咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是291-300 订阅
排序:
Challenges in cybersecurity: Lessons from biological defense systems
arXiv
收藏 引用
arXiv 2021年
作者: Schrom, Edward Kinzig, Ann Forrest, Stephanie Graham, Andrea L. Levin, Simon A. Bergstrom, Carl T. Castillo-Chavez, Carlos Collins, James P. De Boer, Rob J. Doupé, Adam Ensafi, Roya Feldman, Stuart Grenfell, Bryan T. Halderman, J. Alex Huijben, Silvie Maley, Carlo Moses, Melanie Perelson, Alan S. Perrings, Charles Plotkin, Joshua Rexford, Jennifer Tiwari, Mohit Department of Ecology and Evolutionary Biology Princeton University 106A Guyot Hall PrincetonNJ08544 United States School of Life Sciences Arizona State University TempeAZ85287 United States Julie Ann Wrigley Global Institute of Sustainability Arizona State University TempeAZ85287 United States Biodesign Center for Biocomputation Security and Society Arizona State University TempeAZ85287 United States School of Computing Informatics and Decision Sciences Engineering Arizona State University TempeAZ85287 United States Santa Fe Institute Santa FeNM87501 United States Department of Biology University of Washington SeattleWA98195 United States Arizona State University TempeAZ85287 United States Theoretical Biology and Bioinformatics Utrecht University Utrecht3584 CH Netherlands Center for Cybersecurity and Digital Forensics Global Security Initiative Arizona State University TempeAZ85287 United States Department of Electrical Engineering and Computer Science Computer Science and Engineering Division University of Michigan Ann ArborMI48109 United States Schmidt Futures New YorkNY10011 United States Princeton School of Public and International Affairs Princeton University PrincetonNJ08544 United States Center for Computer Security and Society University of Michigan Ann ArborMI48109 United States Center for Evolution and Medicine School of Life Sciences Arizona State University TempeAZ85287 United States Arizona Cancer Evolution Center Arizona State University TempeAZ85287 United States Department of Computer Science University of New Mexico AlbuquerqueNM87131 United States University of New Mexico Department of Computer Science AlbuquerqueNM87131 United States Department of Biology University of New Mexico AlbuquerqueNM87131 United States Theoretical Biology and Biophysics Group Los Alamos National Laboratory Los AlamosNM87545 United States Department of Biology University of Pennsylvania PhiladelphiaPA19104 Unite
We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and h... 详细信息
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论
Tongue image segmentation via color decomposition and thresholding
Tongue image segmentation via color decomposition and thresh...
收藏 引用
作者: Li, Zuoyong Yu, Zhaochai Liu, Weixia Xu, Yong Zhang, Daoqiang Cheng, Yong Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China The Fujian College's Research Base of Humanities and Social Science for Internet Innovation Research Center Minjiang University Fuzhou350121 China Straits Institute Minjiang University Fuzhou350121 China Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology Shenzhen518055 China Department of Computer Science and Engineering Nanjing University of Aeronautics and Astronautics Nanjing210016 China School of Communication Engineering Nanjing Institute of Technology Nanjing211167 China
Tongue image segmentation is a crucial step in developing an automatic tongue diagnosis system. After exploring characteristics of image thresholding in different color spaces, we propose a simple and effective tongue... 详细信息
来源: 评论
A generic transformation to enable optimal repair in MDS codes for distributed storage systems
A generic transformation to enable optimal repair in MDS cod...
