咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是391-400 订阅
排序:
Drones network security enhancement using smart based block-chain technology
Drones network security enhancement using smart based block-...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Fatima Fayyaz Taher M. Ghazal Mohammed A. M. Afifi Sagheer Abbas Hussam Al Hamadi Department of Computer Science Comsats University Islamabad Lahore School of Information Technology Skyline University College University City Sharjah UAE Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Center for Cyber Security Bangi Selangor Malaysia National College of Business Administration & Economics Lahore Pakistan College of Engineering and IT University of Dubai Dubai
Drones, also known as unmanned aerial vehicles (UAVs), can sometimes put just on trying to fly Internet of Things (IoT) environment to perform a variety of tasks, including monitoring systems, crisis management, photo... 详细信息
来源: 评论
A Survey on Explainable Artificial Intelligence for Cybersecurity
arXiv
收藏 引用
arXiv 2023年
作者: Rjoub, Gaith Bentahar, Jamal Wahab, Omar Abdel Mizouni, Rabeb Song, Alyssa Cohen, Robin Otrok, Hadi Mourad, Azzam King Hussein School of Computing Sciences Princess Sumaya University for Technology Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Department of Computer and Software Engineering Polytechnique Montréal Montréal Canada Electrical Engineering and Computer Science Department Khalifa University Abu Dhabi United Arab Emirates Department of EECS Khalifa University Abu Dhabi United Arab Emirates David R. Cheriton School of Computer Science University of Waterloo Canada Cyber Security Systems and Applied AI Research Center Dept. of CSM Lebanese American University Lebanon Division of Science New York University Abu Dhabi United Arab Emirates
The "black-box" nature of artificial intelligence (AI) models has been the source of many concerns in their use for critical applications. Explainable Artificial Intelligence (XAI) is a rapidly growing resea... 详细信息
来源: 评论
SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data
SynFacePAD 2023: Competition on Face Presentation Attack Det...
收藏 引用
IEEE International Joint Conference on Biometrics (IJCB)
作者: Meiling Fang Marco Huber Julian Fierrez Raghavendra Ramachandra Naser Damer Alhasan Alkhaddour Maksim Kasantcev Vasiliy Pryadchenko Ziyuan Yang Huijie Huangfu Yingyu Chen Yi Zhang Yuchen Pan Junjun Jiang Xianming Liu Xianyun Sun Caiyong Wang Xingyu Liu Zhaohua Chang Guangzhe Zhao Juan Tapia Lazaro Gonzalez-Soler Carlos Aravena Daniel Schulz Fraunhofer Institute for Computer Graphics Research IGD Darmstadt Germany Department of Computer Science TU Darmstadt Darmstadt Germany Biometrics and Data Pattern Analytics Lab Universidad Autonoma de Madrid Spain Norwegian University of Science and Technology (NTNU) Norway ID R&D Inc New York US School of Cyber Science and Engineering Sichuan University Chengdu China School of Computer Science and Technology Harbin Institute of Technology Harbin China School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture China Biometrics and Security Research Group Hochschule Darmstadt Darmstadt Germany I+D Vision Center Santiago Chile
This paper presents a summary of the Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data (SynFacePAD 2023) held at the 2023 International Joint Conference on Biometrics (IJ...
来源: 评论
SynFacePAD 2023: Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data
arXiv
收藏 引用
arXiv 2023年
作者: Fang, Meiling Huber, Marco Fierrez, Julian Ramachandra, Raghavendra Damer, Naser Alkhaddour, Alhasan Kasantcev, Maksim Pryadchenko, Vasiliy Yang, Ziyuan Huangfu, Huijie Chen, Yingyu Zhang, Yi Pan, Yuchen Jiang, Junjun Liu, Xianming Sun, Xianyun Wang, Caiyong Liu, Xingyu Chang, Zhaohua Zhao, Guangzhe Tapia, Juan Gonzalez-Soler, Lazaro Aravena, Carlos Schulz, Daniel Fraunhofer Institute for Computer Graphics Research IGD Darmstadt Germany Department of Computer Science TU Darmstadt Darmstadt Germany Biometrics and Data Pattern Analytics Lab Universidad Autonoma de Madrid Spain Norway ID R&D Inc. New York United States School of Cyber Science and Engineering Sichuan University Chengdu China School of Computer Science and Technology Harbin Institute of Technology Harbin China School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture China Biometrics and Security Research Group Hochschule Darmstadt Darmstadt Germany I+D Vision Center Santiago Chile
This paper presents a summary of the Competition on Face Presentation Attack Detection Based on Privacy-aware Synthetic Training Data (SynFacePAD 2023) held at the 2023 International Joint Conference on Biometrics (IJ... 详细信息
来源: 评论
GSLB: The Graph Structure Learning Benchmark
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhixun Wang, Liang Sun, Xin Luo, Yifan Zhu, Yanqiao Chen, Dingshuo Luo, Yingtao Zhou, Xiangxin Liu, Qiang Wu, Shu Yu, Jeffrey Xu Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong Center for Research on Intelligent Perception Computing State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence University of Chinese Academy of Sciences China Department of Automation University of Science and Technology of China China School of Cyberspace Security Beijing University of Posts and Telecommunications China Department of Computer Science University of California Los Angeles United States Heinz College of Information Systems and Public Policy Machine Learning Department School of Computer Science Carnegie Mellon University United States
Graph Structure Learning (GSL) has recently garnered considerable attention due to its ability to optimize both the parameters of Graph Neural Networks (GNNs) and the computation graph structure simultaneously. Despit... 详细信息
来源: 评论
security Threats and their Mitigations on the Operating System of Internet of Medical Things (IoMT)
Security Threats and their Mitigations on the Operating Syst...
