咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是181-190 订阅
排序:
IDTRSC: ID-based Traceable Ring Signcryption Framework for Data Sharing without Key Escrow
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wei, Jiannan Xie, Longyu Zhu, Qinchuan Gao, Yansong Yu, Keping Choo, Kim-Kwang Raymond Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China institute of State Key Laboratory of Cryptology P.O.Box 5159 Beijing100878 China Waseda University Global Information and Telecommunication Institute Shinjuku169-8050 Japan University of Texas San Antonio Department of Information Systems and Cyber Security San AntonioTX78249-0631 United States
The capability to share data across different entities is increasingly pronounced in our data-driven and centric society. However, we also have to ensure properties such as data confidentiality, unforgeability, anonym... 详细信息
来源: 评论
Towards improving detection performance for malware with a correntropy-based deep learning method
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 570-579页
作者: Xiong Luo Jianyuan Li Weiping Wang Yang Gao Wenbing Zhao School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing100083China Beijing Intelligent Logistics System Collaborative Innovation Center Beijing101149China China Information Technology Security Evaluation Center Beijing100085China Department of Electrical Engineering and Computer Science Cleveland State UniversityClevelandOH44115USA
With the rapid development of Internet of Things(IoT)technologies,the detection and analysis of malware have become a matter of concern in the industrial application of Cyber-Physical System(CPS)that provides various ... 详细信息
来源: 评论
A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Gao, Suo Iu, Herbert Ho-Ching Erkan, Ugur Simsek, Cemaleddin Toktas, Abdurrahim Cao, Yinghong Wu, Rui Mou, Jun Li, Qi Wang, Chunpeng Dalian Polytechnic University School of Information Science and Engineering Dalian116034 China The University of Western Australia School of Electrical Electronic and Computer Engineering Perth6009 Australia Faculty of Engineering Electrical and Electronics Engineering Respectively Karamanoglu Mehmetbey University Karaman70200 Turkey Ankara University Engineering Faculty Department of Artificial Intelligence and Data Engineering Ankara06830 Turkey Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan250000 China
Discrete chaotic systems based on memristors exhibit excellent dynamical properties and are more straightforward to implement in hardware, making them highly suitable for generating cryptographic keystreams. However, ... 详细信息
来源: 评论
Double-Blockchain Assisted Secure and Anonymous Data Aggregation for Fog-Enabled Smart Grid
收藏 引用
engineering 2022年 第1期8卷 159-169页
作者: Siguang Chen Li Yang Chuanxin Zhao Vijayakumar Varadarajan Kun Wang Jiangsu Key Lab of Broadband Wireless Communication and Internet of Things Nanjing University of Posts and TelecommunicationsNanjing 210003China Jiangsu Engineering Research Center of Communication and Network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003China Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal UniversityWuhu 241000China School of Computer Science and Engineering Vellore Institute of TechnologyChennai 600127India Department of Electrical and Computer Engineering University of CaliforniaLos AngelesCA 90095USA
As a future energy system,the smart grid is designed to improve the efficiency of traditional power systems while providing more stable and reliable ***,this efficient and reliable service relies on collecting and ana... 详细信息
来源: 评论
TrafPS: A Shapley-based Visual Analytics Approach to Interpret Traffic
arXiv
收藏 引用
arXiv 2024年
作者: Feng, Zezheng Jiang, Yifan Wang, Hongjun Fan, Zipei Ma, Yuxin Yang, Shuang-Hua Qu, Huamin Song, Xuan Department of Computer Science and Engineering Southern University of Science and Technology China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Computer Science University of Reading United Kingdom Center for Spatial Information Science The University of Tokyo Japan Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and Technology China
Recent achievements in deep learning (DL) have shown its potential for predicting traffic flows. Such predictions are beneficial for understanding the situation and making decisions in traffic control. However, most s... 详细信息
来源: 评论
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer
收藏 引用
ICT Express 2025年 第3期11卷 542-546页
