咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是101-110 订阅
排序:
Fractional Fourier Transform-Based OFDM System with low complexity equalizer for Underwater Acoustic Communications  25
Fractional Fourier Transform-Based OFDM System with low comp...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Attar, Hani Ababneh, Jafar Rachini, Ali Bahy, Ramy M. Hafez, Mohamed Solyman, Ahmed Zarqa University Faculty of Engineering Zarqa Jordan Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Department of Computer Science and Information Technology Jounieh Lebanon Technical Research Center Cairo Egypt Feqs INTI-IU-University Faculty of Engineering Nilai Malaysia Glasgow Caledonian University School of Computing Engineering and Built Environment Glasgow United Kingdom
Underwater communication systems have garnered significant interest due to the limitations of the wireless spectrum and the growing need for sustained, covert communication capabilities. However, existing systems face... 详细信息
来源: 评论
Leveraging OpenStack-based Private Cloud for Intrusion Detection Using Deep Learning Techniques
Leveraging OpenStack-based Private Cloud for Intrusion Detec...
收藏 引用
Women in Computing (InCoWoCo), International Conference for
作者: Rahul Roshan G Vishal S Salanke Nagasundari S Department of Computer Science and Engineering Research Center for Information Security Forensics and Cyber Resilience PES University Bangalore India
OpenStack is a cloud platform that offers infrastructure services, providing access to computing, storage, and network resources. However, due to its open-source nature, the cloud environment can be vulnerable to secu... 详细信息
来源: 评论
A Survey on Backdoor Threats in Large Language Models (LLMs): Attacks, Defenses, and Evaluations
arXiv
收藏 引用
arXiv 2025年
作者: Zhou, Yihe Ni, Tao Lee, Wei-Bin Zhao, Qingchuan Department of Computer Science City University of Hong Kong Hong Kong Information Security Center Hon Hai Research Institute China Department of Information Engineering and Computer Science Feng Chia University China
Large Language Models (LLMs) have achieved significantly advanced capabilities in understanding and generating human language text, which have gained increasing popularity over recent years. Apart from their state-of-... 详细信息
来源: 评论
An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Meter Using Fuzzing Testing
An Evaluation of Cybersecurity Risks of DLMS/COSEM Smart Met...
收藏 引用
2022 IET International Conference on engineering Technologies and Applications, IET-ICETA 2022
作者: Wang, Chien-Lung Shih, Jou-An Liao, I-En Chien, Chun-Tsai Nchu National Chung Hsing University Taiwan Information Security Center Taiwan National Chung Hsing University Department of Computer Science and Engineering Taiwan
Since smart meters are IoT devices that can share energy usage information to users and third-party service providers, any vulnerability of smart meters that can be exploited by hackers is a threat to the reliability ... 详细信息
来源: 评论
Block-based fine-grained and publicly verifiable data deletion for cloud storage: Block-based fine-grained and publicly verifiable..: C. Yang et al.
收藏 引用
Soft Computing 2024年 第21期28卷 12491-12506页
作者: Yang, Changsong Liu, Yueling Ding, Yong Wu, Yongqiang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education 999077 Hong Kong Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin541004 China School of Computer Guangdong University of Science & Technology Dongguan523083 China South China Technical Support Department Topsec Network Technology Inc. Guangzhou510000 China
One of the most important services provided by cloud service providers (CSPs), cloud storage is economically attractive and can provide on-demand data storage service to resource-constrained tenants in the manner of p... 详细信息
来源: 评论
Counting Answers to Unions of Conjunctive Queries: Natural Tractability Criteria and Meta-Complexity
收藏 引用
Proceedings of the ACM on Management of Data 2024年 第2期2卷 1-17页
作者: Jacob Focke Leslie Ann Goldberg Marc Roth Stanislav Zivný CISPA Helmholtz Center for Information Security Saarbrücken Germany Department of Computer Science University of Oxford Oxford United Kingdom Department of Computer Science University of Oxford & School of Electronic Engineering and Computer Science Queen Mary University of London Oxford United Kingdom
We study the problem of counting answers to unions of conjunctive queries (UCQs) under structural restrictions on the input query. Concretely, given a class C of UCQs, the problem #UCQ (C) provides as input a UCQ Ψ ... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
Detection of Crucial Power Side Channel Data Leakage in Neural Networks  33
Detection of Crucial Power Side Channel Data Leakage in Neur...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Satar, Nurhizam Safie Mohd Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Fadhil, Saif Aamer Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Integrated Work Package KBR SouthbankVIC Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
Neural network (NN) accelerators are now extensively utilized in a range of applications that need a high degree of security, such as driverless cars, NLP, and image recognition. Due to privacy issues and the high cos... 详细信息
来源: 评论
Modular Extremely Large-Scale Array Communication:Near-Field Modelling and Performance Analysis
收藏 引用
China Communications 2023年 第4期20卷 132-152页
作者: Xinrui Li Haiquan Lu Yong Zeng Shi Jin Rui Zhang National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and SecuritySoutheast UniversityNanjing 210096China Purple Mountain Laboratories Nanjing 211111China The Chinese University of Hong Kong Shenzhen Research Institute of Big DataShenzhen 518172China Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore
This paper investigates the wireless communication with a novel architecture of antenna arrays,termed modular extremely large-scale array(XLarray),where array elements of an extremely large number/size are regularly m... 详细信息
来源: 评论
Dorsal Hand Vascular Imaging System
Dorsal Hand Vascular Imaging System
收藏 引用
2024 IEEE Ural-Siberian Conference on Biomedical engineering, Radioelectronics and information Technology, USBEREIT 2024
作者: Mizinov, Pavel V. Konnova, Natalia S. Kravchenko, Oleg V. Egorov, Dobroslav P. Osipenko, Gavriil V. Bauman Moscow State Technical University Department Of Information Security Moscow Russia Computer Science And Control Of Ras Federal Research Center Moscow Russia Kotel'nikov Institute Of Radio Engineering And Electronics Of Ras Moscow Russia Moscow Aviation Institute Moscow Russia
Biometric identification methods using vascular modalities (vein pattern of the finger, wrist, ventral and dorsal part of the metacarpal) use near infrared (NIR) illumination to obtain an image of the vein pattern. Th... 详细信息
来源: 评论