收藏 引用
International Conference on Mathematics, Actuarial science, computer science and Statistics (MACS)
作者: Taher M. Ghazal Mohammad Kamrul Hasan Ghassan F. Issa Nidal A. Al-Dmour Saif. E. A. Alnawayseh Waleed T. Al-Sit Rashed Aldhaheri School of Information Technology Skyline University College University City Sharjah Sharjah UAE Faculty of Information Science & Technology Universiti Kebansaan Malaysia (UKM) Center for Cyber Security Selangor Malaysia Department of Computer Engineering Mutah University Al-Karak Jordan Department of Electric Engineering Mutah University Karak Jordan Higher Colleges of Technology Dubai United Arab Emirates
The potential security dangers of IoMT influence the privacy, uprightness, realness and accessibility of its information and the related assets. In spite of the fact that IoMT is engaged with enormous scope administra... 详细信息
来源: 评论
VSRQ: Quantitative Assessment Method for Safety Risk of Vehicle Intelligent Connected System
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Tian Guan, Wenshan Miao, Hao Huang, Xiujie Liu, Zhiquan Wang, Chaonan Guan, Quanlong Fang, Liangda Duan, Zhifei Department of Cyberspace Security College of Information Science and Technology Jinan University Guangzhou511486 China Department of Computer Science College of Information Science and Technology Jinan University Guangzhou510632 China College of Information Science and Technology Jinan University Guangdong Institution of Smart Education Jinan University Guangzhou510632 China College of Cyber Security Jinan University Guangzhou510632 China Guangdong Gene Data Processing and Analysis Engineering Research Center China Pazhou Laboratory Guangzhou510330 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangzhou XPeng Motors Technology Co. Ltd No.8 Songgang Road Changxing Street Cencun Tianhe District Guangzhou China
The field of intelligent connected in modern vehicles continues to expand, and the functions of vehicles become more and more complex with the development of the times. This has also led to an increasing number of veh... 详细信息
来源: 评论
Expression of Concern for: security Threats and their Mitigations on the Operating System of Internet of Medical Things (IoMT)
Expression of Concern for: Security Threats and their Mitiga...
收藏 引用
International Conference on Mathematics, Actuarial science, computer science and Statistics (MACS)
作者: Taher M. Ghazal Mohammad Kamrul Hasan Ghassan F. Issa Nidal A. Al-Dmour Saif. E. A. Alnawayseh Waleed T. Al-Sit Rashed Aldhaheri School of Information Technology Skyline University College University City Sharjah Sharjah UAE Faculty of Information Science & Technology Universiti Kebansaan Malaysia (UKM) Center for Cyber Security Selangor Malaysia Department of Computer Engineering Mutah University Al-Karak Jordan Department of Electric Engineering Mutah University Karak Jordan Higher Colleges of Technology Dubai United Arab Emirates
The potential security dangers of IoMT influence the privacy, uprightness, realness and accessibility of its information and the related assets. In spite of the fact that IoMT is engaged with enormous scope administra...
来源: 评论
A high-frequency mobility big-data reveals how COVID-19 spread across professions, locations and age groups
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Chen Zhang, Jialu Hou, Xiaoyue Yeung, Chi Ho Zeng, An College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China Hebei Key Laboratory of Network and Information Security Shijiazhuang050024 China Hebei Provincial Engineering Research Center for Supply Chain Big Data Analytics and Data Security Shijiazhuang050024 China Department of Science and Environmental Studies The Education University of Hong Kong Hong Kong School of Systems Science Beijing Normal University Beijing100875 China
As infected and vaccinated population increases, some countries decided not to impose non-pharmaceutical intervention measures anymore and to coexist with COVID-19. However, we do not have a comprehensive understandin... 详细信息
来源: 评论
Dual-UAV Aided Secure Dynamic G2U Communication
Dual-UAV Aided Secure Dynamic G2U Communication
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Hongyue Kang Wei Li Jelena Mišić Vojislav B. Mišić Xiaolin Chang Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University China Beijing Jinghang Computation and Communication Research Institute China The Classified Information Carrier Safety Management Engineering Technology Research Center of Beijing Department of Computer Science Ryerson University Canada
Unmanned aerial vehicle (UAV) communication is easily wiretapped by malignant nodes due to the broadcast nature of line-of-sight (LoS) wireless channels. To tackle this problem, this paper investigates a dual-UAV aide... 详细信息
来源: 评论