咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4811-4820 订阅
排序:
ECGNET: Learning Where to Attend for Detection of Atrial Fibrillation with Deep Visual Attention
arXiv
收藏 引用
arXiv 2018年
作者: Mousavi, Sajad Afghah, Fatemeh Razi, Abolfazl Acharya, U. Rajendra School of Informatics Computing and Cyber Systems Northern Arizona University Flagstaff United States Department of Electronics and Computer Engineering Ngee Ann Polytechnic Singapore Department of Biomedical Engineering School of Science and Technology Singapore University of Social Sciences Singapore Department of Biomedical Engineering Faculty of Engineering University of Malaya Malaysia
The complexity of the patterns associated with Atrial Fibrillation (AF) and the high level of noise affecting these patterns have significantly limited the current signal processing and shallow machine learning approa... 详细信息
来源: 评论
Evolving Bent Quaternary Functions
Evolving Bent Quaternary Functions
收藏 引用
Congress on Evolutionary Computation
作者: Stjepan Picek Karlo Knezevic Luca Mariot Domagoj Jakobovic Alberto Leporati Cyber Security Research Group Delft University of Technology Delft The Netherlands Faculty of Electrical Engineering and Computing University of Zagreb Zagreb Croatia Department of Informatics Systems and Communication Università degli Studi di Milano-Bicocca Milano Italy
Boolean functions have a prominent role in many real-world applications, which makes them a very active research domain. Throughout the years, various heuristic techniques proved to be an attractive choice for the con... 详细信息
来源: 评论
Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools
收藏 引用
IFAC-PapersOnLine 2017年 第1期50卷 2088-2094页
作者: Murguia C. Wouw N.V.D. Ruths J. Singapore University of Technology and Design Center for Research in Cyber Security (iTrust) Singapore Eindhoven University of Technology Mechanical Engineering Department Delft Center for Systems and Control Delft University of Technology Department of Civil Environmental and Geo-Engineering University of Minnesota Eindhoven Delft Minneapolis Netherlands University of Texas at Dallas Departments of Mechanical and Systems Engineering United States
For given system dynamics, control structure, and fault/attack detection procedure, we provide mathematical tools–in terms of Linear Matrix Inequalities (LMIs)–for characterizing and minimizing the set of states tha... 详细信息
来源: 评论
StegTab: Steganography in guitar tablatures
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2018年 第4期9卷 904-917页
作者: Zhu, Zhaohua Tian, Hui Chang, Chin-Chen Chen, Yonghong Wang, Tian Cai, Yiqiao College of Computer Science and Technology National Huaqiao University XiamenFujian361021 China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai200240 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan
Steganography based on musical notation is a branch of music-based information hiding, which has good steganographic transparency. However, the existing steganographic methods would inevitably reduce the quality of mu... 详细信息
来源: 评论
Relation networks for optic disc and fovea localization in retinal images
arXiv
收藏 引用
arXiv 2018年
作者: Babu, Sudharshan Chandra Maiya, Shishira R. Elango, Sivasankar Department of Computer Science Indian Institute of Technology Bombay MumbaiMaharashtra400076 India Robert Bosch Center for Cyber Physical Systems Indian Institute of Science BangaloreKarnataka560054 India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli TiruchirappalliTamil Nadu620015 India
Diabetic Retinopathy is the leading cause of blindness in the world. At least 90% of new cases can be reduced with proper treatment and monitoring of the eyes. However, scanning the entire population of patients is a ... 详细信息
来源: 评论
Persistent fault analysis on block ciphers
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2018年 第3期2018卷 150-172页
作者: Zhang, Fan Lou, Xiaoxuan Zhao, Xinjie Bhasin, Shivam He, Wei Ding, Ruyi Qureshi, Samiya Ren, Kui College of Information Science and Electronic Engineering Zhejiang University China Institute of Cyber Security Research Zhejiang University China College of Computer Science and Technology Zhejiang University China The Institute of North Electronic Equipment China Nanyang Technological University Singapore Shield Laboratory Huawei International Pte. Ltd Singapore Georgia Institute of Technology GA United States
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is propos... 详细信息
来源: 评论
Political corporate governance of ICT: Essential for national service delivery and security  16
Political corporate governance of ICT: Essential for nationa...
收藏 引用
16th European Conference on cyber Warfare and security, ECCWS 2017
作者: Van Der Walt, Tersia Von Solms, Sebastiaan Centre for Cyber Security Academy for Computer Science and Software Engineering University of Johannesburg South Africa Government Chief Information Office Department of Public Service and Administration South African Government South Africa
In any developing country, delivering of proper services to the people of the country, on a national level by the incumbent Government, is crucial to the social and economic development and stability and security of t... 详细信息
来源: 评论
Managing IoT-Based Smart Healthcare Systems Traffic with Software Defined Networks
Managing IoT-Based Smart Healthcare Systems Traffic with Sof...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Farag Sallabi Faisal Naeem Mamoun Awad Khaled Shuaib Department of Computer and Network Engineering United Arab Emirates University Al Ain UAE Department of Computing and Technology Abasyn University Peshawar Pakistan Department of Computer Science and Software Engineering United Arab Emirates University Al Ain UAE Department of Information Systems and Security United Arab Emirates University Al Ain UAE
Internet of things (IoT) aims to connect billions of devices to the Internet. These devices generate an enormous amount of traffic. A Wireless Body Area Network (WBAN) aggregates the data generated from the body senso... 详细信息
来源: 评论
An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
arXiv
收藏 引用
arXiv 2018年
作者: Li, Jing Guan, Zhitao Du, Xiaojiang Zhang, Zijian Wu, Jun School of Control and Computer Engineering North China Electric Power University China Department of Computer and Information Science Temple University PhiladelphiaPA United States School of Computer Beijing Institute of Technology Beijing China College of Information Security Engineering Shanghai Jiao Tong University Shanghai China
With the increasing number of mobile applications and the popularity of cloud computing, the combination of these two techniques that named mobile cloud computing (MCC) attracts great attention in recent years. A prom... 详细信息
来源: 评论
Matrix Factorization Recommendation Algorithm Based on User Characteristics
Matrix Factorization Recommendation Algorithm Based on User ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Hongtao Liu Ouyang Mao Chen Long Xueyan Liu Zhenjia Zhu School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Economics and Management Chongqing University of Posts and Telecommunications Chongqing China School of Software Engineering Shenzhen Institute of Information Technology Shenzhen China
Matrix Factorization is a popular and successful method. It is already a common model method for collaborative filtering in recommendation systems. As most of the scoring matrix is sparse and the dimensions are increa... 详细信息
来源: 评论