咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是4911-4920 订阅
排序:
The Effect of Different Core Materials on Transformer Inrush Currents
The Effect of Different Core Materials on Transformer Inrush...
收藏 引用
International Conference on Magnetics (INTERMAG)
作者: Wenxia Sima Yonglai Liu Potao Sun Yuan Zhou Daixiao Peng Ming Yang State Key Laboratory of Power Transmission Equipment System Security and New Technology Chongqing University Chongqing China Electric Power Research Institute of Guangdong Power Grid Co.Ltd. Guangzhou Guang Dong China Department of Electrical and Computer Engineering New York University Brooklyn NY USA
The inrush current is one of the most common low-frequency transients, and is crucial for transformer studies and design. Core materials have an impact on the inrush current of transformers due to their different magn... 详细信息
来源: 评论
Video deblurring via semantic segmentation and pixel-wise non-linear kernel
arXiv
收藏 引用
arXiv 2017年
作者: Ren, Wenqi Pan, Jinshan Cao, Xiaochun Yang, Ming-Hsuan IIE CAS Tencent AI Lab School of Computer Science and Engineering Nanjing University of Science and Technology School of Cyber Security University of Chinese Academy of Sciences Electrical Engineering and Computer Science University of California Merced United States
Video deblurring is a challenging problem as the blur is complex and usually caused by the combination of camera shakes, object motions, and depth variations. Optical flow can be used for kernel estimation since it pr... 详细信息
来源: 评论
Three Layer Game Theoretic Decision Framework for cyber-Investment and cyber-Insurance  8th
Three Layer Game Theoretic Decision Framework for Cyber-Inve...
收藏 引用
8th International Conference on Decision and Game Theory for security, GameSec 2017
作者: Tosh, Deepak K. Vakilinia, Iman Shetty, Sachin Sengupta, Shamik Kamhoua, Charles A. Njilla, Laurent Kwiat, Kevin Department of Computer Science Norfolk State University NorfolkVA United States Department of Computer Science and Engineering University of Nevada RenoNV United States Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Network Security Branch Army Research Laboratory AdelphiMD United States Cyber Assurance Branch Air Force Research Laboratory RomeNY United States
cyber-threat landscape has become highly complex, due to which isolated attempts to understand, detect, and resolve cybersecurity issues are not feasible in making a time constrained decisions. Introduction of cyber-t... 详细信息
来源: 评论
Network reconstruction and controlling based on structural regularity analysis
arXiv
收藏 引用
arXiv 2018年
作者: Wu, Tao Qiao, Shaojie Xian, Xingping Wang, Xi-Zhao Wang, Wei Liu, Yanbing School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Department of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Institution of Cybersecurity Sichuan University Chengdu610065 China Chongqing Engineering Laboratory of Internet and Information Security Chongqing University of Posts and Telecommunications Chongqing400065 China
From the perspective of network analysis, the ubiquitous networks are comprised of regular and irregular components, which makes uncovering the complexity of network structures to be a fundamental challenge. Exploring... 详细信息
来源: 评论
Blockchain AI Framework for Healthcare Records Management: Constrained Goal Model  26
Blockchain AI Framework for Healthcare Records Management: C...
收藏 引用
26th Telecommunications Forum, TELFOR 2018
作者: Wehbe, Youssef Zaabi, Mohamed Al Svetinovic, Davor Department of Civil Infrastructure and Environmental Engineering Khalifa University of Science and Technology Masdar Institute P.O. Box 54224 Masdar City Abu Dhabi United Arab Emirates Department of Chemical and Environmental Engineering Khalifa University of Science and Technology Masdar Institute P.O. Box 54224 Masdar City Abu Dhabi United Arab Emirates Department of Computer Science Khalifa University of Science and Technology Masdar Institute Center on Cyber-Physical Systems P.O. Box 54224 Masdar City Abu Dhabi United Arab Emirates
Healthcare-related technology has been growing exponentially, from electronic healthcare records (EHRs) and personal health trackers to population health management tools. Currently, data from these sources is largely... 详细信息
来源: 评论
A User-Centric Data Secure Creation Scheme in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 753-760页
作者: SU Mang LI Fenghua SHI Guozhen GENG Kui XIONG Jinbo School of Computer Science and Engineering Nanjing University of Science and Technology State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Department of Information Security Beijing Electronic Science and Technology Institute State Key Laboratory of Integrated Services Network Xidian University
Due to the use of the cloud computing technology,the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds,which would bring new challenges ... 详细信息
来源: 评论
cybercafés in Nigeria: Curse to the internet?
Cybercafés in Nigeria: Curse to the internet?
收藏 引用
2016 International Conference on Information and Communication technology and its Applications, ICTA 2016
作者: Osho, Oluwafemi Adepoju, Solomon A. Department of Cyber Security Science Federal University of Technology Minna Nigeria Department of Computer Science Federal University of Technology Minna Nigeria
cybercafés have grown in popularity since their emergence. This popularity is predicated on their capacity to offer relatively cheap, immediate and convenient access to the internet. Regrettably, cybercriminals, ... 详细信息
来源: 评论
Large Scale Rollout of Smart Grid Services
Large Scale Rollout of Smart Grid Services
收藏 引用
Global Internet of Things Summit (GIoTS)
作者: Florian Kintzler Tobias Gawron-Deutsch Stephan Cejka Judith Schulte Mathias Uslar Eric MSP Veith Ewa Piatkowska Paul Smith Friederich Kupzog Henrik Sandberg Michelle S. Chong David Umsonst Marco Mittelsdorf Corporate Technology Siemens AG Austria Vienna Austria R&D Division Energy OFFIS e.V. - Institut fur Informatik Oldenburg Germany Center for Digital Safety Security AIT Austrian Institute of Technology Vienna Austria School of Electrical Engineering and Computer Science Department of Automatic Control KTH Royal Institute of Technology Stockholm Sweden Fraunhofer Institute for Solar Energy Systems Freiburg Germany
In the domain of energy automation, where a massive number of software-based IoT services interact with a complex dynamic system, processes for software installation and software update become more important and more ... 详细信息
来源: 评论
Survey of on-line risks faced by internet users in the Nigerian telecommunication space
Survey of on-line risks faced by internet users in the Niger...
收藏 引用
2016 International Conference on Information and Communication technology and its Applications, ICTA 2016
作者: Onwuka, Elizabeth N. Afolayan, David O. Abubakar, Wasiu Ibrahim, Joshua I. Department of Telecommunications Engineering Federal University of Technology Minna Nigeria Department of Cyber Security Science Federal University of Technology Minna Nigeria Department of Computer Science Federal University of Technology Minna Nigeria
In the past ten years, mobile broadband has made an inroad into the country and just in the last six years a twenty-two percent leap has been gained with respect to Internet use penetration. To this end the use of Inf... 详细信息
来源: 评论
InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy
InPrivate Digging: Enabling Tree-based Distributed Data Mini...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Lingchen Zhao Lihao Ni Shengshan Hu Yaniiao Chen Pan Zhou Fu Xiao Libing Wu Collaborative Innovation Center of Geospatial Technology P. R. China School of Cyber Science and Engineering Wuhan University P. R. China Department of Computer Science City University of Hong Kong P. R. China Huazhong University of Science and Technology P. R. China Nanjing University of Posts and Telecommunications P.R. China
Data mining has heralded the major breakthrough in data analysis, serving as a “super cruncher” to discover hidden information and valuable knowledge in big data systems. For many applications, the collection of big... 详细信息
来源: 评论