咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是371-380 订阅
排序:
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
收藏 引用
Internet of Things (Netherlands) 2023年 22卷
作者: Zahoor, Amina Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Ayub, Muhammad Faizan Conti, Mauro Das, Ashok Kumar Department of Computer Science COMSATS University Islamabad Sahiwal Campus 57000 Pakistan Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Sahiwal 57000 Pakistan Department of Mathematics University of Padua Padua 35131 Italy Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India
IoT-enabled Smart Grid (IoT-SG) is an emerging paradigm that enables the bi-direction communication of IoT devices and hardware to efficiently collect and transmit the consumer's information over the Internet. How... 详细信息
来源: 评论
Deep Learning for the Recognition of Skin Cancer
Deep Learning for the Recognition of Skin Cancer
收藏 引用
Advanced computer Applications (ACA), International Conference on
作者: Israa Akram Fadhil Alzuabidi Layla safwat Jamil Amjed Abbas Ahmed Saif Aamer Fadhil Mohammad Kamrul Hasan Ahmed Salman Ibraheem Continuing of Education/Collage of Arts/University of Baghdad Baghdad Iraq College of agricultural engineering sciences/university of Baghdad Baghdad Iraq Department of Computer Engineering Imam Al-Kadhum College (IKC) Baghdad Iraq Faculty of Information Science and Technology Center for Cyber Security Universiti Kebangsaan Malaysia Bangi Malaysia Imam Al-Kadhum College (IKC) Baghdad Iraq
The health industry has kept growing over the years with breakthroughs. However, in skin disease recognition such as cancer, there is still a battle to improve how recognition is implemented to get the desired result....
来源: 评论
Approximately Counting Answers to Conjunctive Queries with Disequalities and Negations
arXiv
收藏 引用
arXiv 2021年
作者: Focke, Jacob Goldberg, Leslie Ann Roth, Marc Živný, Stanislav CISPA Helmholtz Center for Information Security Germany Department of Computer Science University of Oxford United Kingdom School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom
We study the complexity of approximating the number of answers to a small query in a large database D. We establish an exhaustive classification into tractable and intractable cases if is a conjunctive query possibly ... 详细信息
来源: 评论
Integrated high-performance error correction for continuous-variable quantum key distribution
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Chuang Li, Yang Ma, Li Yang, Jie Huang, Wei Sun, Ao Wang, Heng Luo, Yujie Li, Yong Chen, Ziyang Lau, Francis C.M. Zhang, Yichen Yu, Song Guo, Hong Xu, Bingjie National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China College of Computer Science Chongqing University Chongqing400044 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Center for Quantum Information Technology Peking University Beijing100871 China Department of Electronic and Information Engineering Hong Kong Polytechnic University Hong Kong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
An integrated error-correction scheme with high throughput, low frame errors rate (FER) and high reconciliation efficiency under low signal to noise ratio (SNR) is one of the major bottlenecks to realize high-performa... 详细信息
来源: 评论
Near-Field Beam Focusing Pattern and Grating Lobe Characterization for Modular XL-Array
arXiv
收藏 引用
arXiv 2023年
作者: Li, Xinrui Dong, Zhenjun Zeng, Yong Jin, Shi Zhang, Rui National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Shenzhen Research Institute of Big Data Shenzhen518172 China Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore
In this paper, we investigate the near-field modelling and analyze the beam focusing pattern for modular extremely large-scale array (XL-array) communications. As modular XL-array is physically and electrically large ... 详细信息
来源: 评论
Semantic Learning and Emulation Based Cross-platform Binary Vulnerability Seeker
arXiv
收藏 引用
arXiv 2022年
作者: Gao, Jian Jiang, Yu Liu, Zhe Yang, Xin Wang, Cong Jiao, Xun Yang, Zijiang Sun, Jiaguang The School of Software Tsinghua University Beijing National Research Center for Information Science and Technology Key Laboratory for Information System Security Ministry of Education Beijing100084 China The College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China The Department of Electrical and Computer Engineering Villanova University VillanovaPA19085 United States The Department of Computer Science Western Michigan University KalamazooMI49008 United States
