咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4781-4790 订阅
排序:
Spatial group-wise enhance: Improving semantic feature learning in convolutional networks
arXiv
收藏 引用
arXiv 2019年
作者: Li, Xiang Hu, Xiaolin Yang, Jian Pca Lab Key Lab of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Momenta Department of Computer Science and Technology Tsinghua University
The Convolutional Neural Networks (CNNs) generate the feature representation of complex objects by collecting hierarchical and different parts of semantic subfeatures. These sub-features can usually be distributed in ... 详细信息
来源: 评论
A unified syntax-aware framework for semantic role labeling
A unified syntax-aware framework for semantic role labeling
收藏 引用
2018 Conference on Empirical Methods in Natural Language Processing, EMNLP 2018
作者: Li, Zuchao He, Shexia Cai, Jiaxun Zhang, Zhuosheng Zhao, Hai Liu, Gongshen Li, Linlin Si, Luo Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University Shanghai China School of Cyber Security Shanghai Jiao Tong University China Alibaba Group Hangzhou China
Semantic role labeling (SRL) aims to recognize the predicate-argument structure of a sentence. Syntactic information has been paid a great attention over the role of enhancing SRL. However, the latest advance shows th... 详细信息
来源: 评论
Simpler CCA secure PKE from LPN problem without double-trapdoor  20th
Simpler CCA secure PKE from LPN problem without double-trapd...
收藏 引用
20th International Conference on Information and Communications security, ICICS 2018
作者: Cheng, Haitao Li, Xiangxue Qian, Haifeng Yan, Di Department of Computer Science and Technology East China Normal University Shanghai China National Engineering Laboratory for Wireless Security Xi’an University of Posts and Telecommunications Xi’an China Westone Cryptologic Research Center Beijing China Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China
The first CCA secure public key encryption (PKE) on the learning parity with noise (LPN) assumption was invented by Döttling et al. (ASIACRYPT 2012). At PKC 2014, Kiltz et al. gave a simpler and more efficient co... 详细信息
来源: 评论
Towards Fine-grained Fingerprinting of Firmware in Online Embedded Devices
Towards Fine-grained Fingerprinting of Firmware in Online Em...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Qiang Li Xuan Feng Raining Wang Zhi Li Limin Sun School of Computer and Information Technology Beijing Jiaotong University China School of Cyber Security University of Chinese Academy of Sciences China Department of Electrical and Computer Engineering University of Delaware USA
An increasing number of embedded devices are connecting to the Internet at a surprising rate. Those devices usually run firmware and are exposed to the public by device search engines. Firmware in embedded devices com... 详细信息
来源: 评论
CCA secure multi-recipient KEM from LPN  20th
CCA secure multi-recipient KEM from LPN
收藏 引用
20th International Conference on Information and Communications security, ICICS 2018
作者: Cheng, Haitao Li, Xiangxue Qian, Haifeng Yan, Di Department of Computer Science and Technology East China Normal University Shanghai China National Engineering Laboratory for Wireless Security Xi’an University of Posts and Telecommunications Xi’an China Westone Cryptologic Research Center Beijing China Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China
We propose a novel multiple-recipient key-encapsulation mechanism (mKEM) scheme which takes multiple public keys as input and outputs a single key shared by corresponding recipients. We construct our scheme in the ran... 详细信息
来源: 评论
How good is your data? Investigating the quality of data generated during security incident response investigations
arXiv
收藏 引用
arXiv 2019年
作者: Grispos, George Glisson, William Bradley Storer, Tim School of Interdisciplinary Informatics College of Information Science and Technology University of Nebraska at Omaha Cyber Forensics Intelligence Center Department of Computer Science Sam Houston State University School of Computing Science College of Science and Engineering University of Glasgow
An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validate... 详细信息
来源: 评论
Improved meet-in-the-middle attacks on reduced-round Piccolo
