咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是271-280 订阅
排序:
Graph Sampling based Fairness-aware Recommendation over Sensitive Attribute Removal
Graph Sampling based Fairness-aware Recommendation over Sens...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Shenghao Liu Guoyang Wu Xianjun Deng Hongwei Lu Bang Wang Laurence Yang James J. Park Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea
Discrimination against different user groups has received growing attention in the recommendation field. To address this problem, existing works typically remove sensitive attributes that may cause discrimination thro...
来源: 评论
Wavelet Frequency Transformation for Specific Weeds Recognition  1
Wavelet Frequency Transformation for Specific Weeds Recognit...
收藏 引用
1st International Conference on Artificial Intelligence and Data Analytics, CAIDA 2021
作者: Habib, Shaban Khan, Ishrat Islam, Muhammad Albattah, Waleed Mohammed Alyahya, Saleh Khan, Sheroz Kamrul Hassan, Mohammad Qassim University College of Computer Dept. of Information Technology Buraydah Saudi Arabia Prince Sultan University College of Computer and Inofrmation Science Dept. of Information Technology Computer Science Department Riyadh11586 Saudi Arabia College of Engineering and Information Technology Onaizah Colleges Dept. of Electrical Engineering Saudi Arabia Universiti Kebangsaan Malaysia Center for Cyber Security Bangi Malaysia
Saudi Arabia is experiencing depleting water level which ultimately leading to having reduced level of weed and crops farms. The ongoing practice of watering for all kind of weeds at farms is manual which is laborious... 详细信息
来源: 评论
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering  22
A Reliable and Stable V2V Routing Scheme for Warning Message...
收藏 引用
Proceedings of the 2022 12th International Conference on Communication and Network security
作者: Mansoor Khan Shanshan Tu Ghulam Abbas Ziaul Haq Abbas Hisham Alasmary Muhammad Waqas Faculty of Computer Science and Engineering GIK Institute of Engineering and Technology Pakistan Information Technology Beijing University of Technology Beijing 100124 China China Telecommunications and Networking Research Center GIK Institute of Engineering and Technology Pakistan College of Computer Science King Khalid University Kingdom of Saudi Arabia and Information Security and Cybersecurity Unit King Khalid University Kingdom of Saudi Arabia Computer Engineering Department University of Bahrain Computer Engineering 32038 Bahrain. Bahrain and School of Engineering Edith Cowan University Australia
Road traffic injuries cause considerable life and economic losses to individuals, their families, and nations as a whole. To avoid road accidents, Vehicular Ad-hoc Networks (VANETs) play a vital role by enhancing tran... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature  23
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Zou, Huiying Duan, Jia Liu, Xi Ren, Wei Li, Tao Zheng, Xianghan Choo, Kim-Kwang Raymond Hunan Engineering Research Center of Geographic Information Security and Application The Third Surveying and Mapping Institute of Hunan Province Hunan China China University of Geosciences School of Computer Science Wuhan China Sichuan University Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Casm State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of Mnr Beijing China Fuzhou University College of Computer and Big Data China Sanya College School of Information and Intelligent Engineering China University of Texas at San Antonio Department of Information Systems and Cyber Security San Antonio United States
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
A Provably Secure Public Key Encryption with Keyword Search for Data Outsourcing in Cloud Environments
SSRN
收藏 引用
SSRN 2023年
作者: Ghosh, Sudeep Islam, S.K. Hafizul Bisht, Abhishek Das, Ashok Kumar Department of Information Technology Guru Nanak Institute of Technology West Bengal Kolkata700114 India Department of Computer Science and Engineering Indian Institute of Information Technology West Bengal Kalyani741235 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India
In recent days, the application of cloud computing has been gaining significant popularity among people. A considerable amount of data are being stored in the cloud server. However, data owners outsource their encrypt... 详细信息
来源: 评论
G²Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
收藏 引用
IEEE Transactions on information Forensics and security 2024年 19卷 8773-8785页
作者: Haoxin Yang Xuemiao Xu Cheng Xu Huaidong Zhang Jing Qin Yi Wang Pheng-Ann Heng Shengfeng He School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science Guangzhou China Centre for Smart Health The Hong Kong Polytechnic University Hong Kong China School of Future Technology South China University of Technology Guangzhou China School of Computer Science and Network Security Dongguan University of Technology Dongguan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong SAR China School of Computing and Information Systems Singapore Management University Victoria St Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Securing Fog Computing-based Industry 4.0 Communication Using Authenticated Key Agreement Scheme
Securing Fog Computing-based Industry 4.0 Communication Usin...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Amit Kumar Mishra Mohammad Wazidy D. P. Singhy Ashok Kumar Das Mohsen Guizani Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence(MBZUAI) Abu Dhabi UAE
Internet of Things (IoT)-based smart factories offer the manufacturing sectors a great opportunity to embrace the fourth industrial revolution (Industry 4.0). The real-time monitoring of manufacturing operations in an...
