咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是291-300 订阅
排序:
Generative Federated Learning with Small and Large Models In Consumer Electronics for Privacy preserving Data Fusion in Healthcare Internet of Things
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Ghazal, Taher M. Islam, Shayla Hasan, Mohammad Kamrul Abu-Shareha, Ahmad A. Mokhtar, Umi A. Khan, M. Attique Baili, Jamel Saeed, Ali Q. Bhattt, Mohammed Wasim Ahmad, Munir Al-Ahliyya Amman University Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Department of Networks and Cybersecurity Hourani Center for Applied Scientific Research Amman Jordan UCSI University Institute of Computer Science and Digital Innovation Kuala Lumpur 56000 Malaysia Universiti Kebangsaan Malaysia (UKM) Center for Cyber Security Faculty of Information Science and Technology Malaysia Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Department of Data Science and Artificial Intelligence Amman Jordan Prince Mohammad bin Fahd University Saudi Arabia King Khalid University College of Computer Science Department of Computer Engineering Abha 61413 Saudi Arabia Northern Technical University Computer Center Ninevah Iraq Korea University College of Informatics Seoul 02841 South Korea
Healthcare Internet of Things (HIoT) requires large-scale privacy features to ensure maximum security in sharing sensitive physiological data in consumer electronics. Recent approaches utilize the fusion concept to pr... 详细信息
来源: 评论
A Comprehensive Survey on Intelligent Reflecting Surfaces and Unmanned Aerial Vehicles Integration for Enhanced Communication in Massive Networks  11
A Comprehensive Survey on Intelligent Reflecting Surfaces an...
收藏 引用
11th International Conference on Mechatronics and Robotics engineering, ICMRE 2025
作者: Attar, Hani Ababneh, Jafar Hafez, Mohamed Rachini, Ali Solyman, Ahmed Bahy, Ramy M. Zarqa University Faculty of Engineering Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan INTI-IU-University Nilai Faculty of Engineering Feqs Malaysia Department of Computer Science and Information Technology Jounieh Lebanon School of Computing Engineering and Built Environment Glasgow Caledonian University Glasgow United Kingdom Technical Research Center Cairo Egypt
Intelligent Reflecting Surfaces (IRSs) offer a revolutionary approach to wireless communication by dynamically controlling the properties of electromagnetic waves. By manipulating wavefronts without requiring radio fr... 详细信息
来源: 评论
Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs
Towards Faster Fully Homomorphic Encryption Implementation w...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Guang Fan Fangyu Zheng Lipeng Wan Lili Gao Yuan Zhao Jiankuo Dong Yixuan Song Yuewu Wang Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cryptography University of Chinese Academy of Sciences Beijing China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing China Ant Group Hangzhou China School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Cyber Security University of Science and Technology of China Hefei China
Fully Homomorphic Encryption (FHE) allows computations on encrypted data without knowledge of the plaintext message and currently has been the focus of both academia and industry. However, the performance issue hinder...
