咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4801-4810 订阅
排序:
A Load Balancing Algorithm for Resource Allocation in IEEE 802.15.4e Networks
A Load Balancing Algorithm for Resource Allocation in IEEE 8...
收藏 引用
IEEE International Conference on Pervasive Computing and Communications
作者: Katina Kralevska Dimitrios J. Vergados Yuming Jiang Angelos Michalas Dep. of Information Security and Communication Technology NTNU Norwegian University of Science and Technology School of Electrical and Computer Engineering National Technical University of Athens Department of Informatics Engineering Technological Education Institute of Western Macedonia Kastoria Greece
The recently created IETF 6TiSCH working group combines the high reliability and low-energy consumption of IEEE 802.15.4e Time Slotted Channel Hopping with IPv6 for industrial Internet of Things. We propose a distribu... 详细信息
来源: 评论
Ring compute-and-forward over block-fading channels
arXiv
收藏 引用
arXiv 2018年
作者: Lyu, Shanxiang Campello, Antonio Ling, Cong College of Information Science and Technology College of Cyber Security Jinan University Guangzhou510632 China Department of Electrical and Electronic Engineering Imperial College London LondonSW7 2AZ United Kingdom
The Compute-and-Forward protocol in quasi-static channels normally employs lattice codes based on the rational integers Z, Gaussian integers Z [i] or Eisenstein integers Z [ω], while its extension to more general cha... 详细信息
来源: 评论
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan
The continued risks of unsecured public Wi-Fi and why users ...
收藏 引用
Annual Conference on Privacy, security and Trust, PST
作者: Nissy Sombatruang Youki Kadobayashi M. Angela Sasse Michelle Baddeley Daisuke Miyamoto Department of Security and Crime Science University College London London UK Laboratory for Cyber Resilience Nara Institute of Science and Technology Nara Japan Department of Computer Science University College London London UK Institute for Choice University of South Australia Adelaide Australia
Many people today use public Wi-Fi networks but they harbor security and privacy risks. We investigated the extent of these risk today, and what factors influenced users to use the networks, adapting the design of a p... 详细信息
来源: 评论
CloudMe forensics: A case of big-data investigation
arXiv
收藏 引用
arXiv 2018年
作者: Teing, Yee-Yang Dehghantanha, Ali Choo, Kim-Kwang Raymond Department of Computer Science Faculty of Computer Science and Technology Universiti Putra Malaysia Serdang Selangor43400 Malaysia School of Computing Science and Engineering University of Salford Salford Greater ManchesterM5 4WT United Kingdom Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
—The issue of increasing volume, variety and velocity of has been an area of concern in cloud forensics. The high volume of data will, at some point, become computationally exhaustive to be fully extracted and analys... 详细信息
来源: 评论
Deep-Net: Deep neural network for cyber security use cases
arXiv
收藏 引用
arXiv 2018年
作者: Vinayakumar, R. Barathi Ganesh, H.B. Poornachandran, Prabaharan Anand, Kumar M. Soman, K.P. Amrita School of Engineering Coimbatore India Arnekt Solutions Pvt Ltd PuneMaharashtra India Center for Cyber Security Systems and Networks Amrita School of Engineering Amrita Vishwa Vidyapeetham Amritapuri India Department of Information Technology National Institute of Technology Karnataka Surathkal. Mangalore India
Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech proc... 详细信息
来源: 评论
Improved phrase search construction over encrypted data in cloud storage
收藏 引用
International Journal of Innovative Computing and Applications 2017年 第1期8卷 3-11页
作者: Kong, Fanyu Wang, Jie Yu, Jia Wang, Xu An Institute of Network Security Shandong University Jinan250100 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Jinan250100 China Department of Computer Science University of Massachusetts Lowell LowellMA01854 United States College of Information Engineering Qingdao University Qingdao266071 China Department of Electronics Technology Engineering University of Armed Police Force Xi'an China
Searchable encryption schemes are important security techniques for guaranteeing cloud customers' data privacy in cloud storage outsourcing service. Kissel proposed a verifiable single-phase phrase search scheme u... 详细信息
来源: 评论
Inter- and Intra-Patient ECG Heartbeat Classification For Arrhythmia Detection: A Sequence to Sequence Deep Learning Approach
arXiv
收藏 引用
arXiv 2018年
作者: Mousavi, Sajad Afghah, Fatemeh Acharya, U. Rajendra School of Informatics Computing and Cyber Systems Northern Arizona University Flagstaff United States Department of Electronics and Computer Engineering Ngee Ann Polytechnic Singapore Department of Biomedical Engineering School of Science and Technology Singapore University of Social Sciences Singapore Department of Biomedical Engineering Faculty of Engineering University of Malaya
Electrocardiogram (ECG) signal is a common and powerful tool to study heart function and diagnose several abnormal arrhythmias. While there have been remarkable improvements in cardiac arrhythmia classification method... 详细信息
来源: 评论
Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY
Power Attack and Protected Implementation on Lightweight Blo...
