咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 3 册 图书

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 32 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 9 篇 信息与通信工程
    • 7 篇 生物工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 3 篇 电气工程
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 控制科学与工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
  • 19 篇 理学
    • 11 篇 数学
    • 7 篇 生物学
    • 3 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 6 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 2 篇 法学
    • 2 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 4 篇 network security
  • 3 篇 mobile and netwo...
  • 3 篇 cryptology
  • 2 篇 internet of thin...
  • 2 篇 support vector m...
  • 2 篇 deep learning
  • 2 篇 machine learning
  • 2 篇 computer systems...
  • 2 篇 systems and data...
  • 1 篇 random walk
  • 1 篇 data security
  • 1 篇 routing
  • 1 篇 data privacy
  • 1 篇 attack detection
  • 1 篇 privacy-preservi...
  • 1 篇 port scan
  • 1 篇 anomaly detectio...
  • 1 篇 insulin
  • 1 篇 non-iid problem
  • 1 篇 predictive analy...

机构

  • 4 篇 kanpur
  • 3 篇 college of compu...
  • 2 篇 school of comput...
  • 2 篇 centre for cyber...
  • 2 篇 state key labora...
  • 2 篇 guizhou xishan t...
  • 2 篇 college of compu...
  • 2 篇 school of data s...
  • 2 篇 key laboratory o...
  • 1 篇 vit bhopal unive...
  • 1 篇 univ sci & techn...
  • 1 篇 university of sc...
  • 1 篇 sardar patel uni...
  • 1 篇 department of me...
  • 1 篇 masaryk univ fac...
  • 1 篇 shandong women's...
  • 1 篇 singapore univer...
  • 1 篇 department of ec...
  • 1 篇 delhi technologi...
  • 1 篇 shandong prov ke...

作者

  • 8 篇 shukla varun
  • 3 篇 choudhary arjun
  • 3 篇 tian youliang
  • 3 篇 xiong jinbo
  • 2 篇 srivastava atul
  • 2 篇 jinbo xiong
  • 2 篇 amrita
  • 2 篇 youliang tian
  • 1 篇 kaur jaspreet
  • 1 篇 nazarov alexey
  • 1 篇 liu zhe
  • 1 篇 jianying zhou
  • 1 篇 sun lihua
  • 1 篇 jing shan
  • 1 篇 mu xianyu
  • 1 篇 mansouri houssem
  • 1 篇 bimal kumar roy
  • 1 篇 judice antony
  • 1 篇 pandey rashmikir...
  • 1 篇 gupta megha

语言

  • 45 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=International Conference on. Cryptology and Network Security with Machine Learning, ICCNSML 2023"
48 条 记 录,以下是41-50 订阅
排序:
A Verifiable Privacy-Preserving Outsourced Prediction.Scheme Based on.Blockchain in Smart Healthcare
A Verifiable Privacy-Preserving Outsourced Prediction Scheme...
收藏 引用
international conference on.e-health networking, Application. and Services (HealthCom)
作者: Ta Li Youliang Tian Jinbo Xion. Linjie Wang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Data Science Tongren University Tongren China
The swift progression.of the Internet of Things and the extensive integration.of machine learning have spurred the growth of intelligent healthcare. Many intelligent healthcare devices, limited by their own computing ...
来源: 评论
A Review Study of AI Enabled Computer network
A Review Study of AI Enabled Computer Network
收藏 引用
international conference on.Smart Systems and Inventive Technology (ICSSIT)
作者: Mohsina Mirza Kanagaraj Venusamy Mohd Akbar S. Kannadhasan Anton. Judice S. Ganesh Department of ECE Shri Jagdishprasad Jhabarmal Tibrewala University Rajasthan India Department of Mechatronics Rajalakshmi Engineering College Chennai India Department of Information Technology University of Technology and Applied Sciences-Muscat Sultanate of Oman Department of Electronics and Communication Engineering Study World College of Engineering Coimbatore India Department of Engineering University of Technology and Applied Sciences-Ibri Sultanate of Oman
With the advent of pandemic the role of digital communication.and in particular computer networks in day to day life has become very predominant and crucial, this has in turn increased the network usage and traffic le... 详细信息
来源: 评论
Efficient and Privacy-Preserving Neural network Prediction.Scheme with TEE
Efficient and Privacy-Preserving Neural Network Prediction S...
收藏 引用
IEEE international conference on.Communication. (ICC)
作者: Xingdon. Liu Hui Zhu Fengwei Wang Yandon. Zheng Zhe Liu State Key Laboratory of Integrated Services Networks Xidian University Xi'an China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China
With the rapid development of machine learning, MLaaS has infiltrated into many fields such as image recognition. natural language processing, medical diagnosis, and so on. However, in MLaaS, data interaction.between ...
来源: 评论
Deep learning with Con.ition.l Generative Adversarial network Based Intrusion.Detection.System on.Balanced Data
Deep Learning with Conditional Generative Adversarial Networ...
收藏 引用
Electron.cs and Sustainable Communication.Systems (ICESC), 2020 international conference on
作者: K. Hemavathi R. Latha Dept. of Computer Science St. Peter’s Institute of Higher Education and Research Chennai
networks have an important role to play in modern life, and cyber security is an active research area. An Intrusion.Detection.System (IDS) becomes a crucial cyber security method that mon.tored the state of hardware a...
来源: 评论
An Overview of security Intelligence in IoT Application. with learning Approaches  3rd
An Overview of Security Intelligence in IoT Applications wit...
收藏 引用
3rd international conference on.machine Intelligence and Smart Systems, MISS 2023
作者: Shukla, Tuhin Mishra, Nishchol School of Information Technology Rajiv Gandhi Proudyogiki Vishwavidalya MP Bhopal462033 India
Tradition.l inanimate objects are given new life and interactivity thanks to the Internet of Things. Sensors that can detect and identify their surroundings are becoming more widespread in everyday electron.cs as we g... 详细信息
来源: 评论
Information.security  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Elias Athanasopoulos Bart Mennink
This book con.titutes the proceedings of the 26th international conference on.Information.security, ISC 2023, which took place in Gron.ngen, The Netherlands, in November 2023.;The 29 full papers presented in this volu... 详细信息
来源: 评论
Applied Cryptography and network security Workshops  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Jianying Zhou Lejla Batina Stjepan Picek Zengpeng Li Jingqiang Lin Eleon.ra Losiouk Suryadipta Majumdar Daisuke Mashima Weizhi Meng Mohammad Ashiqur Rahman Jun Shao Masaki Shimaoka Ezekiel Soremekun Chunhua Su Je Sen Teh Aleksei Udovenko Con. Wang Leo Zhang Yury Zhauniarovich
This book con.titutes the proceedings of the satellite workshops held around the 21st international conference on.Applied Cryptography and network security, ACNS 2023, held in Kyoto, Japan, in June 2023.;·  ... 详细信息
来源: 评论
cryptology and network security with machine learning  1
收藏 引用
丛书名: Algorithms for Intelligent Systems
1000年
作者: Bimal Kumar Roy Atul Chaturvedi Boaz Tsaban Sartaj Ul Hasan
The book features original papers from international conference on.cryptology & network security with machine learning (iccnsml 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This con.erenc... 详细信息
来源: 评论