咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是311-320 订阅
排序:
Dorsal Hand Vascular Imaging System
Dorsal Hand Vascular Imaging System
收藏 引用
Ural Symposium on Biomedical engineering, Radioelectronics and information Technology (USBEREIT)
作者: Pavel V. Mizinov Natalia S. Konnova Oleg V. Kravchenko Dobroslav P. Egorov Gavriil V. Osipenko Department of information security Bauman Moscow State Technical University Moscow Russian Federation Federal Research Center Computer Science and Control of RAS Moscow Russian Federation Engineering and Electronics of RAS Kotel’nikov Institute of Radio Moscow Russian Federation Moscow Aviation Institute Moscow Russian Federation
Biometric identification methods using vascular modalities (vein pattern of the finger, wrist, ventral and dorsal part of the metacarpal) use near infrared (NIR) illumination to obtain an image of the vein pattern. T...
来源: 评论
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments  1
收藏 引用
8th International Symposium on security in Computing and Communications, SSCC 2020
作者: Huang, Jheng-Jia Fan, Chun-I Hsu, Yu-Chen Karati, Arijit Department of Information Management National Taiwan University of Science and Technology Taipei Taiwan Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung Taiwan Intelligent Electronic Commerce Research Center National Sun Yat-sen University Kaohsiung Taiwan
With 5G Network Slicing, the 5G telecommunication operators can achieve the goal of supporting users with a variety of different services and can also create a slice with certain unique characteristics. For example: E... 详细信息
来源: 评论
Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks
Optimization Technique for Deep Learning Methodology on Powe...
收藏 引用
Australasian Telecommunication Networks and Applications Conference, ATNAC
作者: Amjed Abbas Ahmed Mohammad Kamrul Hasan Nazmus Shaker Nafi Azana Hafizah Aman Shayla Islam Mohammad Siab Nahi Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Computer Techniques Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq GS-APAC Kellogg Brown and Root Melbourne Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur Malaysia
The first non-profiled side-channel attack (SCA) method using deep learning is Timon's Differential Deep Learning Analysis (DDLA). This method is effective in retrieving the secret key with the help of deep learni...
来源: 评论
Matching Game for Optimized Association in Quantum Communication Networks
Matching Game for Optimized Association in Quantum Communica...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Mahdi Chehimi Bernd Simon Walid Saad Anja Klein Don Towsley Mérouane Debbah Bradley Department of Electrical and Computer Engineering Wireless@VT Virginia Tech Arlington VA USA Communication Engineering Lab Technische Universität Darmstadt Darmstadt Germany Cyber Security Systems and Applied AI Research Center Lebanese American University Lebanon College of Information and Computer Sciences University of Massachusetts Amherst Amherst MA USA Electrical Engineering and Computer Science Department Khalifa University of Science and Technology Abu Dhabi UAE
Enabling quantum switches (QSs) to serve requests submitted by quantum end nodes in quantum communication networks (QCNs) is a challenging problem due to the heterogeneous fidelity requirements of the submitted reques...
来源: 评论
SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications
SLA-SCA: Secure and Lightweight Authentication and Key Agree...
收藏 引用
Communications, Computing, Cybersecurity, and Informatics (CCCI), International Conference on
作者: Bhairvi Pant Mohammad S. Obaidat Shreya Singh Mudita Pant Mohammad Wazid Ashok Kumar Das Kuei-Fang Hsiao Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India King Abdullah II School of Information Technology The University of Jordan Amman Jordan University of Science and Technology Beijing Beijing China School of Computing SRM University Kattankulathur TN India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Computer Science Department University of Texas-Permian Basin Odessa USA
The notion of a smart city is a modern concept characterized by the widespread integration of the Internet of Things (IoT) across various facets of urban life, including healthcare, traffic management, agriculture, an...
来源: 评论
MagLive: Robust Voice Liveness Detection on Smartphones Using Magnetic Pattern Changes
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Xiping Chen, Jing Wu, Cong He, Kun Xu, Haozhe Feng, Yebo Du, Ruiying Chen, Xianhao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Rizhao Institute of Information Technology Wuhan University Rizhao276800 China School of Computer Science and Engineering Nanyang Technological University Singapore Collaborative Innovation Center of Geospatial Technology Wuhan430079 China The Department of Electrical and Electronic Engineering HKU Musketeers Foundation Institute of Data Science University of Hong Kong Pok Fu Lam Hong Kong
Voice authentication has been widely used on smartphones. However, it remains vulnerable to spoofing attacks, where the attacker replays recorded voice samples from authentic humans using loudspeakers to bypass the vo... 详细信息
来源: 评论
Detection of Crucial Power Side Channel Data Leakage in Neural Networks
Detection of Crucial Power Side Channel Data Leakage in Neur...
收藏 引用
Australasian Telecommunication Networks and Applications Conference, ATNAC
作者: Amjed Abbas Ahmed Mohammad Kamrul Hasan Nurhizam Safie Mohd Satar Nazmus Shaker Nafi Azana Hafizah Aman Shayla Islam Saif Aamer Fadhil Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Computer Techniques Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq Integrated Work Package KBR Southbank Victoria Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur Malaysia
Neural network (NN) accelerators are now extensively utilized in a range of applications that need a high degree of security, such as driverless cars, NLP, and image recognition. Due to privacy issues and the high cos...
来源: 评论
Google Map-based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Zhili Yang, Ching-Nung Wang, Shaowei Nan, Guoshun Cimato, Stelvio Zheng, Yifeng Wang, Qian Guangzhou University Institute of Artificial Intel-ligence China Guangdong Key Labor-atory of Blockchain Security Guangdong510006 China National Dong Hwa University Department of Computer Science and Information Engineering Hualian97401 Taiwan national engineering research center for mobile network technologies Beijing100876 China Universitá degli studi di Milano Italy The Hong Kong Polytechnic University Department of Electrical and Electronic Engi-neering Hong Kong Wuhan University School of Cyber Science and Engineering Wuhan430072 China
Passwords are widely used for authentication in Internet applications. Recently, users tend to adopt graphical passwords instead of traditional alphanumeric passwords, since it is much easier for humans to remember im... 详细信息
来源: 评论
G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haoxin Xu, Xuemiao Xu, Cheng Zhang, Huaidong Qin, Jing Wang, Yi Heng, Pheng-Ann He, Shengfeng The School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The School of Future Technology South China University of Technology Guangzhou China The School of Computer Science and Network Security Dongguan University of Technology Dongguan China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong The School of Computing and Information Systems Singapore Management University Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks
Design of Lightweight Cryptography based Deep Learning Model...
收藏 引用
Australasian Telecommunication Networks and Applications Conference, ATNAC
作者: Amjed Abbas Ahmed Mohammad Kamrul Hasan Nazmus Shaker Nafi Azana Hafizah Aman Shayla Islam Saif Aamer Fadhil Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Computer Techniques Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq Integrated Work Package KBR Southbank Victoria Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur Malaysia
Depending on a device's encryption mechanism, a wide variety of tangible details could be exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to deep learning's sensitivity t...
来源: 评论