Clone detection is widely exploited for software vulnerability search. The approaches based on source code analysis cannot be applied to binary clone detection because the same source code can produce significantly di... 详细信息
来源: 评论
Decentralised, Collaborative, and Privacy-preserving Machine Learning for Multi-Hospital Data
arXiv
收藏 引用
arXiv 2024年
作者: Fang, Congyu Dziedzic, Adam Zhang, Lin Oliva, Laura Verma, Amol Razak, Fahad Papernot, Nicolas Wang, Bo Department of Computer Science University of Toronto Canada Peter Munk Cardiac Centre University Health Network Canada Vector Institute Toronto Canada CISPA Helmholtz Center for Information Security Germany Department of Electrical and Computer Engineering University of Toronto Canada Simon Fraser University Canada St. Michael’s Hospital Unity Health Toronto Canada Department of Medicine University of Toronto Canada Institute of Health Policy Management and Evaluation University of Toronto Canada Department of Laboratory Medicine and Pathobiology Temerty Faculty of Medicine University of Toronto Canada
Background: Machine Learning (ML) has demonstrated its great potential on medical data analysis. Large datasets collected from diverse sources and settings are essential for ML models in healthcare to achieve better a... 详细信息
来源: 评论
ZTEI: Zero-Trust and Edge Intelligence Empowered Continuous Authentication for Satellite Networks
ZTEI: Zero-Trust and Edge Intelligence Empowered Continuous ...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Peiyu Fu Jun Wu Xi Lin Ao Shen School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai China Collaborative Innovation Center of Shanghai Industrial Internet Shanghai China Faculty of Science and Engineering Waseda University Japan Department of Computer Science Faculty of Engineering The University of Hong Kong Hong Kong China
The integration of satellite communication technology and terrestrial infrastructure has resulted in an un-precedented increase in network services covering the world. The main effect of the rapid growth of satellite ... 详细信息
来源: 评论
A novel binary modified beluga whale optimization algorithm using ring crossover and probabilistic state mutation for enhanced bladder cancer diagnosis
收藏 引用
Informatics in Medicine Unlocked 2024年 50卷
作者: Gharaibeh, Hasan Alawad, Noor Aldeen Nasayreh, Ahmad Al Mamlook, Rabia Emhamed Makhadmeh, Sharif Naser Bashkami, Ayah Abualigah, Laith Ezugwu, Absalom E. Computer Science Department Faculty of Information Technology and Computer Sciences Yarmouk University Irbid 21163 Jordan Department of Business Administration Trine University IN United States Department of Mechanical and Industrial Engineering University of Zawia Tripoli Libya Department of Information Technology King Abdullah II School of Information Technology The University of Jordan Amman 11942 Jordan Department Medical Laboratory Sciences – Faculty of Science Al Balqa Applied University Salt 19117 Jordan Department of Cyber Security and Cloud Computing Faculty of Information Technology Applied Science Private University Amman 11937 Jordan Artificial Intelligence and Sensing Technologies (AIST) Research Center University of Tabuk Tabuk 71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq 25113 Jordan MEU Research Unit Middle East University Amman 11831 Jordan Applied science research center Applied science private university Amman 11931 Jordan Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura 140401 India Unit for Data Science and Computing North-West University 11 Hofman Street Potchefstroom 2520 South Africa Artificial Intelligence Research Center (AIRC) College of Engineering and Information Technology Ajman University Ajman P.O. Box 346 United Arab Emirates
Bladder cancer (BC) remains a significant global health challenge, requiring the development of accurate predictive models for diagnosis. In this study, a new Binary Modified White Whale Optimization (B-MBWO) algorith... 详细信息
来源: 评论
Transferring Annotator- and Instance-dependent Transition Matrix for Learning from Crowds
arXiv
收藏 引用
arXiv 2023年
作者: Li, Shikun Xia, Xiaobo Deng, Jiankang Ge, Shiming Liu, Tongliang The Institute of Information Engineering Chinese Academy of Sciences Beijing100095 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Sydney AI Center School of Computer Science Faculty of Engineering The University of Sydney DarlingtonNSW2008 Australia The Department of Computing Imperial College London LondonSW7 2BX United Kingdom
Learning from crowds describes that the annotations of training data are obtained with crowd-sourcing services. Multiple annotators each complete their own small part of the annotations, where labeling mistakes that d... 详细信息
来源: 评论