收藏 引用
Asia Joint Conference on Information security (Asia JCIS)
作者: Jing Ge Yifan Xu Ruiqian Liu Enze Si Ning Shang An Wang School of Computer Science State Key Laboratory of Cryptology Beijing China School of Computer Science Beijing Institute of Technology Beijing China Network Security Squadron of Public Security Department of Henan Province Zhengzhou China Chinese Academy of Sciences China Key laboratory of network assessment technology & Institute of Information Engineering Beijing China
SKINNY is a new lightweight tweakable block cipher family, which can compete to other lightweight cipher in terms of hardware or software implementations. While its theoretical security has been widely studied, little... 详细信息
来源: 评论
Stop annoying me! an empirical investigation of the usability of app privacy notifications  17
Stop annoying me! an empirical investigation of the usabilit...
收藏 引用
29th Australian computer-Human Interaction Conference, OzCHI 2017
作者: Micallef, Nicholas Just, Mike Baillie, Lynne Alharby, Maher Australian Centre for Cyber Security School of Engineering and Information Technology University of New South Wales Canberra Australia School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh United Kingdom College of Computer Science and Engineering Taibah University Medina Saudi Arabia
Privacy nudges are a "soft-paternalistic" method to nudge (instead of force) users to make more informed privacy decisions. While previous work has shown that privacy nudges are effective in encouraging user... 详细信息
来源: 评论
Augmentation of wastewater-based epidemiology with machine learning to support global health surveillance
Nature Water
收藏 引用
Nature Water 2025年 1-11页
作者: Eva Aßmann Christopher Irrgang Hugues Richard Martin Hölzer Timo Greiner Alexander Ullrich Matthew Wade Shelesh Agrawal Susanne Lackner Fabian Amman Sindy Böttcher Markus Landthaler Emanuel Wyler Serghei Mangul Viorel Munteanu Fotis Psomopoulos Maureen Smith Maria Trofimova Max von Kleist Centre for Artificial Intelligence in Public Health Research (ZKI-PH) Robert Koch Institute Berlin Germany Genome Competence Center (MF1) Robert Koch Institute Berlin Germany Department of Infectious Disease Epidemiology Robert Koch Institute Berlin Germany Chief Data Officer Group UK Health Security Agency London UK Chair of Water and Environmental Biotechnology Institute IWAR Department of Civil and Environmental Engineering Sciences Technical University of Darmstadt Darmstadt Germany CeMM Research Center for Molecular Medicine of the Austrian Academy of Sciences Vienna Austria Institute for Hygiene and Applied Immunology Medical University of Vienna Vienna Austria Gastroenteritis and Hepatitis Pathogens and Enteroviruses (FG15) Robert Koch Institute Berlin Germany Berlin Institute for Medical Systems Biology Max Delbrück Center for Molecular Medicine in the Helmholtz Association (MDC) Berlin Germany Institute for Biology Humboldt-Universität zu Berlin Berlin Germany Titus Family Department of Clinical Pharmacy USC Alfred E. Mann School of Pharmacy and Pharmaceutical Sciences University of Southern California Los Angeles CA USA Department of Biological and Morphofunctional Sciences College of Medicine and Biological Sciences Stefan cel Mare University of Suceava Suceava Romania Department of Computers Informatics and Microelectronics Technical University of Moldova Chisinau Moldova Institute of Applied Biosciences Center for Research and Technology Hellas Thessaloniki Greece Systems Medicine of Infectious Disease (P5) Robert Koch Institute Berlin Germany Department of Mathematics and Computer Science Freie Universität Berlin Berlin Germany
Wastewater-based epidemiology (WBE) has proven to be a valuable tool for monitoring the evolution and spread of global health threats, from pathogens to antimicrobial resistances. Throughout the COVID-19 pandemic, mul...
来源: 评论