咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是351-360 订阅
排序:
Mutual information based logistic regression for phishing URL detection
Cyber Security and Applications
收藏 引用
Cyber security and Applications 2024年 2卷
作者: Vajrobol, Vajratiya Gupta, Brij B. Gaurav, Akshat Institute of Informatics and Communication University of Delhi India International Center for AI and Cyber Security Research and Innovations (CCRI) Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan Ronin Institute Montclair NJ United States Symbiosis Centre for Information Technology (SCIT) Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut 1102 Lebanon Center for Interdisciplinary Research University of Petroleum and Energy Studies (UPES) Dehradun India
Phishing is a cybersecurity problem that hackers employ to deceive individuals and organizations. Phishing is dynamic in nature;the hackers change several tricks to deceive the victims in multiple ways. It is importan... 详细信息
来源: 评论
Secure and sustainable food processing supply chain framework based on Hyperledger Fabric technology
Cyber Security and Applications
收藏 引用
Cyber security and Applications 2024年 2卷
作者: Rahaman, Mosiur Tabassum, Farhin Arya, Varsha Bansal, Ritika International Center for AI and Cyber Security Research and Innovations (CCRI) & Department of Computer Science and Information Engineering Asia University Taiwan China Indian Institute of Technology Kharagpur India Department of Business Administration Asia University Taiwan China Department of Electrical and Computer Engineering Lebanese American University Beirut 1102 Lebanon Center for Interdisciplinary Research University of Petroleum and Energy Studies (UPES) Dehradun India Insights2Techinfo India UCRD Chandigarh University Chandigarh India
Food processing supply chains are gradually facing the problem of incorporation and sustainability because of the complexity of many participants involved in the supply chain network. Customers are very aware of and p... 详细信息
来源: 评论
Quasi-Newton optimised Kolmogorov-Arnold Networks for wind farm power prediction
收藏 引用
Heliyon 2024年 第23期10卷 e40799页
作者: Mubarak, Auwalu Saleh Ameen, Zubaida Said Mati, Sagiru Lasisi, Ayodele Naveed, Quadri Noorulhasan Abdulkadir, Rabiu Aliyu Operational Research Centre in Healthcare Near East University TRNC Mersin 10 Nicosia 99138 Turkey Department of Electrical Engineering Aliko Dangote University of Science and Technology Kano Wudil Nigeria Department of Biochemistry Northwest University Kano Nigeria Department of Economics Northwest University Kano Nigeria Department of Computer Science College of Computer Science King Khalid University Abha Saudi Arabia Department of Mechatronics Aliko Dangote University of Science and Technology Kano Nigeria Center for Cyber Security Faculty of Information Science and Technology UKM BANGI Malaysia
Having accurate and effective wind energy forecasting that can be easily incorporated into smart networks is important. Appropriate planning and energy generation predictions are necessary for these infrastructures. T... 详细信息
来源: 评论
A Tutorial on Movable Antennas for Wireless Networks
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Zhu, Lipeng Ma, Wenyan Mei, Weidong Zeng, Yong Wu, Qingqing Ning, Boyu Xiao, Zhenyu Shao, Xiaodan Zhang, Jun Zhang, Rui National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore National Key Laboratory of Wireless Communications Chengdu611731 China Southeast University National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Beihang University School of Electronic and Information Engineering Beijing100191 China University of Waterloo Department of Electrical and Computer Engineering WaterlooONN2L 3G1 Canada Beijing Institute of Technology State Key Laboratory of CNS/ATM Miit Key Laboratory of Complex-field Intelligent Sensing Beijing100081 China The Chinese University of HongKong School of Science and Engineering Shenzhen Research Institute of Big Data Guangdong Shenzhen518172 China
Movable antenna (MA) has been recognized as a promising technology to enhance the performance of wireless communication and sensing by enabling antenna movement. Such a significant paradigm shift from conventional fix... 详细信息
来源: 评论
Access Control Based on Self-Sovereign Identity
Access Control Based on Self-Sovereign Identity
收藏 引用
International Conference on Electronics, computers and Artificial Intelligence (ECAI)
作者: Stefania Loredana Nita Marius Iulian Mihailescu Valentina Marascu Marius Rogobete Department of Computers and Cybersecurity Faculty of Information Systems and Cyber Security Military Technical Academy “Ferdinand I” Bucharest Romania Scientific Research Center in Mathematics and Informatics Faculty of Engineering and Computer Science “Spiru Haret” University Bucharest Romania Low Temperature Plasma Department National Institute for Laser Plasma and Radiation Physics Bucharest Romania Telematics Harman International Bucharest Romania
In the rapidly growing interest in digital identity management, there is an important shift toward adopting verifiable credentials, often based on blockchain technology. This transition highlights a growing interest i... 详细信息
来源: 评论
EEG based Parkinson Detection through Supervised information Enhanced Contrastive Learning
EEG based Parkinson Detection through Supervised Information...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jian Song Xiang Li Wenjing Jiang Chunxiao Wang Zhigang Zhao Jialiang Lv Bin Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Geriatric Neurology Key Laboratory of Cardiovascular Proteomics of Shandong Province Qilu Hospital of Shandong University Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study presents a novel Supervised information Enhanced Contrastive Learning Algorithm for Parkinson’s Disease Detection (SI-CLAPD) based on Electroencephalography (EEG). SI-CLAPD performs contrastive learning in...
