咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 11 篇 artificial intel...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 544 篇 英文
  • 20 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是311-320 订阅
排序:
Improving Defect Inspection Quality of Deep-Learning network in Dense Beans by Using Hough Circle Transform for Coffee Industry
Improving Defect Inspection Quality of Deep-Learning Network...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Cheng-Ju Kuo Ding-Chau Wang Tzu-Ting Chen Yung-Chien Chou Mao-Yuan Pai Gwo-Jiun Horng Min-Hsiung Hung Yu-Chuan Lin Tz-Heng Hsu Chao-Chun Chen Department of Computer Science and Information Engineering Institute of Manufacturing Information and Systems National Cheng Kung University (NCKU) Taiwan Dept. of Comp. Sci. & Info. Engr. Southern Taiwan University of Science and Technology (STUST) Taiwan General Research Service Center National Pingtung University of Science and Technology Taiwan Department of Computer Science and Information Engineering Chinese Culture University Taiwan
In this paper, we propose a novel Hough circle-assisting deep-network inspection scheme (HCADIS), aiming at identifying defects in dense coffee beans. The proposed HCADIS plays a critical role in a camera-based defect... 详细信息
来源: 评论
A study on authentication mechanism in SEaaS for SDN  11
A study on authentication mechanism in SEaaS for SDN
收藏 引用
11th International Conference on Ubiquitous information Management and Communication, IMCOM 2017
作者: Kim, Green An, Junghyun Kim, Keecheon Dept. of IT Convergence Information Security Konkuk University Seoul05029 Korea Republic of Dept. of Computer Engineering Konkuk University Seoul05029 Korea Republic of
SDN(Software Defined network) separates control plane from data plane(forwarding plane) which leads programmability of network and scalability, flexibility of existed network. nevertheless, the reason that security re... 详细信息
来源: 评论
Composite risk modeling for automated threat mitigation in medical devices  4
Composite risk modeling for automated threat mitigation in m...
收藏 引用
4th Modeling and Simulation in Medicine Symposium, MSM 2017, Part of the 2017 Spring Simulation Multi-Conference, SpringSim 2017
作者: Rao, Aakarsh Rozenblit, Jerzy Lysecky, Roman Sametinger, Johannes Dept. of Electrical and Computer Engineering University of Arizona TucsonAZ United States Dept. of Information Systems - Software Engineering Johannes Kepler University Linz Austria
Medical device security is a growing concern with increasing incorporation of complex software and hardware. security threats exploiting vulnerabilities in medical devices may directly impact patient safety. Standardi... 详细信息
来源: 评论
Towards Self-Explaining Digital systems: A Design Methodology for the Next Generation
Towards Self-Explaining Digital Systems: A Design Methodolog...
收藏 引用
IEEE International Verification and security Workshop (IVSW)
作者: Rolf Drechsler Christoph Lüth Goerschwin Fey Tim Güneysu Dept. Mathematics and Computer Science University of Bremen Bremen Germany Hamburg University of Technology (TUHH) Institute of Embedded Systems Hamburg Germany Dept. Electrical Engineering & Information Technology Ruhr-Universiat Bochum Bochum Germany
As digital systems get ever more complex, their behaviour may at times appear unfathomable. Users will only be prepared to accept this if they are convinced that the system does indeed work correctly. Thus, we argue t... 详细信息
来源: 评论
Genetic algorithm based patching scheme for worm containment on social network  17
Genetic algorithm based patching scheme for worm containment...
