咨询与建议

限定检索结果

文献类型

  • 3,465 篇 会议
  • 2,330 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,838 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,313 篇 软件工程
    • 959 篇 信息与通信工程
    • 527 篇 控制科学与工程
    • 508 篇 电气工程
    • 417 篇 生物工程
    • 333 篇 电子科学与技术(可...
    • 244 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 213 篇 机械工程
    • 195 篇 安全科学与工程
    • 178 篇 光学工程
    • 147 篇 仪器科学与技术
    • 144 篇 动力工程及工程热...
    • 133 篇 化学工程与技术
    • 128 篇 交通运输工程
  • 1,569 篇 理学
    • 825 篇 数学
    • 451 篇 生物学
    • 324 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 137 篇 化学
  • 954 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 391 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 299 篇 法学
    • 188 篇 社会学
  • 266 篇 医学
    • 217 篇 临床医学
    • 198 篇 基础医学(可授医学...
    • 119 篇 公共卫生与预防医...
  • 127 篇 经济学
    • 126 篇 应用经济学
  • 55 篇 农学
  • 48 篇 教育学
  • 42 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 217 篇 accuracy
  • 192 篇 deep learning
  • 181 篇 feature extracti...
  • 179 篇 machine learning
  • 175 篇 security
  • 159 篇 internet of thin...
  • 152 篇 training
  • 139 篇 computational mo...
  • 124 篇 authentication
  • 117 篇 real-time system...
  • 102 篇 privacy
  • 96 篇 support vector m...
  • 95 篇 blockchain
  • 94 篇 predictive model...
  • 93 篇 cryptography
  • 90 篇 protocols
  • 90 篇 artificial intel...
  • 82 篇 convolutional ne...
  • 79 篇 data models
  • 73 篇 optimization

机构

  • 204 篇 school of cyber ...
  • 162 篇 institute of inf...
  • 65 篇 college of cyber...
  • 57 篇 school of comput...
  • 57 篇 school of cyber ...
  • 56 篇 school of cyber ...
  • 52 篇 school of comput...
  • 49 篇 school of cyber ...
  • 47 篇 school of cyber ...
  • 42 篇 department of me...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 39 篇 college of compu...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 36 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 department of co...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 50 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 32 篇 cao xiaochun
  • 30 篇 huang qingming
  • 27 篇 hai jin
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 20 篇 peng hao
  • 20 篇 sofotasios pasch...
  • 19 篇 hu shengshan
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 wang wei
  • 18 篇 naglaa f.soliman
  • 18 篇 jin hai
  • 17 篇 liu yang
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 deqing zou

