咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是231-240 订阅
排序:
Semantic-Based Heterogeneous Controller Collaboration for Space-Terrestrial Integrated Networks  23
Semantic-Based Heterogeneous Controller Collaboration for Sp...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Bao, Yaru Tang, Feilong Li, Xu Chen, Long Liu, Jiacheng Yang, Yanqin Xu, Wenchao Cao, Lijun Han, Ping Shanghai Jiao Tong University Department of Computer Science & Engineering China School of Data Science & Engineering East China Normal University China School of Communication & Electronic Engineering East China Normal University China Innovation Resource Center Kedacom Co. Ltd China The Sci-Tech Information Office of Xuzhou Public Security Bureau China
In heterogeneous SDN networks, controllers deploying different protocols need to cooperate with each other and establish a global network view that can be passed to the network applications for unified management and ... 详细信息
来源: 评论
σ-ZERO: GRADIENT-BASED OPTIMIZATION OF 0-NORM ADVERSARIAL EXAMPLES
arXiv
收藏 引用
arXiv 2024年
作者: Cinà, Antonio Emanuele Villani, Francesco Pintor, Maura Schönherr, Lea Biggio, Battista Pelillo, Marcello Department of Computer Science Bioengineering Robotics and Systems University of Genoa Italy Department of Electrical and Electronic Engineering University of Cagliari Italy CISPA Helmholtz Center for Information Security Germany Department of Environmental Sciences Informatics and Statistics Ca’ Foscari University of Venice Italy
Evaluating the adversarial robustness of deep networks to gradient-based attacks is challenging. While most attacks consider 2- and ∞-norm constraints to craft input perturbations, only a few investigate sparse 1- an... 详细信息
来源: 评论
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Congcong Wang, Chen Shen, Jian Vasilakos, Athanasios V. Wang, Bin Wang, Weizheng Department of Software Engineering Nanjing University of Information Science and Technology Nanjing210044 China the Zhejiang Key Laboratory of Digital Fashion and Data Governance the Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Zhejiang Sci-Tech University Hangzhou310018 China Zhejiang Provincial Innovation Center of Advanced Textile Technology Shaoxing312000 China College of Computer Science and Information Technology IAU Saudi Arabia Grimstad4879 Norway Network and Data Security Hangzhou310053 China Computer Science Department City University of Hong Kong Hong Kong the Division of Computer Science University of Aizu Fukushima965–8580 Japan
In recent years, against the backdrop of smart grids, vehicle-to-grid (V2G) interaction has become a hot topic. With the increasing number of new energy vehicles, handling massive amounts of electricity transaction da... 详细信息
来源: 评论
Secure authentication protocol for home area network in smart grid-based smart cities
收藏 引用
computers and Electrical engineering 2023年 第1期108卷
作者: Badar, Hafiz Muhammad Sanaullah Mahmood, Khalid Akram, Waseem Ghaffar, Zahid Umar, Muhammad Das, Ashok Kumar Department of Computer Science Muhammad Nawaz Sharif University of Agriculture Multan Pakistan Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Douliu64002 Taiwan Department of Computer Science Lahore Garrison University Lahore Pakistan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology Douliu64002 Taiwan Department of Computer Science COMSATS University Islamabad Sahiwal Campus Punjab Pakistan Department of Computer Science Superior University Lahore 54600 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India
The Internet of Things (IoT) allows better solutions for managing challenges such as reliability and power quality in a smart grid environment. It also assists in adopting smart grid measures in smart city development... 详细信息
来源: 评论
Crypto-Space Steganography for 3d Mesh Models with Greedy Selection and Shortest Diffusion
SSRN
收藏 引用
SSRN 2023年
作者: Gao, Kai Horng, Ji-Hwei Chang, Ching-Chun Chang, Chin-Chen Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan Department of Electrical Engineering National Quemoy University Kinmen Jinning 892 Taiwan Information and Communication Security Research Center Feng Chia University Taichung407 Taiwan
Data hiding in encrypted 3D mesh models has emerged as a promising crypto-space steganography technique. However, the existing methods have the potential to improve embedding capacity due to the underutilization of th... 详细信息
来源: 评论
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs  23
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability ...
