咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是221-230 订阅
排序:
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
computer Systems science & engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
6G-Enabled Edge AI for Metaverse:Challenges, Methods,and Future Research Directions
收藏 引用
Journal of Communications and information Networks 2022年 第2期7卷 107-121页
作者: Luyi Chang Zhe Zhang Pei Li Shan Xi Wei Guo Yukang Shen Zehui Xiong Jiawen Kang Dusit Niyato Xiuquan Qiao Yi Wu School of Data Science and Technology Heilongjiang UniversityHarbin 150080China Institute for Cryptology and Network Security Heilongjiang UniversityHarbin 150080China SenseTime Group Limited Shenzhen 518000China Pillar of Information Systems Technology and Design Singapore University of Technology and Design.Singapore 487372Singapore School of Automation.Guangdong University of Technology and Center for Intelligenl Batch Manufacturing based on IoT TechnologyGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798.Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications.Beijing 100876China
Sixth generation(6G)enabled edge intelligence opens up a new era of Internet of everything and makes it possible to interconnect people-devices-cloud anytime,*** and more next-generation wireless network smart service... 详细信息
来源: 评论
An effective security assessment approach for Internet banking services via deep analysis of multimedia data
An effective security assessment approach for Internet banki...
收藏 引用
作者: Khattak, Sana Jan, Sadeeq Ahmad, Iftikhar Wadud, Zahid Khan, Fazal Qudus National Center for Cyber Security-UETP Department of Computer Science and IT University of Engineering and Technology Peshawar Pakistan Department of Computer Science and IT University of Engineering and Technology Peshawar Pakistan Department of Computer Systems Engineering University of Engineering and Technology Peshawar Pakistan Department of Information Technology FCIT King Abdulaziz University Jeddah Saudi Arabia
With the emergence of cyber technology, the biggest evolution has been observed in the use of Internet for financial purposes, in particular for the Internet banking sector. However, with the increase in the number of... 详细信息
来源: 评论
Model-Driven Channel Estimation Network for Orthogonal Time-Frequency Space Systems
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Qian Chen, Xingke Tao, Qin Qian, Li Ping Kam, Pooi-Yuen Wu, Yuan Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Hangzhou Normal University School of Information Science and Technology Hangzhou311121 China School of Science and Engineering Shenzhen518172 China Center for Advanced Microelectronic Devices Suzhou215123 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science China
Orthogonal time-frequency space (OTFS) modulation has garnered significant attention in wireless communications, particularly in high-mobility scenarios, due to its exceptional resilience to Doppler shifts. While the ... 详细信息
来源: 评论
Improved lattice-based CCA2-secure PKE in the standard model
收藏 引用
science China(information sciences) 2020年 第8期63卷 147-168页
作者: Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
Based on the identity-based encryption(IBE) from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12) presented a CCA1-secure public-key encryption(PKE), which has the best known efficiency ... 详细信息
来源: 评论
Characterizing Behaviors of Sockpuppets in Online Political Discourses
收藏 引用
Journal of information science and engineering 2023年 第3期39卷 489-506页
作者: Chu, Hsiu-Ling Dai, Yu-Chen Lee, Wei-Bin Hsieh, Ting-Shen Wang, Ming-Hung Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Chiayi621 Taiwan Information Security Research Center Hon Hai Research Institute Hon Hai Precision Industry Co. Ltd. Taipei114 Taiwan
Recently, with the rapid development of social network services, political entities have employed social media to conduct political propaganda;they disseminate official announcements, promote candidates, and even atta... 详细信息
来源: 评论
Quantifying Privacy Leakage in Split Inference via Fisher-Approximated Shannon information Analysis
arXiv
收藏 引用
arXiv 2025年
作者: Deng, Ruijun Lu, Zhihui Duan, Qiang School of Computer Science Fudan University Shanghai China Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai China Shanghai Blockchain Engineering Research Center Shanghai China Information Sciences & Technology Department Pennsylvania State University AbingtonPA United States
Split inference (SI) partitions deep neural networks into distributed sub-models, enabling privacy-preserving collaborative learning. Nevertheless, it remains vulnerable to Data Reconstruction Attacks (DRAs), wherein ... 详细信息
来源: 评论
Tensor Dynamic Fusion Based Modality-Imbalanced Multimodal Federated Learning in Mobile Edge Computing for Consumer Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Nie, Xin Yi, Lingzhi Yang, Laurence T. Deng, Xianjun Fan, Fulan Zhang, Hongtao Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei EngineeringResearch Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Zhongnan University of Economics and Law School of Information and Safety Engineering Wuhan430074 China Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China St. Francis Xavier University Department of Computer Science Antigonish Canada South-Central Minzu University School of Education Wuhan430074 China
Mobile edge computing extends the capabilities of computation and storage from the cloud to the edge, enabling local data storage and processing. This computing paradigm complements federated learning (FL), as it sati... 详细信息
来源: 评论
Design and Implementation of Side Channel Attack Based on Deep Learning LSTM
Design and Implementation of Side Channel Attack Based on De...
收藏 引用
IEEE Region 10 Symposium
作者: Amjed Abbas Ahmed Mohammad Kamrul Hasan Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq
Encryption algorithms and encryption devices both play a key role in ensuring the safety of data that has been encrypted. Various types of attacks, such as energy analysis, can be used to assess the reliability of the...
来源: 评论
GSLB: The Graph Structure Learning Benchmark  37
GSLB: The Graph Structure Learning Benchmark
收藏 引用
37th Conference on Neural information Processing Systems, NeurIPS 2023
作者: Li, Zhixun Wang, Liang Sun, Xin Luo, Yifan Zhu, Yanqiao Chen, Dingshuo Luo, Yingtao Zhou, Xiangxin Liu, Qiang Wu, Shu Yu, Jeffrey Xu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong Center for Research on Intelligent Perception and Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence University of Chinese Academy of Sciences China Department of Automation University of Science and Technology of China China School of Cyberspace Security Beijing University of Posts and Telecommunications China Department of Computer Science University of California Los Angeles United States Heinz College of Information Systems and Public Policy Machine Learning Department School of Computer Science Carnegie Mellon University United States
Graph Structure Learning (GSL) has recently garnered considerable attention due to its ability to optimize both the parameters of Graph Neural Networks (GNNs) and the computation graph structure simultaneously. Despit... 详细信息
来源: 评论