咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,307 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,815 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,613 篇 工学
    • 2,769 篇 计算机科学与技术...
    • 2,304 篇 软件工程
    • 955 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 499 篇 电气工程
    • 417 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 243 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 194 篇 安全科学与工程
    • 177 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 132 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,564 篇 理学
    • 822 篇 数学
    • 451 篇 生物学
    • 322 篇 物理学
    • 260 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 952 篇 管理学
    • 601 篇 管理科学与工程(可...
    • 390 篇 图书情报与档案管...
    • 301 篇 工商管理
  • 296 篇 法学
    • 188 篇 社会学
  • 265 篇 医学
    • 216 篇 临床医学
    • 197 篇 基础医学(可授医学...
    • 118 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 218 篇 accuracy
  • 193 篇 deep learning
  • 181 篇 feature extracti...
  • 180 篇 machine learning
  • 175 篇 security
  • 158 篇 internet of thin...
  • 153 篇 training
  • 141 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 94 篇 cryptography
  • 90 篇 protocols
  • 89 篇 artificial intel...
  • 81 篇 convolutional ne...
  • 78 篇 data models
  • 74 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 161 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 56 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 46 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 sofotasios pasch...
  • 19 篇 peng hao
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,431 篇 英文
  • 324 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5815 条 记 录,以下是4971-4980 订阅
排序:
New efficient padding methods secure against padding oracle attacks  18th
New efficient padding methods secure against padding oracle ...
收藏 引用
18th International Conference on Information security and Cryptology, ICISC 2015
作者: Kang, HyungChul Park, Myungseo Moon, Dukjae Lee, Changhoon Kim, Jongsung Kim, Kimoon Kim, Juhyuk Hong, Seokhie Korea University Seoul Korea Republic of The Affiliated Insutitude of ETRI Seoul Korea Republic of Department of Computer Science and Engineering Seoul University of Science and Technology Seoul Korea Republic of Department of Mathematics Department of Financial Information Security Kookmin University Seoul Korea Republic of Korea Security and Internet Agency Seoul Korea Republic of
This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the pad... 详细信息
来源: 评论
An Iterative Co-Saliency Framework for RGBD Images
arXiv
收藏 引用
arXiv 2017年
作者: Cong, Runmin Lei, Jianjun Fu, Huazhu Lin, Weisi Huang, Qingming Cao, Xiaochun Hou, Chunping School of Electrical and Information Engineering Tianjin University Tianjin300072 China School of Computer Engineering Nanyang Technological University Singapore639798 Singapore Institute for Infocomm Research Ocular Imaging Department Agency for Science Technology and Research Singapore138632 Singapore School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences
As a newly emerging and significant topic in computer vision community, co-saliency detection aims at discovering the common salient objects in multiple related images. The existing methods often generate the co-salie... 详细信息
来源: 评论
Co-saliency Detection for RGBD Images Based on Multi-constraint Feature Matching and Cross Label Propagation
arXiv
收藏 引用
arXiv 2017年
作者: Cong, Runmin Lei, Jianjun Fu, Huazhu Huang, Qingming Cao, Xiaochun Hou, Chunping School of Electrical and Information Engineering Tianjin University Tianjin300072 China Ocular Imaging Department Institute for Infocomm Research Agency for Science Technology and Research Singapore School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing100093 China
Co-saliency detection aims at extracting the common salient regions from an image group containing two or more relevant images. It is a newly emerging topic in computer vision community. Different from the most existi... 详细信息
来源: 评论
Modularity based community detection with deep learning  25
Modularity based community detection with deep learning
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Liang, Yang Cao, Xiaochun He, Dongxiao Chuan, Wang Xiao, Wang Weixiong, Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China School of Information Engineering Tianjin University of Commerce China School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University China Department of Computer Science and Technology Tsinghua University China College of Math and Computer Science Institute for Systems Biology Jianghan University China Department of Computer Science and Engineering Washington University St. Louis United States
