咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4771-4780 订阅
排序:
CBEAT: Chrome Browser Extension Analysis Tool  5th
CBEAT: Chrome Browser Extension Analysis Tool
收藏 引用
5th International Symposium on security in Computing and Communications, SSCC 2017
作者: Roy, Sudakshina Singha Jevitha, K.P. TIFAC CORE in Cyber Security Amrita School of Engineering Coimbatore India Amrita Vishwa Vidyapeetham Amrita University Coimbatore India Department of Computer Science and Engineering Amrita School of Engineering Coimbatore India
With exponential increased usage of browser extensions for smooth and effortless browsing experience, preventing exposure of user’s private and sensitive data for malicious intent becomes a perpetual challenging task... 详细信息
来源: 评论
CollabLoc: Privacy-preserving multi-modal localization via collaborative information fusion
arXiv
收藏 引用
arXiv 2017年
作者: Sadhu, Vidyasagar Pompili, Dario Zonouz, Saman Sritapan, Vincent Department of Electrical and Computer Engineering Cyber Security Division Rutgers University Department of Homeland Security Science & Technology Directorate
Mobile phones provide an excellent opportunity for building context-aware applications. In particular, location-based services are important context-aware services that are more and more used for enforcing security po... 详细信息
来源: 评论
A New Information Diffusion Model in Weibo: UA-SCIR
A New Information Diffusion Model in Weibo: UA-SCIR
收藏 引用
2018 International Conference on computer,Communication and Network technology(CCNT 2018)
作者: Hai-long ZHU Jun YANG Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China Department of Automation Tsinghua University
To illustrate how information spreads in Weibo, this paper proposed a user attributes based diffusion model(UA-SCIR) which defined four node states: susceptible, contacted, infected and refractory. The contacted state... 详细信息
来源: 评论
CollabLoc: Privacy-Preserving Multi-Modal Localization via Collaborative Information Fusion
CollabLoc: Privacy-Preserving Multi-Modal Localization via C...
收藏 引用
International Conference on computer Communication and Networks
作者: Vidyasagar Sadhu Dario Pompili Saman Zonouz Vincent Sritapan Department of Electrical and Computer Engineering Rutgers University Cyber Security Division Department of Homeland Security Science & Technology Directorate
Mobile phones provide an excellent opportunity for building context-aware applications. In particular, location-based services are important context-aware services that are more and more used for enforcing security po... 详细信息
来源: 评论
An enhanced blacklist method to detect phishing websites  13th
An enhanced blacklist method to detect phishing websites
收藏 引用
13th International Conference on Information Systems security, ICISS 2017
作者: Rao, Routhu Srinivasa Pais, Alwyn Roshan Information Security and Research Lab Department of Computer Science and Engineering National Institute of Technology SurathkalKarnataka India
Existing anti-phishing techniques like whitelist or blacklist detect the phishing sites based on the database of approved and unapproved URLs. Most of the current phishing attacks are actually replicas or variations o... 详细信息
来源: 评论
Gated fusion network for single image dehazing
arXiv
收藏 引用
arXiv 2018年
作者: Ren, Wenqi Ma, Lin Zhang, Jiawei Pan, Jinshan Cao, Xiaochun Liu, Wei Yang, Ming-Hsuan IIE Cas Tencent Ai Lab City University of Hong Kong Nanjing University of Science and Technology School of Cyber Security University of Chinese Academy of Sciences University of California Electrical Engineering and Computer Science Merced United States
In this paper, we propose an efficient algorithm to directly restore a clear image from a hazy input. The proposed algorithm hinges on an end-to-end trainable neural network that consists of an encoder and a decoder. ... 详细信息
来源: 评论
ComDefend: An Efficient Image Compression Model to Defend Adversarial Examples
arXiv
收藏 引用
arXiv 2018年
作者: Jia, Xiaojun Wei, Xingxing Cao, Xiaochun Foroosh, Hassan Institute of Information Engineering Chinese Academy of Sciences Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China Department of Computer Science and Technology Tsinghua University Department of Electrical Engineering and Computer Science University of Central Florida
Deep neural networks (DNNs) have been demonstrated to be vulnerable to adversarial examples. Specifically, adding imperceptible perturbations to clean images can fool the well trained deep neural networks. In this pap... 详细信息
来源: 评论
A Fuzzy-PSO System for Indoor Localization based on Visible Light Communications
arXiv
收藏 引用
arXiv 2018年
作者: Pau, Giovanni Collotta, Mario Maniscalco, Vincenzo Choo, Kim-Kwang Raymond Faculty of Engineering and Architecture Kore University of Enna Enna94100 Italy Dept. of Info. Systems and Cyber Security and Department of Electrical and Computer Engineering University of Texas at San Antonio San AntonioTX78249-0631 United States
Indoor positioning systems using Visible Light Communication (VLC) have potential applications in smart buildings, for instance, in developing economical, easy-touse, widely accessible positioning system based on Ligh... 详细信息
来源: 评论
Probabilistic Caching as Mixed Strategies in Spatially-Coupled Edge Caching
Probabilistic Caching as Mixed Strategies in Spatially-Coupl...