来源: 评论
Zero-pole cancellation for identity-based aggregators:a constant-size designated verifier-set signature
收藏 引用
Frontiers of computer science 2020年 第4期14卷 197-210页
作者: E CHEN Yan ZHU Changlu LIN Kewei LV School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China College of Mathematics and Informatics Fujian Normal UniversityFuzhou350117China Fujian Provincial Key Lab of Network Security&Cryptology Fujian Normal UniversityFuzhou350007China Institute of Information Engineering DCS Research CenterChinese Academy of SciencesBeijing100093China
In this paper we present a designated verifier-set signature(DVSS),in which the signer allows to designate many verifiers rather than one verifier,and each designated verifier can verify the validity of signature by *... 详细信息
来源: 评论
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers
收藏 引用
International Journal of information and computer security 2021年 第1-2期16卷 63-83页
作者: Liang, Xueping Shetty, Sachin Tosh, Deepak K. Foytik, Peter Zhang, Lingchen Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Department of Computer Science University of Texas at EL Paso El PasoTX United States
Distributed ledger technology (DLT) provides decentralised services by removing the need of trust among distributed nodes in the distributed system. Transactions across the network are visible to all participants. How... 详细信息
来源: 评论
Authentic Learning on DevOps security with Labware: Git Hooks To Facilitate Automated security Static Analysis
Authentic Learning on DevOps Security with Labware: Git Hook...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Md Mostafizur Rahman MD Abdul Barek Mst Shapna Akter Abm Kamrul Islam Riad Md Abdur Rahman Hossain Shahriar Akond Rahman Fan Wu Department of Information Technology University of West Florida Florida USA Department of Intelligent Systems and Robotics University of West Florida Florida USA Center for Cyber Security University of West Florida Florida USA Dept. of Computer Science and Software Engineering Auburn University USA Tuskegee University Alabama USA
This paper presents an innovative approach to DevOps security education, addressing the dynamic landscape of cybersecurity threats. We propose a student-centered learning methodology by developing comprehensive hands-... 详细信息
来源: 评论
Intersection-policy private mutual authentication from authorized private set intersection
收藏 引用
science China(information sciences) 2020年 第2期63卷 116-130页
作者: Yamin WEN Fangguo ZHANG Huaxiong WANG Yinbin MIAO Zheng GONG School of Statistics and Mathematics Guangdong University of Finance and Economics State Key Laboratory of Cryptology School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Sun Yat-sen University School of Physical and Mathematical Sciences Nanyang Technological University Department of Cyber Engineering Xidian University School of Computer South China Normal University
Private mutual authentication(PMA) enables two-way anonymous authentication between two users certified by the same trusted group authority. Most existing PMA schemes focus on acquiring a relatively onefold authentica... 详细信息
来源: 评论
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation
Cyber Security and Applications
收藏 引用
Cyber security and Applications 2023年 1卷
作者: Thapliyal, Siddhant Singh, Shubham Wazid, Mohammad Singh, D.P. Das, Ashok Kumar Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun 248 002 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India
Smart healthcare technology is transforming from the traditional healthcare system in every manner conceivably. Smart healthcare provides several advantages over the existing approaches. However, it suffers from healt... 详细信息
来源: 评论
Implementing OIML R46 Communication Unit for DLMS/COSEM security Suite 1 and Passing CTT V3.1 Test
Implementing OIML R46 Communication Unit for DLMS/COSEM Secu...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Chun-Tsai Chien Chien-Lung Wang I-En Liao Sying-Jyan Wang Taiwan Information Security Center National Chung Hsing University Taichung City Taiwan R.O.C. Department of Computer Science and Engineering National Chung Hsing University Taichung City Taiwan R.O.C.
With the growing deployment of smart metering systems, ensuring secure and reliable communication between smart meters and utility providers is crucial. The DLMS/COSEM security Suite 1 offers a standardized framework ...
来源: 评论
Deep Learning and CNN-Based Approach for Efficient Detection of Potato Leaf Diseases
Deep Learning and CNN-Based Approach for Efficient Detection...
收藏 引用
IEEE Asia-Pacific Conference on Geoscience, Electronics and Remote Sensing Technology (AGERS)
作者: Taher M. Ghazal Jamshaid Iqbal Janjua Walid Abushiba Muhammad Salah-ud-Din Iqbal Waqas Iqbal Munir Ahmad Muhammad Saleem Faculty of Information Science and Technology College of Arts & Science Applied Science University Manama Bahrain & Center for Cyber Security Universiti Kebangsaan Malaysia Selangor Malaysia Al-Khawarizimi Institute of Computer Science (KICS) University of Engineering & Technology (UET) Lahore Pakistan College of Engineering Applied Science University Bahrain School of Computer Science Minhaj University Lahore Pakistan Department of forestry and Range Management University of Agriculture Faisalabad Pakistan College of Informatics Korea University Seoul Republic of Korea
Potato is a maj or food crop worldwide, providing essential nutrients to millions. However, various diseases can severely affect potato crops, leading to reduced yield and quality. Early disease detection is crucial f... 详细信息
来源: 评论