Identification of module or community structures is important for characterizing and understanding complex systems. While designed with different objectives, i.e., stochastic models for regeneration and modularity max... 详细信息
来源: 评论
Person re-identification by camera correlation aware feature augmentation
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Ying-Cong Zhu, Xiatian Zheng, Wei-Shi Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China Department of Computer Science and Engineering Chinese University of Hong Kong School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Sun Yatsen University Ministry of Education China Guangdong Province Key Laboratory of Information Security China
The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. Whil... 详细信息
来源: 评论
Distributed multi-robot coordination for dynamic perimeter surveillance in uncertain environments
Distributed multi-robot coordination for dynamic perimeter s...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Alexander Jahn Reza Javanmard Alitappeh David Saldaña Luciano C. A. Pimenta Andre G. Santos Mario F. M. Campos Graduate Program in Electrical Engineering (PPGEE) National Institute of Science and Technology for Cooperative Autonomous Systems Applied to Security and Environment Departamento de Informatica Universidade Federal de Vicosa Computer Science Department Universidade Federal de Minas Gerais Universidade Federal de Minas Gerais Belo Horizonte MG BR
In this work, multiple robots circulate around the boundary of a desired region in order to create a virtual fence. The aim of the this fence is to avoid internal or external agents crossing through the delimited area... 详细信息
来源: 评论
Fast shortest-path queries on large-scale graphs
Fast shortest-path queries on large-scale graphs
收藏 引用
International Conference on Network Protocols
作者: Qiongwen Xu Xu Zhang Jin Zhao Xin Wang Tilman Wolf School of Computer Science Fudan University China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China Department of Electrical and Computer Engineering University of Massachusetts Amherst USA
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN contr... 详细信息
来源: 评论
Provable multiple replication data possession with full dynamics for secure cloud storage
Provable multiple replication data possession with full dyna...
收藏 引用
作者: Zhang, Yafang Ni, Jianbing Tao, Xiaoling Wang, Yong Yu, Yong Big Data Research Center School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada College of Information and Communication Guilin University of Electronic Technology Guilin541004 China Guangxi Cloud Security and Cloud Service Engineering Research Center Guilin University of Electronic Technology Guilin541004 China
Cloud storage has been gaining tremendous popularity among individuals and corporations because of its low maintenance cost and on-demand services for the clients. To improve the availability and the reliability of cr... 详细信息
来源: 评论
Toward Optimal Secure Distributed Storage Systems with Exact Repair
Toward Optimal Secure Distributed Storage Systems with Exact...
收藏 引用
作者: Tandon, Ravi Amuru, Saidhiraj Clancy, Thomas Charles Buehrer, Richard Michael Department of Electrical and Computer Engineering University of Arizona TucsonAZ24061 United States Bradley Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States Samsung R and D Institute Bangalore560037 India Hume Center for National Security and Technology Virginia Tech BlacksburgVA24061 United States
Distributed storage systems (DSSs) in the presence of an external wiretapper are considered. A DSS is parameterized by (n, k, d), in which the data are stored across n nodes (each with storage capacity α), and must b... 详细信息
来源: 评论
On the quantification of the dissolved hydroxyl radicals in the plasma-liquid system using the molecular probe method
arXiv
收藏 引用
arXiv 2017年
作者: Ma, Yupengxue Gong, Xinning He, Bangbang Li, Xiaofei Cao, Dianyu Li, Junshuai Xiong, Qing Chen, Qiang Chen, Bing Hui Liu, Qing Huo Fujian Provincial Key Laboratory of Plasma and Magnetic Resonance Institute of Electromagnetics and Acoustics Department of Electronic Science Xiamen University Xiamen361005 China Department of Chemical and Biochemical Engineering National Engineering Laboratory for Green Productions of Alcohols-Ethers-Esters College of Chemistry and Chemical Engineering Xiamen University Xiamen361005 China School of Physical Science and Technology Lanzhou University Lanzhou730000 China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing400044 China Department of Electrical and Computer Engineering Duke University DurhamNC27708 United States
Hydroxyl (OH) radical is the most important reactive species produced by the plasmaliquid interactions, and the OH in the liquid phase (dissolved OH radical, OHdis) takes effect in many plasma-based applications due t... 详细信息
来源: 评论