Sciences and Electrical Engineering University of Essex
The roadside units(RSUs) based on traditional grid has high carbon footprint and high deployment cost in vehicle dedicated *** ideal green alternative has become an important issue in Vehicular Ad-Hoc Networks(VANETs)... 详细信息
来源: 评论
SecureMatch: Scalable authentication and key relegation for iot using physical-layer techniques  6
SecureMatch: Scalable authentication and key relegation for ...
收藏 引用
6th IEEE Conference on Communications and Network security, CNS 2018
作者: Rahbari, Hanif Liu, Jinshan Park, Jung-Min Jerry Department of Computing Security Rochester Institute of Technology RochesterNY United States Bradley Department of Electrical and Computer Engineering Virginia Tech ArlingtonVA United States
Conventional authentication approaches, whether based on (preconfigured) symmetric or asymmetric keys, cannot react timely to large-scale attacks on Internet of Things (IoT) devices because they need to manage (i.e., ... 详细信息
来源: 评论