咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 323 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 456 篇 工学
    • 361 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 123 篇 信息与通信工程
    • 82 篇 电气工程
    • 71 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 186 篇 理学
    • 94 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 120 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 41 篇 医学
    • 35 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 33 篇 法学
    • 17 篇 社会学
    • 16 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 19 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 cryptography
  • 13 篇 information secu...
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 9 篇 reliability
  • 9 篇 wireless sensor ...
  • 9 篇 predictive model...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 14 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim
  • 8 篇 khattab m. ali a...

语言

  • 618 篇 英文
  • 56 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
680 条 记 录,以下是421-430 订阅
排序:
Co-Designed Communication and Computing for Data Reliability in Industrial Cyber-Physical Systems with Cloud-Fog Automation
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Fan, Xiaoxuan Deng, Xianjun Liu, Shenghao Zhu, Chenlu Zhou, Xinlei Yi, Lingzhi Wu, Libing Park, Jong Hyuk Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Wuhan Research Institute of Posts and Telecommunications China Zhongnan University of Economics and Law School of Information Engineering China Wuhan University School of Cyber Science and Engineering China Seoul National University of Science and Technology Department of Computer Science and Engineering Korea Republic of
The Cloud-Fog Automation is a newly proposed digital industrial automation architecture aimed at accelerating the integration and collaboration of communication, computing, and control towards next-generation cyber-ph... 详细信息
来源: 评论
Private blockchain-envisioned security framework for AI-enabled IoT-based drone-aided healthcare services  2
Private blockchain-envisioned security framework for AI-enab...
收藏 引用
2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, DroneCom 2020
作者: Wazid, Mohammad Bera, Basudeb Mitra, Ankush Das, Ashok Kumar Ali, Rashid Department of Computer Science and Engineering Graphic Era Deemed to Be University Dehradun248 002 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India School of Intelligent Mechatronics Engineering Sejong University Seoul Korea Republic of
Internet of Drones (IoD) architecture is designed to support a coordinated access for the airspace using the unmanned aerial vehicles (UAVs) known as drones. Recently, IoD communication environment is extremely useful... 详细信息
来源: 评论
Practical limitations on robustness and scalability of quantum Internet
arXiv
收藏 引用
arXiv 2023年
作者: Sadhu, Abhishek Somayajula, Meghana Ayyala Horodecki, Karol Das, Siddhartha Raman Research Institute Karnataka Bengaluru560080 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Gachibowli Telangana Hyderabad500032 India Department of Computer Science Engineering G Narayanamma Institute of Technology and Science Telangana Hyderabad500104 India Institute of Informatics National Quantum Information Centre Faculty of Mathematics Physics and Informatics University of Gdańsk Wita Stwosza 57 Gdańsk80-308 Poland International Centre for Theory of Quantum Technologies University of Gdańsk Wita Stwosza 63 Gdańsk80-308 Poland
The realization of a desirably functional quantum Internet is hindered by fundamental and practical challenges such as high loss during transmission of quantum systems, decoherence due to interaction with the environm... 详细信息
来源: 评论
Towards adversarial patch analysis and certified defense against crowd counting
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Qiming Zou, Zhikang Zhou, Pan Ye, Xiaoqing Wang, Binghui Li, Ang School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan China Baidu Inc. Shenzhen China The Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science Illinois Institute of Technology Chicago United States Department of Electrical and Computer Engineering Duke University Durham United States
Crowd counting has drawn much attention due to its importance in safety-critical surveillance systems. Especially, deep neural network (DNN) methods have significantly reduced estimation errors for crowd counting miss... 详细信息
来源: 评论
Incompressibility of H-free edge modification problems: Towards a dichotomy
arXiv
收藏 引用
arXiv 2020年
作者: Marx, Dániel Sandeep, R.B. CISPA Helmholtz Center for Information Security Germany Department of Computer Science and Engineering Indian Institute of Technology Dharwad India
Given a graph G and an integer k, the H-free Edge Editing problem is to find whether there exist at most k pairs of vertices in G such that changing the adjacency of the pairs in G results in a graph without any induc... 详细信息
来源: 评论
Heart Disease Prediction Using Machine Learning Method
Heart Disease Prediction Using Machine Learning Method
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Mafia Rasheed Muhammad Adnan Khan Nouh Sabri Elmitwally Ghassan F. Issa Taher M. Ghazal Hamza Alrababah Beenu Mago Department of Computer Science Agriculture University Faisalabad Pakistan Faculty of Computing Riphah School of Computing & Innovation Riphah International University Lahore Pakistan Faculty of Computing Engineering and the Built Environment Birmingham City University Birmingham United Kingdom School of Information Technology Skyline University College University City Sharjah Sharjah UAE Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Selangor Malaysia School of Information Technology Skyline University College Sharjah UAE
The heart disease is also known as coronary artery disease, many hearts affecting symptoms that are very common nowadays and causes death. It is a challenging task to diagnose heart diseases without any intelligent di... 详细信息
来源: 评论
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
arXiv
收藏 引用
arXiv 2023年
作者: Sami, H. Hammoud, A. Arafeh, M. Wazzeh, M. Arisdakessian, S. Chahoud, M. Wehbi, O. Ajaj, M. Mourad, A. Otrok, H. Abdel Wahab, O. Mizouni, R. Bentahar, J. Talhi, C. Dziong, Z. Damiani, E. Guizani, M. Concordia Institute for Information Systems Engineering Concordia University MontréalQC Canada Department of Electrical Engineering École de Technologie Supérieure Montréal Canada Department of Software and IT engineering École de Technologie Supérieure Montréal Canada Department of Computer and Software Engineering Polytechnique Montréal Montreal Canada Cyber Security Systems and Applied AI Research Center Department of CSM Lebanese American University Beirut Lebanon Division of Science New York University Abu Dhabi United Arab Emirates Department of EECS Khalifa University Abu Dhabi United Arab Emirates Department of ML Mohamed Bin Zayed University of Artificial Intelligence Abu Dhabi United Arab Emirates
The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many discipl... 详细信息
来源: 评论
Automatic firmware emulation through invalidity-guided knowledge inference (extended version)
arXiv
收藏 引用
arXiv 2021年
作者: Zhou, Wei Guan, Le Liu, Peng Zhang, Yuqing National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences China Department of Computer Science University of Georgia United States College of Information Sciences and Technology The Pennsylvania State University United States School of Cyber Engineering Xidian University China School of Computer Science and Cyberspace Security Hainan University China
Emulating firmware for microcontrollers is challenging due to the tight coupling between the hardware and firmware. This has greatly impeded the application of dynamic analysis tools to firmware analysis. The state-of... 详细信息
来源: 评论
Modular Extremely Large-Scale Array Communication: Near-Field Modelling and Performance Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Li, Xinrui Lu, Haiquan Zeng, Yong Jin, Shi Zhang, Rui The National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China The Purple Mountain Laboratories Nanjing211111 China The Chinese University of Hong Kong Shenzhen Shenzhen Research Institute of Big Data Shenzhen518172 China The Department of Electrical and Computer Engineering National University of Singapore 117583 Singapore
This paper investigates wireless communications based on a new antenna array architecture, termed modular extremely large-scale array (XL-array), where an extremely large number of antenna elements are regularly arran... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论