来源: 评论
人类泛基因组参考图谱发布开启基因组学领域的新篇章
收藏 引用
science Bulletin 2023年 第14期68卷 1484-1487页
作者: 王博 党宁馨 杨晓飞 徐书华 叶凯 School of Automation Science and Engineering Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China MOE Key Lab for Intelligent Networks&Networks Security Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China Genome Institute the First Affiliated Hospital of Xi’an Jiaotong UniversityXi’an 710061China School of Computer Science and Technology Faculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China State Key Laboratory of Genetic Engineering Human Phenome InstituteZhangjiang Fudan International Innovation CenterCenter for Evolutionary BiologySchool of Life SciencesFudan UniversityShanghai 200032China Ministry of Education Key Laboratory of Contemporary Anthropology Collaborative Innovation Center for Genetics and DevelopmentFudan UniversityShanghai 200032China Department of Liver Surgery and Transplantation Liver Cancer InstituteZhongshan HospitalFudan UniversityShanghai 200032China School of Life Science and Technology Shanghai Tech UniversityShanghai 201210China
The significance of DNA sequencing in advancing medicalresearch,improving healthcare practices,and enhancing ourunderstanding of human evolution cannot be *** yearmarks the 20th anniversary of the completion of the Hu... 详细信息
来源: 评论
A Graph Convolution Neural Network Based Method for Insider Threat Detection
A Graph Convolution Neural Network Based Method for Insider ...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Kexiong Fei Jiang Zhou Lin Su Weiping Wang Yong Chen Fan Zhang School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Computer Science Texas Tech University Lubbock USA Information Technology Center China Mobile Beijing China
In this research, we propose Log2Graph, a new insider threat detection method based on graph convolution neural network (GCN). This method first retrieves the corresponding logs and features from log files through fea... 详细信息
来源: 评论
Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme
Design of a Secure Machine Learning-Based Malware Detection ...
收藏 引用
Communications, Computing, Cybersecurity, and Informatics (CCCI), International Conference on
作者: Pankaj Kumar Mohammad S. Obaidat Piyush Pandey Mohammad Wazid Ashok Kumar Das Devesh Pratap Singh Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India King Abdullah II School of Information Technology The University of Jordan Amman Jordan School of Computing SRM University Jordan University of Science and Technology Beijing Beijing China School of Computing SRM University Kattankulathur TN India Center for Security Theory Algorithmic Research International Institute of Information Technology Hyderabad India
Today's world is rapidly growing towards the advanced concept of technology. Technology nowadays is at its peak of development and has great advantages in all fields of work, whether it is in industrial automation...
来源: 评论
Preface
Lecture Notes in Networks and Systems
收藏 引用
Lecture Notes in Networks and Systems 2024年 896卷 v-vi页
作者: Roy, Nihar Ranjan Tanwar, Sudeep Batra, Usha Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida India Department of Computer Science Engineering Shri Vishwakarma Skill University Haryana Gurugram India Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat Ahmedabad India
来源: 评论