咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是91-100 订阅
排序:
Deep CNN based brain tumor detection in intelligent systems
收藏 引用
International Journal of Intelligent Networks 2024年 第1期5卷 30-37页
作者: Gupta, Brij B. Gaurav, Akshat Arya, Varsha International Center for AI and Cyber Security Research and Innovations & Department of Computer Science and Information Engineering Asia University Taiwan Taichung413 Taiwan Ronin Institute MontclairNJ United States Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Symbiosis International University Pune India School of Computing Skyline University College P.O. Box 1797 Sharjah United Arab Emirates Department of Business Administration Asia University Taiwan Taiwan Dehradun India
The early detection of brain tumor is crucial for effective treatment and improved patient prognosis in Industrial information Systems. This research introduces a novel computational model employing a three-layer Conv... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
An IoT-Based Air Pollution Monitoring System for Smart City  4
An IoT-Based Air Pollution Monitoring System for Smart City
收藏 引用
4th International Conference on computer Systems, ICCS 2024
作者: Aubakirov, Alibek Makhanov, Kanat Issainova, Aliya Glazyrina, Natalya Razkhova, Bibigul Satybaldina, Dina School of Computer Science Hangzhou Dianzi University Hangzhou China Electronics and Telecommunications L.N Gumilyov Eurasian National University Department of Radio Engineering Astana Kazakhstan L.N. Gumilyov Eurasian National University Information Security Department Astana Kazakhstan L.N Gumilyov Eurasian National University Computer and Software Engineering Department Astana Kazakhstan L.N. Gumilyov Eurasian National University Department of Artificial Astana Kazakhstan Information Security and Cryptology Research Institute L.N. Gumilyov Eurasian National University Astana Kazakhstan
In this paper, we present the results of research on the design and development of a gas analytical unit, an electronic nose, with an autonomous power supply, as well as the function of wireless data transmission via ... 详细信息
来源: 评论
Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 9355-9381页
作者: Sharma, Amit Gupta, Brij B. Singh, Awadhesh Kumar Saraswat, V.K. Department of Computer Engineering National Institute of Technology Kurukshetra Kurukshetra136119 India International Center for AI and Cyber Security Research and Innovations Department of Computer Science and Information Engineering Asia University Taichung Taiwan NITI Aayog New Delhi110001 India Lebanese American University Beirut Lebanon School of Computing Skyline University College Sharjah United Arab Emirates Department of Computer Engineering National Institute of Technology Kurukshetra Kurukshetra India Birkbeck University of London London United Kingdom
In today’s cyber warfare realm, every stakeholder in cyberspace is becoming more potent by developing advanced cyber weapons. They have equipped with the most advanced malware and maintain a hidden attribution. The p... 详细信息
来源: 评论
Optimizing Patient Outcomes with AI and Predictive Analytics in Healthcare  65
Optimizing Patient Outcomes with AI and Predictive Analytics...
收藏 引用
65th IEEE Annual International Scientific Conference on Power and Electrical engineering of Riga Technical University, RTUCON 2024
作者: Janjua, Jamshaid Iqbal Ghazal, Taher M. Abushiba, Walid Abbas, Sagheer Lahore Pakistan College of Arts & Science Applied Science University P.O.Box 5055 Manama Bahrain Center for Cyber Security Faculty of Information Science and Technology Selangor Bangi43600 Malaysia College of Engineering Applied Science University Bahrain PMU Department of Computer Science Al Khobar Saudi Arabia
Healthcare's integration with the emerging artificial intelligence, predictive analytics and health information exchange (HIE) system is currently undergoing a revolution. These emerging technologies are offering ... 详细信息
来源: 评论
Set Stabilization of Large-Scale Stochastic Boolean Networks:A Distributed Control Strategy
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第3期11卷 806-808页
作者: Lin Lin Jinde Cao Jianquan Lu Leszek Rutkowski the Department of Mechanical Engineering the University of Hong KongHong Kong China the School of Mathematics Southeast UniversityNanjing 210096China IEEE the School of Mathematics and the Frontiers Science Center for Mobile Information Communication and Security Southeast UniversityNanjing 210096China the School of Mathematics the Southeast UniversityNanjing 210096 the School of Electronic Information and Electrical Engineering Chengdu UniversityChengdu 610106China the Systems Research Institute of the Polish Academy of Sciences Warsaw 01-447 the Institute of Computer Science AGH University of Science and TechnologyKraków 30-059 the Information Technology Institute University of Social SciencesŁódź90-113Poland
Dear Editor,This letter deals with the set stabilization of stochastic Boolean control networks(SBCNs)by the pinning control strategy,which is to realize the full control for systems by imposing control inputs on a fr... 详细信息
来源: 评论
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论
Fuzzing JavaScript Engines with Diversified Mutation Strategies  1
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Shie, Cheng-Han Fang, Pin-Huang Fan, Chun-I Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung804201 Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung804201 Taiwan Intelligent Electronic Commerce Research Center National Sun Yat-sen University Kaohsiung804201 Taiwan
Current fuzzers for JavaScript (JS) engines often produce test cases that are syntactically correct but semantically incorrect, hindering efficient crash discovery. To address this issue, we propose three mutation met... 详细信息
来源: 评论
Transforming Cybersecurity in the Digital Era: The Power of AI  2
Transforming Cybersecurity in the Digital Era: The Power of ...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Mahfuri, Mahmoud Ghwanmeh, Sameh Almajed, Rsha Alhasan, Waseem Salahat, Mohammed Lee, Jin Hie Ghazal, Taher M. International University For Science And Technology Computer And Information Technology Department Damascus Syria American University In The Emirates Department Of Computer Scienc Dubai United Arab Emirates School Of Computer Science And Informatics De Montfort University Dubai Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates Miracle Clinic Seoul Korea Republic of Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
In the midst of the digital revolution of the 21st century, cybersecurity has come to be a primary social situation, requiring revolutionary and Innovative solution. To find the proper answer for this pressing demand,... 详细信息
来源: 评论
Augmented Reality for Enhanced Surgical Precision: A Framework for Real-Time Visualization and Navigation  1
Augmented Reality for Enhanced Surgical Precision: A Framewo...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Singh, Jagbir Vedula, Jagadeesh Ragothaman, Hariharan Muzaffar, Shojonov Yulduz, Urazbaeva Singh, Satendra Pratap India Digital Transformation Lead Meghaz Inc. HoustonTX United States Center of Urgench State University The Information Security department The Digital Education Technologies Uzbekistan Mamun university Pedagogy and psychology Department Khiva Uzbekistan Tula's Institute Department of Computer Science and Engineering Dehradun India
The advancement of Augmented reality (AR) technology has made it possible to use it in surgical precision and better the lives of patients. This paper outlines a real-time visualization and navigation framework where ... 详细信息
来源: 评论