咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是241-250 订阅
排序:
Optimizing Patient Outcomes with AI and Predictive Analytics in Healthcare
Optimizing Patient Outcomes with AI and Predictive Analytics...
收藏 引用
International Scientific Conference on Power and Electrical engineering of Riga Technical University (RTUCON)
作者: Jamshaid Iqbal Janjua Taher M. Ghazal Walid Abushiba Sagheer Abbas Al-Khawarizimi Institute of Computer Science (KICS) University of Engineering & Technology (UET) Lahore Pakistan College of Arts & Science Applied Science University Manama Kingdom of Bahrain Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Selangor Malaysia College of Engineering Applied Science University Bahrain Department of Computer Science PMU Al Khobar Saudi Arabia
Healthcare's integration with the emerging artificial intelligence, predictive analytics and health information exchange (HIE) system is currently undergoing a revolution. These emerging technologies are offering ... 详细信息
来源: 评论
Knowledge System,Ontology,and Knowledge Graph of the Deep-Time Digital Earth(DDE): Progress and Perspective
收藏 引用
Journal of Earth science 2023年 第5期34卷 1323-1327页
作者: Xiumian Hu Yiwei Xu Xiaogang Ma Yunqiang Zhu Chao Ma Chao Li Hairong Lü Xinbing Wang Chenghu Zhou Chengshan Wang School of Earth Sciences and Engineering Nanjing UniversityNanjing 210023China State Key Laboratory of Palaeobiology and Stratigraphy Nanjing Institute of Geology and Palaeontology and Center for Excellence in Life and PaleoenvironmentChinese Academy of SciencesNanjing 210008China Department of Computer Science University of IdahoMoscow ID 83844USA Institute of Geographical Science and Natural Resources Chinese Academy of SciencesBeijing 100101China State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation&Institute of Sedimentary Geology&College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China IUGS Deep-Time Digital Earth Research Center of Excellence Suzhou 215101China Department of Automation Tsinghua UniversityBeijing 100084China School of Electronic Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Biogeology and Environmental Geology China University of GeosciencesBeijing 100083China
THE USE OF KNOWLEDGE GRAPH IN NATURAL science Knowledge graph is a field of Artificial Intelligence(AI)that aims to represent knowledge in the form of graphs,consisting of nodes and edges which represent entities and ... 详细信息
来源: 评论
Survey on Blockchain-Based Internet of Things security Technologies
Survey on Blockchain-Based Internet of Things Security Techn...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Qingrui Meng Zhihong Sun Zheng Lv Qiang Cheng Wei Liu Yun Chen department of information security Naval University of Engineering Wuhan Hubei China Computer Science and Engineering Wuhan Institute of Technologe Wuhan Hubei China Simulation Training Center Air Force Early Warning Academy Wuhan Hubei China Simulation Training Center Naval University of Engineering Wuhan Hubei China
Internet of Things(IoT) terminals are characterized by large number, wide distribution, complex hierarchical structure, etc., and are often in complex environments, which are more susceptible to attacks than tradition... 详细信息
来源: 评论
Privacy-Preserving Location information Fusion for Secure Localization in Cyber-Physical Social Systems: A Case of Consumer's Trustworthy Personalized Recommendation
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Medhane, Darshan Vishwasrao Sangaiah, Arun Kumar Fan, Chun-I National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan SPPU K. K. Wagh Institute of Engineering Education and Research Department of Information Technology Maharashtra Nashik India National Yunlin University of Science and Technology International Graduate School of AI Douliu64002 Taiwan Sunway University School of Engineering and Technology Selangor Petaling Jaya47500 Malaysia Chandigarh University Punjab 140413 India National Sun Yat-sen University Department of Computer Science and Engineering Information Security Research Center Intelligent Electronic Commerce Research Center Kaohsiung804 Taiwan
Cyber-physical social systems (CPSS) have developed significantly in the last decade as a result of their effective computing and communication capabilities. security and safety concerns, yet continue to be the bigges... 详细信息
来源: 评论
Multi-Layer Perceptrons and Convolutional Neural Networks Based Side-Channel Attacks on AES Encryption
Multi-Layer Perceptrons and Convolutional Neural Networks Ba...
