咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是521-530 订阅
排序:
Few-Shot Encrypted Traffic Classification: A Survey  5
Few-Shot Encrypted Traffic Classification: A Survey
收藏 引用
5th Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2024
作者: Yang, Chen Gu, Zheyuan Bai, Jing Li, Zhe Xiong, Gang Gou, Gaopeng Yao, Shan Chen, Xi Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China 360 Digital Security Technology Group Co. Ltd. Beijing China
Encrypted traffic classification is an essential technique for maintaining cybersecurity and assuring quality of experience. Current research has achieved excellent classification performance by utilizing machine lear... 详细信息
来源: 评论
A Novel Approach for Detecting and Preventing security attacks using Machine Learning in IoT  14
A Novel Approach for Detecting and Preventing Security attac...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Al Sukhni, Badeea Kumar Mohanta, Bhabendu Kumar Dehury, Mohan Kumar Tripathy, Asesh University of Westminster Department Cyber Security London United Kingdom Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Vaddeswaram India Amity University Jharkhand Ranchi Amity Inst. of Information Technology India
Since most of the applications rely on machine learning algorithms, the customers are affected by the machine-made decisions. This can be resolved by adding more complexity to ML models. Common attacks that are possib... 详细信息
来源: 评论
Optimal, Almost Optimal Few-Weight Linear Codes and Related Quantum Codes
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4250-4259页
作者: Xie, Conghui Chen, Hao Zhou, Haiyan Li, Yang Lao, Huimin Jinan University College of Information Science and Technology Cyber Security Guangdong Guangzhou510632 China Nanjing Normal University Institute of Mathematics School of Mathematical Sciences Jiangsu Nanjing210023 China Hefei University of Technology School of Mathematics Anhui Hefei230009 China National University of Singapore Department of Industrial Systems Engineering and Management Queenstown 119077 Singapore
In eight published papers in IEEE Transactions on Information Theory, infinite families of optimal few-weight binary and q-ary linear codes were constructed and their weight distributions were determined. These codes ... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
Three-dimensional dynamic uncertainty semantic SLAM method for a production workshop
Three-dimensional dynamic uncertainty semantic SLAM method f...
收藏 引用
作者: Gou, Rongsong Chen, Guangzhu Yan, Chengliang Pu, Xin Wu, Yuanyuan Tang, Yuan College of Mechanical and Electrical Engineering Chengdu University of Technology Chengdu China College of Computer Science and Cyber Security Chengdu University of Technology Chengdu China
Simultaneous localization and mapping (SLAM) is the basis for intelligent navigation and intelligent security of mobile robots in a workshop. However, there are numerous dynamic objects in a workshop, such as robots a... 详细信息
来源: 评论
A Research on the Academic System in Universities Based on the One-Hot Encoding PAC Fuzzy Comprehensive Evaluation Algorithm  7th
A Research on the Academic System in Universities Based on t...
收藏 引用
7th International Conference on Innovative Computing, IC 2024
作者: Lu, Zhiqian Liu, Yihan Li, Qiang College of Computer and Cyber Security Hebei Normal University Hebei Shijiazhuang China College of China Combustion Engineering Hebei Normal University Hebei Shijiazhuang China College of Career Technology Hebei Normal University Hebei Shijiazhuang China
The influence of contemporary learning exhibits complex and multifaceted characteristics. This study, building upon a detailed explanation of the model, constructs a comprehensive set of evaluation indicators. By sele... 详细信息
来源: 评论
MICABAC: Multidimensional Industrial Control Attribute-Based Access Control Model
MICABAC: Multidimensional Industrial Control Attribute-Based...
收藏 引用
2024 IEEE International Conference on Systems, Man, and cybernetics, SMC 2024
作者: Wang, Hangyu Lv, Fei Chen, Yuqi Si, Shuaizong Pan, Zhiwen Sun, Degang Sun, Limin Institute of Information Engineering Cas Beijing Key Laboratory of Iot Information Security Technology Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Shanghai Tech University Shanghai China Computer Network Information Center Chinese Academy of Sciences Beijing China
As the Industrial Control System (ICS) increasingly merges with the Internet, the security threats have been increasing from internal users and external hackers. These challenges are further intensified by the facts: ... 详细信息
来源: 评论
Block-based fine-grained and publicly verifiable data deletion for cloud storage: Block-based fine-grained and publicly verifiable..: C. Yang et al.
收藏 引用
Soft Computing 2024年 第21期28卷 12491-12506页
作者: Yang, Changsong Liu, Yueling Ding, Yong Wu, Yongqiang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education 999077 Hong Kong Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China School of Computer Guangdong University of Science & Technology Dongguan523083 China South China Technical Support Department Topsec Network Technology Inc. Guangzhou510000 China
One of the most important services provided by cloud service providers (CSPs), cloud storage is economically attractive and can provide on-demand data storage service to resource-constrained tenants in the manner of p... 详细信息
来源: 评论
An Improved Multiple Face Recognition System for Crowd Monitoring Applications Based on Transfer Learning Approach
An Improved Multiple Face Recognition System for Crowd Monit...
收藏 引用
International Conference on 6G Communications Networking and Signal Processing, SGCNSP 2023
作者: Jayasree, M. Sunitha, K.A. Brindha, A. Punna, Rajasekhar Aravamuthan, G. Retnakumar, G. Joselin Department of Electronics and Instrumentation Engineering College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Chennai603203 India Department of Electronics and Communication Engineering School of Engineering and Sciences SRM University Mangalagiri Andhra Pradesh Amaravati522502 India Security Electronics and Cyber Technology Division Bhabha Atomic Research Centre Anushakti Nagar Maharashtra Mumbai400085 India
The real-time Face Recognition (FR) techniques are limited to situations where only one face is visible in close proximity to the camera. Sometimes, the people under surveillance may not be directly facing the camera ... 详细信息
来源: 评论
An NTT/INTT Accelerator with Ultra-High Throughput and Area Efficiency for FHE  24
An NTT/INTT Accelerator with Ultra-High Throughput and Area ...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Lu, Zhaojun Yu, Weizong Xu, Peng Wang, Wei Zhang, Jiliang Feng, Dengguo Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Hust Wuhan JinYinHu Laboratory Hubei Wuhan China School of Cyber Science and Engineering Hust Hubei Wuhan China School of Computer Science and Technology Hust Hubei Wuhan China Hnu Hunan Changsha China State Key Laboratory of Cryptology Beijing China
As a core arithmetic operation and security guarantee of Fully Homomorphic Encryption (FHE), Number Theoretic Transform (NTT) of a large degree is the primary source of computational and time overhead. In this paper, ... 详细信息
来源: 评论