收藏 引用
Biennial Symposium on Communications, QBSC
作者: Jie Gao Lian Zhao Limin Sun Department of Electrical and Computer Engineering Ryerson University Toronto Canada Beijing Key Laboratory of IoT Information Security Technology Institute of Information Engineering Chinese Academy of Sciences Beijing China
The problem of probabilistic caching in a network with multiple edge nodes and user nodes is studied. Files with different lengths, caches with different sizes, and spatial coupling through overlapping service areas a... 详细信息
来源: 评论
DPHL:A DIA Pan-human Protein Mass Spectrometry Library for Robust Biomarker Discovery
收藏 引用
Genomics, Proteomics & Bioinformatics 2020年 第2期18卷 104-119页
作者: Tiansheng Zhu Yi Zhu Yue Xuan Huanhuan Gao Xue Cai Sander R.Piersma Thang V.Pham Tim Schelfhorst Richard R.G.D.Haas Irene V.Bijnsdorp Rui Sun Liang Yue Guan Ruan Qiushi Zhang Mo Hu Yue Zhou Winan J.Van Houdt Tessa Y.S.Le Large Jacqueline Cloos Anna Wojtuszkiewicz Danijela Koppers-Lalic Franziska Bottger Chantal Scheepbouwer Ruud H.Brakenhoff Geert J.L.H.van Leenders Jan N.M.Ijzermans John W.M.Martens Renske D.M.Steenbergen Nicole C.Grieken Sathiyamoorthy Selvarajan Sangeeta Mantoo Sze S.Lee Serene J.Y.Yeow Syed M.F.Alkaff Nan Xiang Yaoting Sun Xiao Yi Shaozheng Dai Wei Liu Tian Lu Zhicheng Wu Xiao Liang Man Wang Yingkuan Shao Xi Zheng Kailun Xu Qin Yang Yifan Meng Cong Lu Jiang Zhu Jin'e Zheng Bo Wang Sai Lou Yibei Dai Chao Xu Chenhuan Yu Huazhong Ying Tony K.Lim Jianmin Wu Xiaofei Gao Zhongzhi Luan Xiaodong Teng Peng Wu Shi'ang Huang Zhihua Tao Narayanan G.Iyer Shuigeng Zhou Wenguang Shao Henry Lam Ding Ma Jiafu Ji Oi L.Kon Shu Zheng Ruedi Aebersold Connie R.Jimenez Tiannan Guo Zhejiang Provincial Laboratory of Life Sciences and Biomedicine Westlake UniversityHangzhou 310024China Key Laboratory of Structural Biology of Zhejiang Province School of Life SciencesWestlake UniversityHangzhou 310024China Institute of Basic Medical Sciences Westlake Institute for Advanced StudyHangzhou 310024China School of Computer Science Shanghai Key Laboratory of Intelligent Information ProcessingFudan UniversityShanghai 200433China Thermo Fisher Scientific(BREMEN)GmbH Bremen 28195Germany OncoProteomics Laboratory Department of Medical OncologyVU University Medical CenterVU UniversityAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamUrologyCancer Center AmsterdamAmsterdam 1011The Netherlands Thermo Fisher Scientific Shanghai 201206China The Netherlands Cancer Institute Surgical OncologyAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamSurgeryCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamPediatric Oncology/HematologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamHematologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamMedical OncologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamNeurosurgeryCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamPathologyCancer Center AmsterdamAmsterdam 1011The Netherlands Amsterdam UMC Vrije Universiteit AmsterdamOtolaryngology/Head and Neck SurgeryCancer Center AmsterdamAmsterdam 1011The Netherlands Erasmus MC University Medical Center PathologyRotterdam 1016LVThe Netherlands Erasmus MC University Medical Center SurgeryRotterdam 1016LVThe Netherlands Erasmus MC University Medical Center Medical OncologyRotterdam 1016LVThe Netherlands Department of Anatomical Pathology Singapore General HospitalSingapore 169608Singapore Division of Medical Scie
To address the increasing need for detecting and validating protein biomarkers in clinical specimens,mass spectrometry(MS)-based targeted proteomic techniques,including the selected reaction monitoring(SRM),parallel r... 详细信息
来源: 评论