收藏 引用
Proceedings of the 2023 7th International Conference on computer science and Artificial Intelligence
作者: Abdulrahman Hamman Adama Chukkol Senlin Luo Haruna Yunusa Abdulganiyu Abdu Yusuf Abulfatahi Mohammed Information and Electronics Department of Information and Electronics. Beijing Institute of Technology Beijing China China Information and Electronics Information System and Security & Countermeasures Experimental Center Beijing Institute of Technology Beijing China China Automation Science and Electrical Engineering School of Automation Science and Electrical Engineering Beihang University Beijing China China Computer Science School of Computer Science and Technology Beijing Institute of Technology Beijing China China Information Technology School of Management and Information Technology Modibbo Adama University Yola Nigeria Nigeria
Identifying vulnerabilities in binary code with precision is a critical area of study in the field of software security. Most existing techniques fail to pinpoint the vulnerability's exact location, due to the ext... 详细信息
来源: 评论
JAX-CNV:A Whole-genome Sequencing-based Algorithm for Copy Number Detection at Clinical Grade Level
收藏 引用
Genomics, Proteomics & Bioinformatics 2022年 第6期20卷 1197-1206页
作者: Wan-Ping Lee Qihui Zhu Xiaofei Yang Silvia Liu Eliza Cerveira Mallory Ryan Adam Mil-Homens Lauren Bellfy Kai Ye Charles Lee Chengsheng Zhang Precision Medicine Center The First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China The Jackson Laboratory for Genomic Medicine FarmingtonCT 06032USA School of Cyber Science and Engineering Xi’an Jiaotong UniversityXi’an 710049China Department of Pathology and Laboratory Medicine Perelman School of MedicineUniversity of PennsylvaniaPhiladelphiaPA 19104USA School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Department of Life Sciences Ewha Womans UniversitySeoul 03760South Korea
We aimed to develop a whole-genome sequencing(WGS)-based copy number variant(CNV)calling algorithm with the potential of replacing chromosomal microarray assay(CMA)for clinical ***-CNV is thus developed for CNV detect... 详细信息
来源: 评论
A low-cost high-speed radix-4 Montgomery modular multiplier without carry-propagate format conversion
收藏 引用
engineering science and Technology, an International Journal 2024年 54卷
作者: Kuang, Shiann-Rong Wang, Chun-Yi Chen, Yen-Jui Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung 80424 Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung 80424 Taiwan
Modular multiplication is the most critical and time-consuming operation in numerous public-key cryptosystems used to establish secure networks. Especially in Internet of Things (IoT) applications, achieving low area ... 详细信息
来源: 评论
An Enhanced Resource Selection Scheme for Efficient Intra-Platoon Message Delivery
An Enhanced Resource Selection Scheme for Efficient Intra-Pl...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Bingying Wang Jun Zheng Cheng Li School of Electronics and Information Engineering Nanjing University of Information Science and Technology Nanjing China National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China Purple Mountain Laboratories Nanjing China School of Engineering Science Simon Fraser University Burnaby Canada Department of Electrical and Computer Engineering Memorial University St. John's Canada
This paper proposes an enhanced resource selection (eInP-RS) scheme for efficient intra-platoon message delivery of cooperative awareness messages (CAMs) and decentralized environmental notification messages (DENMs). ... 详细信息
来源: 评论
CCA-Secure Key-Aggregate Proxy Re-Encryption for Secure Cloud Storage
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Wei-Hao Fan, Chun-I Tseng, Yi-Fan The Department of Computer Science Purdue University West LafayetteIN47907 United States The Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung Taiwan The Information Security Research Center National Sun Yat-sen University Kaohsiung Taiwan The Intelligent Electronic Commerce Research Center National Sun Yat-sen University Kaohsiung Taiwan The Department of Computer Science National Chengchi University Taipei11605 Taiwan
The development of cloud services in recent years has mushroomed, for example, Google Drive, Amazon AWS, Microsoft Azure. Merchants can easily use cloud services to open their online shops in a few seconds. Users can ...
来源: 评论