咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是191-200 订阅
排序:
Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication
Secure Location-based Authenticated Key Establishment Scheme...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Saurabh Agrawal Anusha Vangala Ashok Kumar Das Neeraj Kumar Sachin Shetty Sajal K. Das Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computer Science Missouri University of Science and Technology Rolla Missouri USA Department of Computer Science and Engineering Thapar University Patiala India Department of Computational Modeling and Simulation Engineering Old Dominion University Suffolk Virginia USA
Maritime communication helps vessels and ports plan their movements, exchange environmental information, and communicate among themselves. The vessels' movement and changing location are critical to keep them secu... 详细信息
来源: 评论
Cutting-Edge Predictive Methods for Enhancing Short-Term Load Prediction
Cutting-Edge Predictive Methods for Enhancing Short-Term Loa...
收藏 引用
2024 International Conference on Electrical and computer engineering Researches, ICECER 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Abbas, Tahir Ateeq, Karamath College of Arts & Science Applied Science University P.O.Box 5055 Manama Bahrain Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of TIMES Institute Department of Computer Science Multan Pakistan School of Computing Skyline University College University City Sharjah Sharjah United Arab Emirates
Efficient management and cost-related factors in the power sector call for accurate short-term load forecasting as it enables better planning with the electric grid and achieving stability within it. This paper looks ... 详细信息
来源: 评论
Interactive multi-hypergraph inferring and channel-enhanced and attribute-enhanced learning for drug-related side effect prediction
收藏 引用
computers in Biology and Medicine 2025年 184卷 109321-109321页
作者: Xuan, Ping Wu, Shien Cui, Hui Li, Peiru Nakaguchi, Toshiya Zhang, Tiangang Department of Computer Science and Technology Shantou University Shantou China School of Cyberspace Security Hainan University Haikou China Department of Computer Science and Information Technology La Trobe University Australia Australian Centre for AI in Medical Innovation La Trobe University Australia School of Computer Science and Technology Heilongjiang University Harbin China Center for Frontier Medical Engineering Chiba University Japan
Identifying the potential side effects for the interested drugs can help reduce harm to patients caused by drugs in clinical use and decrease the risk of drug development failure. Multiple functionally similar drugs o... 详细信息
来源: 评论
Cyber security Threats on Digital Banking  1
Cyber Security Threats on Digital Banking
收藏 引用
1st International Conference on AI in Cybersecurity, ICAIC 2022
作者: Alzoubi, Haitham M. Ghazal, Taher M. Hasan, Mohammad Kamrul Alketbi, Asma Kamran, Rukshanda Al-Dmour, Nidal A. Islam, Shayla Skyline University College Sharjah United Arab Emirates Universiti Kebangsaan Faculty of Information Science and Technology Selangor Bangi43600 Malaysia School of Information Technology City Sharjah Sharjah United Arab Emirates Center for Cyber Security Faculty of Information Science & Technology Selangor Malaysia Faculty of Compter Science and Information Technology Universiti Sarawak Malaysia College of Engineering Mutah University Department of Computer Engineering Al-Karak Jordan Ucsi University Institute of Computer Science and Digital Innovation Malaysia
Digital banking is the new form of banking that involves using the internet and mobile applications and excludes the use of pen and paper. One of the main issues that are associated with the form of banking is the pre... 详细信息
来源: 评论
Securing Smart Cities Using Blockchain Technology  1
Securing Smart Cities Using Blockchain Technology
收藏 引用
1st International Conference on AI in Cybersecurity, ICAIC 2022
作者: Ghazal, Taher M. Hasan, Mohammad Kamrul Alzoubi, Haitham M. Al Hmmadi, Mohammed Al-Dmour, Nidal A. Islam, Shayla Kamran, Rukshanda Mago, Beenu Skyline University College School of Information Technology City Sharjah Sharjah United Arab Emirates Center for Cyber Security Faculty of Information Science & Technology Selangor Malaysia Skyline University College Sharjah United Arab Emirates Mutah University College of Engineering Department of Computer Engineering Al-Karak Jordan Ucsi University Institute of Computer Science and Digital Innovation Malaysia Faculty of Compter Science and Information Technology Universiti Sarawak Malaysia
Recent years have witnessed substantial advancement in the subject of smart cities. The purpose of smart city development is to enhance the quality of life for citizens. This was accomplished via the use of IoT and cl... 详细信息
来源: 评论
A first physical-world trajectory prediction attack via LiDAR-induced deceptions in autonomous driving  24
A first physical-world trajectory prediction attack via LiDA...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Yang Lou Yi Zhu Qun Song Rui Tan Chunming Qiao Wei-Bin Lee Jianping Wang City University of Hong Kong State University of New York at Buffalo Delft University of Technology Nanyang Technological University Information Security Center Hon Hai Research Institute and Department of Information Engineering and Computer Science Feng Chia University
Trajectory prediction forecasts nearby agents' moves based on their historical trajectories. Accurate trajectory prediction (or prediction in short) is crucial for autonomous vehicles (AVs). Existing attacks compr...
来源: 评论
Designing Quantum-Safe Lattice-Based Multi-Authority CP-ABE Scheme for Blockchain-Enabled IoT-Based Consumer Healthcare Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Bagchi, Prithwi Bisht, Abhishek Das, Ashok Kumar Saxena, Neetesh Hossain, M. Shamim International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Department of Computer Science and Engineering College of Informatics Korea University 145 Anam-ro Seongbuk-gu Seoul02841 Korea Republic of Cardiff University School of Computer Science and Informatics CardiffCF24 4AG United Kingdom King Saud University College of Computer and Information Sciences Department of Software Engineering Riyadh13273 Saudi Arabia
Despite edge computing reducing communication delays associated with cloud computing, privacy concerns remain a significant challenge when sharing data from edge-based consumer electronics (CE) or Internet-of-Things (... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Ali Hamza Najim Ali Jafer Mahdi Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AIKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Department of Scientific Affairs AI-Zahraa University for Women Bangi Malaysia Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Innovative grid technology leverages information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a “novel three-tier hierarchical framework for smart homes w... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
A Secure Multiparty Quantum Homomorphic Encryption Scheme
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2835-2848页
作者: Jing-Wen Zhang Xiu-Bo Chen Gang Xu Heng-Ji Li Ya-Lan Wang Li-Hua Miao Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan610025China Quantum Technology Lab&Applied Mechanics Group University of MilanMilan20133Italy Department of Computer Science Faculty of Engineering and Physical SciencesUniversity of SurreyGuildfordSurreyGU27XHUnited Kingdom Huawei Technologies Co.Ltd Shenzhen518129China
The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private *** this paper,a novel secure multiparty quantum homomorphic encryption scheme is proposed,wh... 详细信息
来源: 评论