收藏 引用
International Conference on engineering Technology and Technopreneuship (ICE2T)
作者: Amjed Abbas Ahmed Mohammad Kamrul Hasan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Computer Techniques Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq
Side - channel attacks (SCA) exploit vulnerabilities introduced by insecure implementations in order to get information about the data that is being processed or the data itself via device leakages. The majority of mo... 详细信息
来源: 评论
An IoT-Based Air Pollution Monitoring System for Smart City
An IoT-Based Air Pollution Monitoring System for Smart City
收藏 引用
computer Systems (ICCS), IEEE International Conference on
作者: Alibek Aubakirov Kanat Makhanov Aliya Issainova Natalya Glazyrina Bibigul Razkhova Dina Satybaldina School of Computer Science Hangzhou Dianzi University Hangzhou China Department of Radio Engineering Electronics and Telecommunications L.N Gumilyov Eurasian National University Astana Kazakhstan Information Security Department L.N. Gumilyov Eurasian National University Astana Kazakhstan Computer and Software Engineering Department L.N Gumilyov Eurasian National University Astana Kazakhstan Department of Artificial Intelligence Technologies) L.N. Gumilyov Eurasian National University Astana Kazakhstan Information Security and Cryptology Research Institute L.N. Gumilyov Eurasian National University Astana Kazakhstan
In this paper, we present the results of research on the design and development of a gas analytical unit, an electronic nose, with an autonomous power supply, as well as the function of wireless data transmission via ... 详细信息
来源: 评论
A Secure Deepfake Mitigation Framework: Architecture, Issues, Challenges, and Societal Impact
Cyber Security and Applications
收藏 引用
Cyber security and Applications 2024年 2卷
作者: Wazid, Mohammad Mishra, Amit Kumar Mohd, Noor Das, Ashok Kumar Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun 248 002 India Department of Computer Science and Engineering Graphic Era Hill University Dehradun 248 002 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India
Deepfake refers to synthetic media generated through artificial intelligence (AI) techniques. It involves creating or altering video, audio, or images to make them appear as though they depict something or someone els... 详细信息
来源: 评论
Live Demonstration: Low Cost AES-256 Circuit Design and Application
Live Demonstration: Low Cost AES-256 Circuit Design and Appl...
收藏 引用
IEEE Asia-Pacific Conference on Circuits and Systems
作者: Chia-Chou Chuang Yu-Lun Jheng Chien Huang Lu-Ying Huang Pei-Yin Chen Narn-Yih Lee Program on Integrated Circuit Design Academy of Innovative Semiconductor and Sustainable Manufacturing National Cheng Kung University Tainan Taiwan Department of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan Network & Information Security Division Computer and Network Center National Cheng Kung University Tainan Taiwan
With the advent of the post-quantum era, the most worrying issue is information security. Quantum computers have been able to crack common asymmetric cryptography, such as RSA, DSA, ECC, etc, by Shor’s Algorithm. In ... 详细信息
来源: 评论
Success Probability and Spectral Efficiency Estimation Using Successive Interference Cancellation for B5G Network
Success Probability and Spectral Efficiency Estimation Using...
收藏 引用
Computing (ICOCO), IEEE International Conference on
作者: Faizan Qamar Anand Gachhadar Syed Hussain Ali Kazmi Rosilah Hassan Center for Cyber Security Faculty of Information Science and Technology (FTSM) Universiti Kebangsaan Malaysia (UKM) UKM Bangi Selangor Malaysia Department of Electronics and Computer Engineering Institute of Engineering Tribhuvan University Kathmandu Nepal Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Selangor Malaysia
This research paper investigates the examination of Successive Interference Cancellation (SIC) implementation within ultra-dense 5G networks. The study focuses on the theoretical foundations of SIC, encompassing its s...
来源: 评论
Cybersecurity Revolution via Large Language Models and Explainable AI
Cybersecurity Revolution via Large Language Models and Expla...
收藏 引用
security of information and Networks (SIN), International Conference on
作者: Taher M. Ghazal Jamshaid Iqbal Janjua Walid Abushiba Munir Ahmad Anuam Ihsan Nidal A. Al-Dmour College of Arts & Science Applied Science University Manama Kingdom of Bahrain Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Selangor Malaysia Al-Khawarizimi Institute of Computer Science (KICS) University of Engineering & Technology (UET) Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul Republic of Korea Department of Computer Engineering College of Engineering Mutah University Jordan
Integrating Groundbreaking advancements in AI, like language models, interpretable AI, and machine learning, opens up a world of exciting new possibilities. The Evolving face of cybersecurity and Modern cyber threats ... 详细信息
来源: 评论