收藏 引用
32nd Annual ACM Symposium on Applied Computing, SAC 2017
作者: Kang, Donghwa Kim, Seoyeon Jung, Jinman Kim, Bongjae Min, Hong Heo, Junyoung Korea Internet and Security Agency Korea Republic of Dept. of Unmanned System Engineering Hannam University Daejeon Korea Republic of Dept. of Information and Communication Engineering Hannam University Daejeon Korea Republic of Dept. of Computer Science and Engineering Sun Moon University Asan Korea Republic of School of Computer Information Engineering Hoseo University Asan Korea Republic of Dept. of Computer Engineering Hansung University Seoul Korea Republic of
With the increasing number of online social networking site users, there is increasing cyber attacks on online social networks. Strong connectivity among users of the social networking site makes the information of in... 详细信息
来源: 评论
A compact tree representation of an antidictionary
A compact tree representation of an antidictionary
收藏 引用
作者: Ota, Takahiro Morita, Hiroyoshi Dept. of Computer and Systems Engineering Nagano Prefectural Institute of Technology Ueda-shi386-1211 Japan Dept. of Computer and Network Engineering Graduate School of Informatics and Engineering University of Electro-Communications Chofu-shi182-8585 Japan
In both theoretical analysis and practical use for an anti-dictionary coding algorithm, an important problem is how to encode an antidictionary of an input source. This paper presents a proposal for a com-pact tree re... 详细信息
来源: 评论
FUTURE-AI: International consensus guideline for trustworthy and deployable artificial intelligence in healthcare
arXiv
收藏 引用
arXiv 2023年
作者: Lekadir, Karim Feragen, Aasa Fofanah, Abdul Joseph Frangi, Alejandro F. Buyx, Alena Emelie, Anais Lara, Andrea Porras, Antonio R. Chan, An-Wen Navarro, Arcadi Glocker, Ben Botwe, Benard O. Khanal, Bishesh Beger, Brigit Wu, Carol C. Cintas, Celia Langlotz, Curtis P. Rueckert, Daniel Mzurikwao, Deogratias Fotiadis, Dimitrios I. Zhussupov, Doszhan Ferrante, Enzo Meijering, Erik Weicken, Eva González, Fabio A. Asselbergs, Folkert W. Prior, Fred Krestin, Gabriel P. Collins, Gary S. Tegenaw, Geletaw S. Kaissis, Georgios Misuraca, Gianluca Tsakou, Gianna Dwivedi, Girish Kondylakis, Haridimos Jayakody, Harsha Woodruf, Henry C. Mayer, Horst Joachim Aerts, Hugo JWL Walsh, Ian Chouvarda, Ioanna Buvat, Irène Tributsch, Isabell Rekik, Islem Duncan, James Kalpathy-Cramer, Jayashree Zahir, Jihad Park, Jinah Mongan, John Gichoya, Judy W. Schnabel, Julia A. Kushibar, Kaisar Riklund, Katrine Mori, Kensaku Marias, Kostas Amugongo, Lameck M. Fromont, Lauren A. Maier-Hein, Lena Alberich, Leonor Cerdá Rittner, Leticia Phiri, Lighton Marrakchi-Kacem, Linda Donoso-Bach, Lluís Martí-Bonmatí, Luis Cardoso, M. Jorge Bobowicz, Maciej Shabani, Mahsa Tsiknakis, Manolis Zuluaga, Maria A. Bielikova, Maria Fritzsche, Marie-Christine Camacho, Marina Linguraru, Marius George Wenzel, Markus De Bruijne, Marleen Tolsgaard, Martin G. Ghassemi, Marzyeh Ashrafuzzaman, Md Goisauf, Melanie Yaqub, Mohammad Abadía, Mónica Cano Mahmoud, Mukhtar M.E. Elattar, Mustafa Rieke, Nicola Papanikolaou, Nikolaos Lazrak, Noussair Díaz, Oliver Salvado, Olivier Pujol, Oriol Sall, Ousmane Guevara, Pamela Gordebeke, Peter Lambin, Philippe Brown, Pieta Abolmaesumi, Purang Dou, Qi Lu, Qinghua Osuala, Richard Nakasi, Rose Zhou, S. Kevin Napel, Sandy Colantonio, Sara Albarqouni, Shadi Joshi, Smriti Carter, Stacy Klein, Stefan Petersen, Steffen E. Aussó, Susanna Awate, Suyash Raviv, Tammy Riklin Cook, Tessa Mutsvangwa, Tinashe E.M. Rogers, Wendy A. Niessen, Wiro J. Puig-Bosch, Xènia Zeng, Yi Mohammed, Yunusa G. Aquino, Yves Saint James Salahuddin, Zohaib Starmans, Martijn P.A. Department de Matemàtiques i Informàtica Universitat de Barcelona Barcelona Spain Barcelona Spain DTU Compute Technical University of Denmark Kgs Lyngby Denmark Department of Mathematics and Computer Science Faculty of Science and Technology Milton Margai Technical University Freetown Sierra Leone Center for Computational Imaging & Simulation Technologies in Biomedicine Schools of Computing and Medicine University of Leeds Leeds United Kingdom Cardiovascular Science and Electronic Engineering Departments KU Leuven Leuven Belgium Institute of History and Ethics in Medicine Technical University of Munich Munich Germany Faculty of Engineering of Systems Informatics and Sciences of Computing Galileo University Guatemala City Guatemala Department of Biostatistics and Informatics Colorado School of Public Health University of Colorado Anschutz Medical Campus AuroraCO United States Department of Medicine Women’s College Research Institute University of Toronto Toronto Canada Universitat Pompeu Fabra BarcelonaBeta Brain Research Center Barcelona Spain Department of Computing Imperial College London London United Kingdom School of Biomedical & Allied Health Sciences University of Ghana Accra Ghana Department of Midwifery & Radiography School of Health & Psychological Sciences City University of London United Kingdom Kathmandu Nepal European Heart Network Brussels Belgium Department of Thoracic Imaging University of Texas MD Anderson Cancer Center Houston United States IBM Research Africa Nairobi Kenya Departments of Radiology Medicine and Biomedical Data Science Stanford University School of Medicine Stanford United States Institute for AI and Informatics in Medicine Klinikum rechts der Isar Technical University Munich Munich Germany Department of Computing Imperial College London London United Kingdom Muhimbili University of Health and Allied Sciences Dar es Salaam Tanzania United Republic of Ioannina Greece Almaty AI Lab Almaty Kazakhstan
Background: Despite major advances in artificial intelligence (AI) research for healthcare, the deployment and adoption of AI technologies remain limited in clinical practice. In recent years, concerns have been raise... 详细信息
来源: 评论
Syncgan: Synchronize the Latent Spaces of Cross-Modal Generative Adversarial networks
Syncgan: Synchronize the Latent Spaces of Cross-Modal Genera...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Wen-Cheng Chen Chien-Wen Chen Min-Chun Hu Dept. of Computer Science and Information Engineering National Cheng Kung University Taiwan Graduate Program of Multimedia Systems and Intelligent Computing National Cheng Kung University and Academia Sinica Taiwan
Generative adversarial network (GAN) has achieved impressive success on cross-domain generation, but it faces difficulty in cross-modal generation due to the lack of a common distribution between heterogeneous data. M... 详细信息
来源: 评论
Discovering communities of malapps on android-based mobile cyber-physical systems
arXiv
收藏 引用
arXiv 2018年
作者: Su, Dan Liu, Jiqiang Wang, Wei Wang, Xiaoyang Du, Xiaojiang Guizani, Mohsen Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing100044 China Dept. of Computer and Information Sciences Temple University PhiladelphiaPA19122 United States Dept. of Electrical and Computer Engineering University of Idaho MoscowID United States
Android-based devices like smartphones have become ideal mobile cyber-physical systems (MCPS) due to their powerful processors and variety of sensors. In recent years, an explosively and continuously growing number of... 详细信息
来源: 评论
Towards a cyber defense framework for SCADA systems based on power consumption monitoring  50
Towards a cyber defense framework for SCADA systems based on...
收藏 引用
50th Annual Hawaii International Conference on System Sciences, HICSS 2017
作者: Hernández, Jarilyn M. Chen, Qian Calhoun, Chelsea Sykes, Summer Nichols, Jerey A. Lane Dept. of Computer Science and Electrical Engineering West Virginia University United States Department of Engineering Computer Science Technology Savannah State University Cyber and Information Security Research Group Oak Ridge National Laboratory
Supervisory control and data acquisition (SCADA) systems are industrial automation systems that remotely monitor and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attacke... 详细信息
来源: 评论