作者: Gupta, Brij B. Gaurav, Akshat Alhalabi, Wadee Arya, Varsha Alharbi, Eman Chui, Kwok Tai Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan Department of Medical Research China Medical University Hospital China Medical University Taichung Taiwan Symbiosis Centre for Information Technology (SCIT) Symbiosis International University Pune India School of Cybersecurity Korea University Seoul South Korea Kyung Hee University 26 Kyungheedae-ro Dongdaemun-gu Seoul South Korea Ronin Institute Montclair NJ United States International Center for AI and Cyber Security Research and Innovations (CCRI) Asia University Taichung 413 Taiwan Department of Computer Science Immersive Virtual Reality Research Group King Abdulaziz University Jeddah Saudi Arabia Hong Kong Metropolitan University Hong Kong SAR China Center for Interdisciplinary Research University of Petroleum and Energy Studies (UPES) Dehradun India Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
The rapid growth of IoT devices has heightened the risk of botnet attacks, calling for scalable and distributed detection solutions. In this context, this study proposes a distributed optimization system for IoT attac... 详细信息
来源: 评论
MorphText: Deep Morphology Regularized Accurate Arbitrary-shape Scene Text Detection
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Chengpei Jia, Wenjing Wang, Ruomei Luo, Xiaonan He, Xiangjian Faculty of Engineering and IT University of Technology Sydney Australia The Department of Computer Science University of Nottingham Ningbo China School of Data and Computer Science National Engineering Research Center of Digital Life Sun Yat-sen University China The School of Computer Science and Information Security Guilin University of Electronic Technology China
Bottom-up text detection methods play an important role in arbitrary-shape scene text detection but there are two restrictions preventing them from achieving their great potential, i.e., 1) the accumulation of false t... 详细信息
来源: 评论
Generative AI-Enabled Quantum Encryption Algorithm for Securing IoT-Based Healthcare Application Using Blockchain
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Prajapat, Sunil Kumar, Pankaj Das, Ashok Kumar Muhammad, Ghulam Central University of Himachal Pradesh Srinivasa Ramanujan Department of Mathematics Dharamshala176215 India International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11543 Saudi Arabia
The integration of Artificial Intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbo... 详细信息
来源: 评论
Problems in NP Can Admit Double-Exponential Lower Bounds When Parameterized by Treewidth or Vertex Cover  51
Problems in NP Can Admit Double-Exponential Lower Bounds Whe...
收藏 引用
51st International Colloquium on Automata, Languages, and Programming, ICALP 2024
作者: Foucaud, Florent Galby, Esther Khazaliya, Liana Li, Shaohua Mc Inerney, Fionn Sharma, Roohani Tale, Prafullkumar Université Clermont Auvergne CNRS Mines Saint-Étienne Clermont Auvergne INP LIMOS Clermont-Ferrand63000 France Department of Computer Science and Engineering Chalmers University of Technology Gothenburg Sweden University of Gothenburg Sweden Technische Universität Wien Austria CISPA Helmholtz Center for Information Security Saarbrücken Germany University of Bergen Norway Indian Institute of Science Education and Research Pune India
Treewidth serves as an important parameter that, when bounded, yields tractability for a wide class of problems. For example, graph problems expressible in Monadic Second Order (MSO) logic and Quantified SAT or, more ... 详细信息
来源: 评论
On authenticated skyline query processing over road networks
On authenticated skyline query processing over road networks
收藏 引用
作者: Zhu, Xiaoyu Wu, Jie Chang, Wei Zakirul Alam Bhuiyan, Md Raymond Choo, Kim-Kwang Qi, Fang Liu, Qin Wang, Guojun School of Computer Science and Engineering Central South University Changsha China Center for Networked Computing Temple University PhiladelphiaPA United States Department of Computer and Information Sciences Saint Joseph's University PhiladelphiaPA United States Department of Computer Science Fordham University New York CityNY United States Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX United States School of Computer Science and Electronic Engineering Hunan University Changsha China School of Computer Science Guangzhou University Guangzhou China
In recent times, many location-based service providers (LBSPs) choose to outsource data query services to third-party cloud service providers (CSPs). This allows users to easily search for points of interests (POIs), ... 详细信息
来源: 评论