咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4821-4830 订阅
排序:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach
arXiv
收藏 引用
arXiv 2018年
作者: Homoliak, Ivan Teknös, Martin Ochoa, Martín Breitenbacher, Dominik Hosseini, Saeid Hanacek, Petr Faculty of Information Technology Brno University of Technology Bozetechova 1/2 Brno612 66 Czech Republic STE-SUTD Cyber Security Laboratory 8 Somapah Road Singapore487372 Singapore Department of Applied Mathematics and Computer Science Universidad del Rosario Bogotá Colombia Cyxtera Technologies
Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time they may be susceptible to evasion by obfuscation techniques. An adversary intruder which possesses a cru... 详细信息
来源: 评论
Modeling Multi-turn conversation with deep utterance aggregation
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Zhuosheng Li, Jiangtong Zhu, Pengfei Zhao, Hai Liu, Gongshen Department of Computer Science and Engineering Shanghai Jiao Tong University Key Lab. of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Shanghai Jiao Tong University Shanghai200240 College of Zhiyuan Shanghai Jiao Tong University School of Cyber Security Shanghai Jiao Tong University School of Computer Science and Software Engineering East China Normal University
Multi-turn conversation understanding is a major challenge for building intelligent dialogue systems. This work focuses on retrieval-based response matching for multi-turn conversation whose related work simply concat... 详细信息
来源: 评论
technology of wireless transmission of energy to remote objects based on multi-frequency system of transmitters  11
Technology of wireless transmission of energy to remote obje...
收藏 引用
11th International Conference on Antenna Theory and Techniques, ICATT 2017
作者: Grishin, Igor Yu. Timirgaleeva, Rena R. Titov, Sergey Vl. Titova, Yelena V. Department of Computer Technology and Information Security Kuban State Technological Universityline Krasnodar Russia Department of System Engineering Kharkiv National University of Radioelectronics Kharkiv Ukraine
The authors of this work offer a form of application of space-phase-frequency focusing of the V-shaped multi-frequency pulses for the creation of the systems of wireless transmission of energy to land-based, mountain ... 详细信息
来源: 评论
A hybrid universal blind quantum computation
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Xiaoqian Luo, Weiqi Zeng, Guoqiang Weng, Jian Yang, Yaxi Chen, Minrong Tan, Xiaoqing College of Information Science and Technology Jinan University Guangzhou510632 China College of Cyber Security Jinan University Guangzhou510632 China School of Computer South China Normal University Guangzhou510631 China Department of Mathematics Jinan University Guangzhou510632 China
In blind quantum computation (BQC), a client delegates her quantum computation to a server with universal quantum computers who learns nothing about the client's private information. In measurement-based BQC model... 详细信息
来源: 评论
Effective Similarity Measures of Collaborative Filtering Recommendations Based on User Ratings Habits
Effective Similarity Measures of Collaborative Filtering Rec...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Hongtao Liu Lulu Guo Long Chen Xueyan Liu Zhenjia Zhu School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Economics and Management Chongqing University of Posts and Telecommunications Chongqing China School of Software Engineering Shenzhen Institute of Information Technology Shenzhen China
The core of the recommendation system is the recommendation algorithm, especially the application of collaborative filtering recommendation algorithm is the most widely used. With the rapid increase of data sparsity. ... 详细信息
来源: 评论
Distributed and adaptive location identification system for mobile devices
arXiv
收藏 引用
arXiv 2018年
作者: Awad, Fahed Al-Sadi, Aisha Al-Quran, Fida'a Alsmady, Abdulsalam Department of Network Engineering and Security Jordan University of Science and Technology P. O. Box 3030 Irbid22110 Jordan Department of Computer Science Jordan University of Science and Technology P. O. Box 3030 Irbid22110 Jordan Department of Computer Engineering Jordan University of Science and Technology P. O. Box 3030 Irbid22110 Jordan
Indoor location identification and navigation need to be as simple, seamless, and ubiquitous as its outdoor GPS-based counterpart is. It would be of great convenience to the mobile user to be able to continue navigati... 详细信息
来源: 评论
Detection of Double JPEG Compression with the Same Quantization Matrix Based on Convolutional Neural Networks
Detection of Double JPEG Compression with the Same Quantizat...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Peng Peng Tanfeng Sun Xinghao Jiang Ke Xu Bin Li Yunqing Shi School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Shenzhen Key Laboratory of Media Security Shenzhen China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark USA
The detection of double JPEG compression with the same quantization matrix is a challenging problem in image forensics. In this paper, a CNN framework is proposed to solve this problem. This framework contains a prepr... 详细信息
来源: 评论
Fog-assisted multi-user swipt networks: Local computing or offloading
arXiv
收藏 引用
arXiv 2019年
作者: Zheng, Haina Xiong, Ke Fan, Pingyi Zhong, Zhangdui Letaief, Khaled Ben School of Computer and Information Technology Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China National Laboratory for Information Science and Technology Department of Electronic Engineering Tsinghua University Beijing100084 China State Key Lab of Rail Traffic Control and Safety Beijing Engineering Research Center of High-speed Railway Broadband Mobile Communications Beijing Jiaotong University Beijing100044 China Clear Water Bay Hong Kong
This paper investigates a fog computing-assisted multi-user simultaneous wireless information and power transfer (SWIPT) network, where multiple sensors with power splitting (PS) receiver architectures receive informa... 详细信息
来源: 评论
Local distinguishability of orthogonal quantum states with multiple copies of 2⊗2 maximally entangled states
收藏 引用
Physical Review A 2018年 第2期97卷 022334-022334页
作者: Zhi-Chao Zhang Yan-Qi Song Ting-Ting Song Fei Gao Su-Juan Qin Qiao-Yan Wen State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Department of Computer Science College of Information Science and Technology Jinan University Guangzhou 510632 China
For general quantum systems, many sets of locally indistinguishable orthogonal quantum states have been constructed so far. However, it is interesting how much entanglement resources are sufficient and/or necessary to... 详细信息
来源: 评论
Unsupervised resource-free entity discovery and linking in natural language questions
Unsupervised resource-free entity discovery and linking in n...
收藏 引用
2017 Evaluation Task at the China Conference on Knowledge Graph and Semantic Computing, CCKS-Tasks 2017
作者: Guo, Shu Cao, Jiangxia Wang, Quan Wang, Lihong Wang, Bin Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China School of Computer Scince and Technology Heilongjiang University China National Computer Network Emergency Response Technical Team Coordination Center of China China
We present the solution to the CCKS 2017 question entity discovery and linking (QEDL) task. This task is to discover and link entity mentions in natural language questions with their referent entities in a knowledge b... 详细信息
来源: 评论