语言

  • 5,449 篇 英文
  • 330 篇 其他
  • 59 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5838 条 记 录,以下是4991-5000 订阅
排序:
Complexity analysis and comparison of test paths based on DSE
Complexity analysis and comparison of test paths based on DS...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Jiawen Lu Lizhi Cai Yang Zhang Keyi Hong Laboratory of Computer Software Testing & Evaluation Shanghai Development Center of Computer Software Technology Shanghai China School of Information Science & Engineering East China University of Science and Technology Shanghai China Cyber Security Department of Shanghai Public Security Bureau Shanghai China
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on D... 详细信息
来源: 评论
Optimizing interconnections to maximize the spectral radius of interdependent networks
收藏 引用
Physical Review E 2017年 第3期95卷 032308-032308页
作者: Huashan Chen Xiuyan Zhao Feng Liu Shouhuai Xu Wenlian Lu State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Mathematical Sciences Fudan University Shanghai 200433 People's Republic of China Department of Computer Science University of Texas at San Antonio San Antonio Texas 78249 USA Institute of Science and Technology for Brain-Inspired Intelligence Fudan University Shanghai 200433 China
The spectral radius (i.e., the largest eigenvalue) of the adjacency matrices of complex networks is an important quantity that governs the behavior of many dynamic processes on the networks, such as synchronization an... 详细信息
来源: 评论
Implementation of switching circuit models as transfer functions
Implementation of switching circuit models as transfer funct...
收藏 引用
International Symposium on Circuits and Systems
作者: David Kebo Houngninou Mitchell A Thornton Department of Computer Science and Engineering SMU Dallas Texas USA Darwin Deason Institute for Cyber Security SMU Dallas Texas USA
A transfer function is a mathematical function relating the output or response of a system to the input or stimulus. It is a concise mathematical model representing the input/output behavior of a system and is widely ... 详细信息
来源: 评论
New efficient padding methods secure against padding oracle attacks  18th
New efficient padding methods secure against padding oracle ...
收藏 引用
18th International Conference on Information security and Cryptology, ICISC 2015
作者: Kang, HyungChul Park, Myungseo Moon, Dukjae Lee, Changhoon Kim, Jongsung Kim, Kimoon Kim, Juhyuk Hong, Seokhie Korea University Seoul Korea Republic of The Affiliated Insutitude of ETRI Seoul Korea Republic of Department of Computer Science and Engineering Seoul University of Science and Technology Seoul Korea Republic of Department of Mathematics Department of Financial Information Security Kookmin University Seoul Korea Republic of Korea Security and Internet Agency Seoul Korea Republic of
This paper proposes three new padding methods designed to withstand padding oracle attacks, which aim at recovering a plaintext without knowing the secret key by exploiting oracle’s characteristic of checking the pad... 详细信息
来源: 评论
An Iterative Co-Saliency Framework for RGBD Images
arXiv
收藏 引用
arXiv 2017年
作者: Cong, Runmin Lei, Jianjun Fu, Huazhu Lin, Weisi Huang, Qingming Cao, Xiaochun Hou, Chunping School of Electrical and Information Engineering Tianjin University Tianjin300072 China School of Computer Engineering Nanyang Technological University Singapore639798 Singapore Institute for Infocomm Research Ocular Imaging Department Agency for Science Technology and Research Singapore138632 Singapore School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences
As a newly emerging and significant topic in computer vision community, co-saliency detection aims at discovering the common salient objects in multiple related images. The existing methods often generate the co-salie... 详细信息
来源: 评论
Co-saliency Detection for RGBD Images Based on Multi-constraint Feature Matching and Cross Label Propagation
arXiv
收藏 引用
arXiv 2017年
作者: Cong, Runmin Lei, Jianjun Fu, Huazhu Huang, Qingming Cao, Xiaochun Hou, Chunping School of Electrical and Information Engineering Tianjin University Tianjin300072 China Ocular Imaging Department Institute for Infocomm Research Agency for Science Technology and Research Singapore School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing100093 China
Co-saliency detection aims at extracting the common salient regions from an image group containing two or more relevant images. It is a newly emerging topic in computer vision community. Different from the most existi... 详细信息
来源: 评论
Modularity based community detection with deep learning  25
Modularity based community detection with deep learning
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Liang, Yang Cao, Xiaochun He, Dongxiao Chuan, Wang Xiao, Wang Weixiong, Zhang State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China School of Information Engineering Tianjin University of Commerce China School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University China Department of Computer Science and Technology Tsinghua University China College of Math and Computer Science Institute for Systems Biology Jianghan University China Department of Computer Science and Engineering Washington University St. Louis United States
Identification of module or community structures is important for characterizing and understanding complex systems. While designed with different objectives, i.e., stochastic models for regeneration and modularity max... 详细信息
来源: 评论
Person re-identification by camera correlation aware feature augmentation
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Ying-Cong Zhu, Xiatian Zheng, Wei-Shi Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China Department of Computer Science and Engineering Chinese University of Hong Kong School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Sun Yatsen University Ministry of Education China Guangdong Province Key Laboratory of Information Security China
The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. Whil... 详细信息
来源: 评论
Distributed multi-robot coordination for dynamic perimeter surveillance in uncertain environments
Distributed multi-robot coordination for dynamic perimeter s...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Alexander Jahn Reza Javanmard Alitappeh David Saldaña Luciano C. A. Pimenta Andre G. Santos Mario F. M. Campos Graduate Program in Electrical Engineering (PPGEE) National Institute of Science and Technology for Cooperative Autonomous Systems Applied to Security and Environment Departamento de Informatica Universidade Federal de Vicosa Computer Science Department Universidade Federal de Minas Gerais Universidade Federal de Minas Gerais Belo Horizonte MG BR
In this work, multiple robots circulate around the boundary of a desired region in order to create a virtual fence. The aim of the this fence is to avoid internal or external agents crossing through the delimited area... 详细信息
来源: 评论
Fast shortest-path queries on large-scale graphs
Fast shortest-path queries on large-scale graphs
收藏 引用
International Conference on Network Protocols
作者: Qiongwen Xu Xu Zhang Jin Zhao Xin Wang Tilman Wolf School of Computer Science Fudan University China Ministry of Education Engineering Research Center of Cyber Security Auditing and Monitoring China Department of Electrical and Computer Engineering University of Massachusetts Amherst USA
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN contr... 详细信息
来源: 评论