咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是281-290 订阅
排序:
Disruptive IoT-Based Healthcare Insurance Business Model
Disruptive IoT-Based Healthcare Insurance Business Model
收藏 引用
IEEE International Conference on Computational Science and engineering, CSE
作者: Maryam Al Thawadi Farag Sallabi Mamoun Awad Khaled Shuaib Dept. of Information Systems and Security UAE University Al Ain UAE Dept. of Computer and Network Engineering UAE University Al Ain UAE Dept. of Computer Science and Software Engineering UAE University Al Ain UAE
information revolution and technology growth have made a considerable contribution to restraining the cost expansion and empowering the customer. They disrupted most business models in different industries. The custom... 详细信息
来源: 评论
Data Leakage Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques  6
Data Leakage Prevention for Data in Transit using Artificial...
收藏 引用
6th IEEE International Conference on Advances in Computing, Communication and Control, ICAC3 2019
作者: Ghouse, Mohammed Nene, Manisha J. VembuSelvi, C. DM Network and Cyber Security Bharat Electronics Limited Bangalore India Defense Institute of Advanced Technology Dept. of Computer Science and Engineering Pune India MRS Cyber Security Central Research Laboratory BEL Bangalore India
Data leakage in an organization is a very important concern that leads to the ex-filtration of data, The work in this paper addresses a novel concept for prevention of data leakage for data in transit. The text under ... 详细信息
来源: 评论
Efficient Context-aware File System Approach
Efficient Context-aware File System Approach
收藏 引用
International Conference on Software Defined systems (SDS)
作者: Abdul Razaque Fathi Amsaad Muder Almiani Wan Xiaoya Li Shiyu Raouf Ganda Majdi Rawashdeh Amer AlRahayfeh Dept. of Computer Engineering and Telecommunication School of Information Security Eastern Michigan University US College of Information Technology Al-Hussein Bin Talal University Jordan Dept. of Computer Science NYIT Nanjing China Yale School of Management Yale University USA Department of Business Information Technology Princess Sumaya University for Technology Amman Jordan
With the rapid development of science and technology, wireless networks are now widely used throughout the world. Given the requirement to improve the usability of computers, a context-aware file system has been rende... 详细信息
来源: 评论
WaveTTS: Tacotron-based TTS with joint time-frequency domain loss
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Rui Sisman, Berrak Bao, Feilong Gao, Guanglai Li, Haizhou Inner Mongolia University China Dept. of Electrical and Computer Engineering National University of Singapore Singapore Information Systems Technology and Design Singapore University of Technology and Design Singapore
Tacotron-based text-to-speech (TTS) systems directly synthesize speech from text input. Such frameworks typically consist of a feature prediction network that maps character sequences to frequency-domain acoustic feat... 详细信息
来源: 评论
A Research on the Vulnerabilities of PLC using Search Engine
A Research on the Vulnerabilities of PLC using Search Engine
收藏 引用
International Conference on information and Communication Technology Convergence (ICTC)
作者: Thummim Lee Sangwon Kim Keechoen Kim Dept. of IT congervence security Konkuk Univ. Seoul Korea Dept. of Computer Information & Communications Engineering Konkuk Univ. Seoul Korea Dept. of Computer Science & Engineering Konkuk Univ. Seoul Korea
The development and convergence of information and communication technologies have been leading to various studies on big data, artificial intelligence, internet of things, and smart cars to be introduced to our daily... 详细信息
来源: 评论
Extending signature-based intrusion detection systems with Bayesian abductive reasoning
arXiv
收藏 引用
arXiv 2019年
作者: Ganesan, Ashwinkumar Parameshwarappa, Pooja Peshave, Akshay Chen, Zhiyuan Oates, Tim Dept. of Computer Science & Electrical Engineering UMBC Maryland United States Dept. Of Information Systems UMBC Maryland United States
Evolving cybersecurity threats are a persistent challenge for system administrators and security experts as new malwares are continually released. Attackers may look for vulnerabilities in commercial products or execu... 详细信息
来源: 评论
FedPAQ: A communication-efficient federated learning method with periodic averaging and quantization
arXiv
收藏 引用
arXiv 2019年
作者: Reisizadeh, Amirhossein Mokhtari, Aryan Hassani, Hamed Jadbabaie, Ali Pedarsani, Ramtin Dept. of Electrical & Computer Engineering University of California Santa Barbara United States Dept. of Electrical & Computer Engineering University of Texas at Austin Dept. of Electrical & Systems Engineering University of Pennsylvania Laboratory for Information & Decision Systems Massachusetts Institute of Technology
Federated learning is a distributed framework according to which a model is trained over a set of devices, while keeping data localized. This framework faces several systems-oriented challenges which include (i) commu... 详细信息
来源: 评论
Bayesian Neural networks Uncertainty Quantification with Cubature Rules
Bayesian Neural Networks Uncertainty Quantification with Cub...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Peng Wang Nidhal C. Bouaynaya Lyudmila Mihaylova Jikai Wang Qibin Zhang Renke He Automatic Control & Systems Engineering Dept. The University of Sheffield Information and Navigation College Air Force Engineering University The 32nd Research Institute of CETC Department of Automation University of Science and Technology of China Department of Electrical and Computer Engineering Rowan University
Bayesian neural networks are powerful inference methods by accounting for randomness in the data and the network model. Uncertainty quantification at the output of neural networks is critical, especially for applicati... 详细信息
来源: 评论
Heuristic Approach Towards Countermeasure Selection using Attack Graphs
arXiv
收藏 引用
arXiv 2019年
作者: Stan, Orly Bitton, Ron Ezrets, Michal Dadon, Moran Elovici, Yuval Shabtai, Asaf Inokuchi, Masaki Ohta, Yoshinobu Yagyu, Tomohiko Dept. of Software and Information Systems Engineering Ben-Gurion University of Negev Security Research Laboratories NEC Corporation
Selecting the optimal set of countermeasures is a challenging task that involves various considerations and tradeoffs such as prioritizing the risks to mitigate and costs. The vast majority of studies for selecting a ... 详细信息
来源: 评论
Determining the coordinates of objects detected by a 1Tx + 4Rx antenna system using an artificial neural network;free space case
Determining the coordinates of objects detected by a 1Tx + 4...
收藏 引用
International Workshop on Advanced Ground Penetrating Radar (IWAGPR)
作者: Vadym Plakhtii Gennadiy Pochanin Pierluigi Falorni Vadym Ruban Timothy Bechtel Luca Bossi School of Radio Physics Biomedical Electronics and Computer Systems V.N. Karazin Kharkiv National University Kharkiv Ukraine Department of Radiophysical Introscopy O.Ya.Usikov Institute for Radiophysics and Electronics of NAS of Ukraine Kharkiv Ukraine Department of Information Engineering Universit&#x00E0 degli Studi di Firenze Florence Italy Dept. of Earth &amp Environment Franklin &amp Marshall College Lancaster PA USA
We investigated the implementation of artificial neural networks in the detection and discrimination of landmines and similar objects. The experimental data were obtained by using impulse GPR with a 1 Tx + 4Rx antenna... 详细信息
来源: 评论