收藏 引用
作者: Li, Jie Tang, Xiaohu Tian, Chao Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan430062 China Department of Electrical Engineering and Computer Science University of Tennessee KnoxvilleTN37996 United States Department of Electrical and Computer Engineering Texas A and M University College StationTX77843 United States
We propose a generic transformation that can convert any nonbinary (n=k{+}r,k)maximum distance separable (MDS) code into another (n,k) MDS code over the same field such that: 1) some arbitrarily chosen r nodes have th... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
Coherence-based automated essay scoring using self-attention  17th
Coherence-based automated essay scoring using self-attention
收藏 引用
17th China National Conference on Computational Linguistics, CCL 2018 and 6th International Symposium on Natural Language Processing Based on Naturally Annotated Big Data, NLP-NABD 2018
作者: Li, Xia Chen, Minping Nie, Jianyun Liu, Zhenxing Feng, Ziheng Cai, Yingdan Key Laboratory of Language Engineering and Computing Guangdong University of Foreign Studies Guangzhou China School of Information Science and Technology/School of Cyber Security Guangdong University of Foreign Studies Guangzhou China Department of Computer Science and Operations Research University of Montreal Montreal Canada
Automated essay scoring aims to score an essay automatically without any human assistance. Traditional methods heavily rely on manual feature engineering, making it expensive to extract the features. Some recent studi... 详细信息
来源: 评论
Energy-efficient cooperative secure transmission in multi-UAV enabled wireless networks
arXiv
收藏 引用
arXiv 2019年
作者: Hua, Meng Wang, Yi Wu, Qingqing Dai, Haibo Huang, Yongming Yang, Luxi School of Information Science and Engineering Southeast University Nanjing210096 China School of Electronics and Communication Engineering Zhengzhou University of Aeronautics Zhengzhou450046 China Physical Layer Security Laboratory National Digital Switching System Engineering and Technological Research Center Zhengzhou450002 China Department of Electrical and Computer Engineering National University of Singapore Singapore School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing210003 China
This paper investigates a multiple unmanned aerial vehicles (UAVs) enabled cooperative secure transmission scheme in the presence of multiple potential eavesdroppers. Specifically, multiple source UAVs (SUAVs) send co... 详细信息
来源: 评论
Performance Analysis of ZCC-Optical-CDMA over SMF for Fiber-To-The-Home Access Network
收藏 引用
Journal of Physics: Conference Series 2020年 第2期1529卷
作者: Alaan Ghazi S. A. Aljunid Alaa Fareed Syed Zulkarnain Syed Idrus C. B. M Rashidi Marwa albayaty Aras Al-dawoodi Ahmed M. Fakhrudeen School of Human Development & Techno Communication University Malaysia Perlis Malaysia School of Computer and Communication Engineering University Malaysia Perlis Malaysia Computer Technical Engineering Alkitab University Iraq Internet Research Laboratory School of Computing University Utara Malaysia Malaysia Computer Science Department College of Computer Science and Information Technology Kirkuk University Iraq Networks Department College of Computer Science and Information Technology Kirkuk University Iraq
To provide a sustainable fiber-to-the-home (FTTH), several multiplexing techniques have been developed for this purpose. The correlation features are the main obstacle behind the network performance limitation, which ...
来源: 评论
A chaotic artificial bee colony algorithm based on lévy search
A chaotic artificial bee colony algorithm based on lévy sea...
收藏 引用
作者: Lin, Shijie Dong, Chen Wang, Zhiqiang Guo, Wenzhong Chen, Zhenyi Ye, Yin College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Information Security of Network Systems Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China Department of Electrical Engineering University of South Florida TampaFL33620 United States
A Lévy search strategy based chaotic artificial bee colony algorithm (LABC) is proposed in this paper. The chaotic sequence, global optimal mechanism and Lévy flight mechanism were introduced respectively in... 详细信息
来源: 评论
Fast stochastic ordinal embedding with variance reduction and adaptive step size
arXiv
收藏 引用
arXiv 2019年
作者: Ma, Ke Zeng, Jinshan Xiong, Jiechao Xu, Qianqian Cao, Xiaochun Liu, Wei Yao, Yuan School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China School of Computer Information Engineering Jiangxi Normal University NanchangJiangxi330022 China Tencent AI Lab Shenzhen Guangdong China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China Department of Mathematics and by courtesy Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
—Learning representation from relative similarity comparisons, often called ordinal embedding, gains rising attention in recent years. Most of the existing methods are based on semi-definite programming (SDP), which ... 详细信息
来源: 评论