咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4851-4860 订阅
排序:
POSTER: A framework for IoT reprogramming  12th
POSTER: A framework for IoT reprogramming
收藏 引用
12th EAI International Conference on security and Privacy in Communication Networks, SecureComm 2016
作者: Xue, Nian Liang, Lulu Zhang, Jie Huang, Xin Department of Computer Science and Software Engineering Xi’an Jiaotong-Liverpool University Suzhou China School of Electrical Engineering and Electronics and Computer Science University of Liverpool Liverpool United Kingdom China Information Technology Security Evaluation Center Beijing China
The OpenFlow protocol, as a fundamental element for Software Defined Networking (SDN) architecture, only supports for packet forwarding across switches in general networks. In this paper, the authors propose Software-... 详细信息
来源: 评论
MBSA: a lightweight and flexible storage architecture for virtual machines
MBSA: a lightweight and flexible storage architecture for vi...
收藏 引用
作者: Chen, Xian Chen, Wenzhi Lu, Zhongyong Zhang, Yu Chang, Rui Hassan, Mohammad Mehedi Alelaiwi, Abdulhameed Xiang, Yang College of Computer Science and Technology Zhejiang University Hangzhou China State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia Centre for Cyber Security Research Deakin University BurwoodVIC Australia
With the advantages of extremely high access speed, low energy consumption, nonvolatility, and byte addressability, nonvolatile memory (NVM) device has already been setting off a revolution in storage field. Conventio... 详细信息
来源: 评论
Password recovery for ZIP files based on ARM-FPGA cluster  10th
Password recovery for ZIP files based on ARM-FPGA cluster
收藏 引用
10th International Conference on security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Bai, Xu Jiang, Lei Yang, Jiajia Dai, Qiong Bhuiyan, Md. Zakirul Alam Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100040 China Department of Computer and Information Sciences Fordham University BronxNY10458 United States
Password recovery of ZIP encrypted files is an important problem in computer forensics. The encryption is based on standard cryptographic algorithms as SHA1, HMAC and AES. The traditional methods such as dictionary an... 详细信息
来源: 评论
A fair scheduling algorithm for multiprocessor systems using a task satisfaction index  17
A fair scheduling algorithm for multiprocessor systems using...
收藏 引用
2017 International Conference on Research in Adaptive and Convergent Systems, RACS 2017
作者: Jung, Jinman Shin, Jongho Hong, Jiman Lee, Jinwoo Kuo, Tei-Wei Department of Information and Communication Engineering Hannam University Daejeon Korea Republic of Security Technology Group Samsung SDS Seoul Korea Republic of School of Computer Science and Engineering Soongsil University Seoul Korea Republic of Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan
With the emergence of increasingly heterogeneous devices and networks, computing systems are required to support a variety of services with difierent quality of service requirements. The degree of heterogeneity makes ... 详细信息
来源: 评论
An FPGA-based algorithm to accelerate regular expression matching  10th
An FPGA-based algorithm to accelerate regular expression mat...
收藏 引用
10th International Conference on security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Yang, Jiajia Jiang, Lei Bai, Xu Dai, Qiong Su, Majing Bhuiyan, Md Zakirul Alam Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100040 China Department of Computer and Information Sciences Fordham University BronxNY10458 United States
State-of-the-art Network Intrusion Detection Systems (NIDSs) use regular expressions (REs) to detect attacks or vulnerabilities. In order to keep up with the ever-increasing speed, more and more NIDSs need to be imple... 详细信息
来源: 评论
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
A privacy-aware two-factor authentication protocol based on ...
收藏 引用
作者: Jiang, Qi Kumar, Neeraj Ma, Jianfeng Shen, Jian He, Debiao Chilamkurti, Naveen School of Cyber Engineering Xidian University Xi'an China Co-innovation Center for Information Supply and Assurance Technology Anhui University Hefei China Department of Computer Science and Engineering Thapar University Patiala India School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Lab of Software Engineering Computer School Wuhan University Wuhan China Department of Computer Systems and Computer Science La Trobe University Melbourne Australia
As one of the enabling components of Internet of things (IoT), wireless sensor networks (WSNs) have found applications in a wide range of fields, in which outside users need to directly interact with sensors to obtain... 详细信息
来源: 评论
SMDP-Based Downlink Packet Scheduling Scheme for Solar Energy Assisted Heterogeneous Networks
SMDP-Based Downlink Packet Scheduling Scheme for Solar Energ...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Qizhen Li Jie Gao Jinming Wen Xiaohu Tang Lian Zhao Limin Sun School of Information Science and Technology Southwest Jiaotong University Chengdu China Department of Electrical and Computer Engineering Ryerson University Toronto Canada College of Information Science and Technology Jinan University Guangzhou China Beijing Key Laboratory of IoT Information Security Technology Chinese Academy of Sciences Beijing China
Renewable energy assisted heterogeneous networks (HetNets) can improve system capacity and reduce conventional energy consumption. In this paper, we propose a semi-Markov decision process (SMDP)-based downlink packet ... 详细信息
来源: 评论
Performance Analysis of Low-Interference N-Continuous OFDM
arXiv
收藏 引用
arXiv 2018年
作者: Wei, Peng Xiao, Yue Dan, Lilin Lv, Shichao Xiang, Wei Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Tianjin Key Laboratory of Photoelectric Detection Technology and System The School of Electronics and Information Engineering Tiangong University Tianjin300387 China National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China Chengdu China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Beijing Key Laboratory of IoT Information Security Technology Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China College of Science and Engineering James Cook University CairnsQLD4878 Australia
The low-interference N-continuous orthogonal frequency division multiplexing (NC-OFDM) system [25], [26] is investigated in terms of power spectrum density (PSD) and bit error rate (BER), to prove and quantify its adv... 详细信息
来源: 评论
Lightweight classification of IoT malware based on image recognition
arXiv
收藏 引用
arXiv 2018年
作者: Su, Jiawei Vargas, Danilo Vasconcellos Prasad, Sanjiva Sgandurra, Daniele Feng, Yaokai Sakurai, Kouichi School of Information Science and Electrical Engineering Kyushu University Japan Faculty of Information Science and Electrical Engineering Kyushu University Japan Department of Computer Science and Engineering Indian Institute of Technology Delhi India ISG Smart Card and IoT Security Centre Royal Holloway University of London United Kingdom
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very large number of smart devices, such as home appliances, network cameras, sensors and controllers to connect to one another ... 详细信息
来源: 评论
Random directions stochastic approximation with deterministic perturbations
arXiv
收藏 引用
arXiv 2018年
作者: Prashanth, L.A. Bhatnagar, Shalabh Bhavsar, Nirav Fu, Michael Marcus, Steven I. Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India Department of Computer Science and Automation Robert Bosch Centre for Cyber Physical Systems Indian Institute of Science Bangalore Bangalore India Robert H. Smith School of Business Institute for Systems Research University of Maryland College ParkMD United States Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland College ParkMD United States
We introduce deterministic perturbation schemes for the recently proposed randomdirections stochastic approximation (RDSA) [19], and propose new first-order and second-order algorithms. In the latter case, these are t... 详细信息
来源: 评论