咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是4881-4890 订阅
排序:
Performance Analysis of Low-Interference N-Continuous OFDM
arXiv
收藏 引用
arXiv 2018年
作者: Wei, Peng Xiao, Yue Dan, Lilin Lv, Shichao Xiang, Wei Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Tianjin Key Laboratory of Photoelectric Detection Technology and System The School of Electronics and Information Engineering Tiangong University Tianjin300387 China National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China Chengdu China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Beijing Key Laboratory of IoT Information Security Technology Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China College of Science and Engineering James Cook University CairnsQLD4878 Australia
The low-interference N-continuous orthogonal frequency division multiplexing (NC-OFDM) system [25], [26] is investigated in terms of power spectrum density (PSD) and bit error rate (BER), to prove and quantify its adv... 详细信息
来源: 评论
Lightweight classification of IoT malware based on image recognition
arXiv
收藏 引用
arXiv 2018年
作者: Su, Jiawei Vargas, Danilo Vasconcellos Prasad, Sanjiva Sgandurra, Daniele Feng, Yaokai Sakurai, Kouichi School of Information Science and Electrical Engineering Kyushu University Japan Faculty of Information Science and Electrical Engineering Kyushu University Japan Department of Computer Science and Engineering Indian Institute of Technology Delhi India ISG Smart Card and IoT Security Centre Royal Holloway University of London United Kingdom
The Internet of Things (IoT) is an extension of the traditional Internet, which allows a very large number of smart devices, such as home appliances, network cameras, sensors and controllers to connect to one another ... 详细信息
来源: 评论
Random directions stochastic approximation with deterministic perturbations
arXiv
收藏 引用
arXiv 2018年
作者: Prashanth, L.A. Bhatnagar, Shalabh Bhavsar, Nirav Fu, Michael Marcus, Steven I. Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India Department of Computer Science and Automation Robert Bosch Centre for Cyber Physical Systems Indian Institute of Science Bangalore Bangalore India Robert H. Smith School of Business Institute for Systems Research University of Maryland College ParkMD United States Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland College ParkMD United States
We introduce deterministic perturbation schemes for the recently proposed randomdirections stochastic approximation (RDSA) [19], and propose new first-order and second-order algorithms. In the latter case, these are t... 详细信息
来源: 评论
On the importance of standardising the process of generating digital forensic reports
收藏 引用
Forensic Science International: Reports 2019年 1卷 100008-100008页
作者: Karie, Nickson. M. Kebande, Victor R. Venter, H.S. Choo, Kim-Kwang Raymond Department of Computer Science University of Swaziland Kwaluseni Swaziland IoTaP Research Center Department of Computer Science and Media Technology Malmo University Nordenskiöldsgatan 1 211 19 Malmö Sweden Department of Computer Science University of Pretoria Private Bag X20 Hatfield 0028 Pretoria South Africa Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio TX 78249-0631 USA
AbstractThe ISO/IEC 27043:2015 international standard provides new standardised guidelines for common investigation processes across various investigation scenarios that mostly involve digital evidence. The reporting ... 详细信息
来源: 评论
SMDP-based downlink packet scheduling scheme for solar energy assisted heterogeneous networks
arXiv
收藏 引用
arXiv 2018年
作者: Li, Qizhen Gao, Jie Wen, Jinming Tang, Xiaohu Zhao, Lian Sun, Limin School of Information Science and Technology Southwest Jiaotong University Chengdu611756 China Department of Electrical and Computer Engineering Ryerson University TorontoONM5B 2K3 Canada Department of Electrical and Computer Engineering University of Toronto TorontoONM5S 3G4 Canada Beijing Key Laboratory of IoT Information Security Technology Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
Renewable energy assisted heterogeneous networks can improve system capacity and reduce conventional energy consumption. In this paper, we propose a semi-Markov decision process (SMDP)-based downlink packet scheduling... 详细信息
来源: 评论
Frequency synchronization for uplink massive MIMO with adaptive MUI suppression in angle-domain
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Yinghao Zhang, Weile Gao, Feifei Li, Geoffrey Ye MOE Key Lab for Intelligent Networks and Network Security School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an Shaanxi710049 China State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing100084 China Department of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States
In this paper, we develop a novel angle-domain adaptive filtering (ADAF)-based frequency synchronization method for the uplink of a massive multiple-input multiple-output (MIMO) multiuser network, which is applicable ... 详细信息
来源: 评论
Predicting vulnerable software components using software network graph  9th
Predicting vulnerable software components using software net...
收藏 引用
9th International Symposium on cyberspace Safety and security, CSS 2017
作者: Wei, Shengjun Du, Xiaojiang Hu, Changzhen Shan, Chun Beijing Key Laboratory of Software Security Engineering Technique Beijing Institute of Technology Beijing100081 China Department of Computer and Information Sciences Temple University PhiladelphiaPA19122 United States
Vulnerability Prediction Models (VPMs) are used to predict vulnerability-prone modules and now many software security metrics have been proposed. In this paper, we predict vulnerability-prone components. Based on soft... 详细信息
来源: 评论
Information Leakage in Encrypted Deduplication via Frequency Analysis
Information Leakage in Encrypted Deduplication via Frequency...
收藏 引用
International Conference on Dependable Systems and Networks (DSN)
作者: Jingwei Li Chuan Qin Patrick P. C. Lee Xiaosong Zhang University of Electronic Science and Technology of China Chengdu CN Department of Computer Science and Engineering The Chinese University of Hong Kong Center for Cyber Security University of Electronic Science and Technology of China
Encrypted deduplication seamlessly combines encryption and deduplication to simultaneously achieve both data security and storage efficiency. State-of-the-art encrypted deduplication systems mostly adopt a determinist... 详细信息
来源: 评论
A Dynamic Social Network Data Publishing Algorithm Based on Differential Privacy
收藏 引用
Journal of Information security 2017年 第4期8卷 328-338页
作者: Zhenpeng Liu Yawei Dong Xuan Zhao Bin Zhang School of Cyber Security and Computer Hebei University Baoding China Center for Information Technology Hebei University Baoding China School of Electronic Information Engineering Hebei University Baoding China
Social network contains the interaction between social members, which constitutes the structure and attribute of social network. The interactive relationship of social network contains a lot of personal privacy inform... 详细信息
来源: 评论
Effects of csi knowledge on secrecy of threshold-selection decode-and-forward relaying
arXiv
收藏 引用
arXiv 2018年
作者: Kundu, Chinmoy Ghose, Sarbani Ngatche, Telex M.N. Dobre, Octavia A. Duong, Trung Q. Bose, Ranjan School of Electronics Electrical Engineering and Computer Science Queen’s University Belfast Northern Ireland United Kingdom Cryptology and Security Research Unit Indian Statistical Institute Kolkata700108 India Engineering and Applied Science Memorial University Canada Department of Electrical Engineering Indian Institute of Technology Delhi New Delhi110016 India
—This paper considers secrecy of a three node cooperative wireless system in the presence of a passive eavesdropper. The threshold-selection decode-and-forward (DF) relay is considered, which can decode the source me... 详细信息
来源: 评论