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 95-107页
作者: Ya LIU Liang CHENG Zhiqiang LIU Wei LI Qingju WANG Dawu GU Department of Computer Science and Engineering University of Shanghai for Science and Technology State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University School of Computer Science and Technology Donghua University Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Department of Applied Mathematics and Computer Science Technical University of Denmark
Piccolo is a lightweight block cipher that adopts a generalized Feistel network structure with4 branches, each of which is 16 bit long. The key length is 80 or 128 bit, denoted by Piccolo-80 and Piccolo-128, respectiv... 详细信息
来源: 评论
Enjoy the untrusted cloud: A secure, scalable and efficient SQL-like query framework for outsourcing data
arXiv
收藏 引用
arXiv 2019年
作者: Chen, Yaxing Zheng, Qinghua Liu, Dan Yan, Zheng Sun, Wenhai Zhang, Ning Lou, Wenjing Thomas Hou, Y. School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an Shaanxi China State Key Lab on Integrated Services Networks School of Cyber Engineering Xidian University Xi'an Shaanxi China Department of Communications and Networking Aalto University Espoo Finland Department of Computer and Information Technology Purdue University West LafayetteIN United States Department of Computer Science and Engineering Washington University in St. Louis St. LouisMO United States Department of Computer Science Electrical and Computer Engineering Virginia Tech BlacksburgVA United States
While the security of cloud remains a concern, a common practice is to encrypt data before outsourcing them for utilization. One key challenging issue is how to efficiently perform queries over the ciphertext. Convent... 详细信息
来源: 评论
Monolithic integration of MoS2-based visible detectors and GaN-based UV detectors
收藏 引用
Photonics Research 2019年 第10期7卷 1127-1133页
作者: YOU WU ZHIWEN LI KAH-WEE ANG YUPING JIA ZHIMING SHI ZHI HUANG WENJIE YU XIAOJUAN SUN XINKE LIU DABING LI State Key Laboratory of Luminescence and Applications Changchun Institute of OpticsFine Mechanics and PhysicsChinese Academy of SciencesChangchun 130033China Center of Materials Science and Optoelectronics Engineering University of Chinese Academy of SciencesBeijing 100049China Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore Shenzhen Castle Security Technology Co. Ltd.Shenzhen 518000China State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Microsystem and Information TechnologyChinese Academy of SciencesShanghai 200050China
With the increasing demand for high integration and multi-color photodetection for both military and civilian applications, the research of multi-wavelength detectors has become a new research hotspot. However, curren... 详细信息
来源: 评论
Data-driven machine learning improves prediction of sulfonamide antibiotic adsorption by biochar in aqueous phase
收藏 引用
Bioresource technology 2025年 434卷 132773页
作者: Mudi Zhai Bomin Fu Zhaozhong Wu Junsen Wang Weijie Wang Hongtao Wang College of Environmental Science and Engineering Key Laboratory of Yangtze River Water Environment Ministry of Education Tongji University Siping Rd 1239 Shanghai 200092 China. College of Environmental Science and Engineering Key Laboratory of Yangtze River Water Environment Ministry of Education Tongji University Siping Rd 1239 Shanghai 200092 China National Observation and Research Station of Coastal Ecological Environments in Macao Macao Environmental Research Institute Faculty of Innovation Engineering Macau University of Science and Technology Macao SAR China State Key Laboratory of Marine Pollution and Department of Chemistry City University of Hong Kong Hong Kong 999077 China. Electronic address: bomin_fu@***. School of Computer Science Northwestern Polytechnical University Xi'an 710129 China. Shanghai Institute of Pollution Control and Ecological Security Shanghai 200092 China. Electronic address: hongtao@***.
Sulfonamide antibiotics (SAs) have attracted much attention due to their environmental risks to aquatic ecosystems. Biochars (BCs), as excellent adsorbent materials, have been used to remove SAs from aqueous phases. T... 详细信息
来源: 评论