来源: 评论
An Extensive Analysis of Cybersecurity in the Era of Advanced Threats
An Extensive Analysis of Cybersecurity in the Era of Advance...
收藏 引用
Trends in Quantum Computing and Emerging Business Technologies (TQCEBT), International Conference on
作者: Krishnaveni S B. T. Geetha Sree Rashmitha Duvvada Manoj Sathe Amrita Mukesh Soni Department of Management Studies Adithya Institute of Technology Coimbatore Kovilpalayam India Department of ECE Saveetha School of Engineering SIMATS Tamil Nadu India Department of CSE University Of Wisconsin Madison United States of America Computer Science PES Modern Institute of Business Studies Pune India Center for Cyber Security and Cryptology Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Greater Noida Uttar Pradesh India Dr. D. Y. Patil Vidyapeeth Pune Dr. D. Y. Patil School of Science & Technology Pune Tathawade
The scientific and business communities have taken an interest in the Internet of Things (IoT) because of its tremendous impact on human life. The IoTs have emerged as a state-of-the-art framework for creating intelli... 详细信息
来源: 评论
Blockchain-assisted Puncturable Signcryption for Cloud and Fog-Hosted Industrial Cyber-Physical Systems
收藏 引用
IEEE Network 2025年
作者: Ma, Qingru Shen, Jian Pandi, Vijayakumar Gupta, Brij B. Arya, Varsha Mahalinghum, Maheswari Zhejiang Sci-Tech University School of Computer Science and Technology School of Artificial Intelligence Hangzhou310018 China Zhejiang Sci-Tech University School of Information Science and Engineering School of Cyber Science and Technology Zhejiang Key Laboratory of Digital Fashion and Data Governance Zhejiang Provincial International Cooperation Base for Science and Technology on Cloud Computing Security and Data Aggregation Hangzhou310018 China Department of Computer Science and Engineering Tamil Nadu Tiruchirappalli620009 India Asia University Department of Computer Science and Information Engineering Taichung413 Taiwan China Medical University Hospital China Medical University Department of Medical Research Taichung Taiwan Pune412115 India School of Cybersecurity Korea University Seoul Korea Republic of Kyung Hee University Seoul02447 Korea Republic of Lebanese American University Beirut1102 Lebanon Center for Interdisciplinary Research Dehradun India Sathyabama Institute of Science and Technology School of Computing Department of Computer Science and Engineering Tamil Nadu Chennai India
The widespread adoption of emerging technologies, such as interconnected sensors and advanced automation systems, has led to rapid advancements in smart industrial environments. While industrial cyber-physical systems... 详细信息
来源: 评论
Towards Privacy-Preserving Cloud Storage:A Blockchain Approach
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 2903-2916页
作者: Jia-Shun Zhang Gang Xu Xiu-Bo Chen Haseeb Ahmad Xin Liu Wen Liu Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Inner Mongolia University of Science&Technology School of Information EngineeringBaotou014010China State Key Laboratory of Media Convergence and Communication Communication University of China School of Computer Science and Cybersecurity Communication University of China Key Laboratory of Convergent Media and Intelligent Technology Communication University of China Ministry of EducationBeijing102204China
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner thr... 详细信息
来源: 评论