咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是581-590 订阅
排序:
A reputation search mechanism based on ant colony and grouping
收藏 引用
Journal of Computational information Systems 2013年 第14期9卷 5627-5634页
作者: Luo, Yonglong Sun, Lingling Guo, Liangmin Chen, Fulong Fu, Tianyu Department of Computer Science and Technology Anhui Normal University Wuhu 241003 China Engineering Technology Research Center of Network and Information Security Anhui Normal University Wuhu 241003 China
In reputation systems, how to obtain node's reputation is a crucial issue. To solve this problem, a two-layer reputation search mechanism based on ant colony and grouping is proposed. The first layer is the monito... 详细信息
来源: 评论
Towards accountable authority attribute-based encryption
收藏 引用
High Technology Letters 2013年 第1期19卷 82-87页
作者: 王永涛 Chen Kefei Long Yu Department of Computer Science and Engineering Shanghai Jiao Tong University China Information Technology Security Evaluation Center Shanghai Key Laboratory of Scalable Computing and System Shanghai JiaoTong University
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ... 详细信息
来源: 评论
Breast Cancer Nodes Detection Using Ultrasonic Microscale Subarrayed MIMO RADAR
收藏 引用
Advances in Bioinformatics 2014年 第2014期2014卷 797013页
作者: Taparugssanagorn, Attaphongse Siwamogsatham, Siwaruk Pomalaza-Ráez, Carlos Wireless Information Security and Eco-Electronics Research Unit National Electronics and Computer Technology Center 112 Phahon Yothin Road Klong 1 Klong Luang Pathum Thani 12120 Thailand College of Engineering Technology and Computer Science Department of Engineering Purdue University Fort Wayne 46805 IN United States
This paper proposes the use of ultrasonic microscale subarrayed MIMO RADARs to estimate the position of breast cancer nodes. The transmit and receive antenna arrays are divided into subarrays. In order to increase the... 详细信息
来源: 评论
Efficient control synthesis for augmented finite transition systems with an application to switching protocols
Efficient control synthesis for augmented finite transition ...
收藏 引用
American Control Conference
作者: Fei Sun Necmiye Ozay Eric M. Wolff Jun Liu Richard M. Murray Information Security Center Beijing University of Posts and Telecommunications China Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI 48109 USA Department of Control and Dynamical Systems California Institute of Technology Pasadena CA 91125 USA Department of Automatic Control and Systems Engineering University of Sheffield Mappin Street Sheffield S1 3JD United Kingdom
Augmented finite transition systems generalize nondeterministic transition systems with additional liveness conditions. We propose efficient algorithms for synthesizing control protocols for augmented finite transitio... 详细信息
来源: 评论
Validating security design patterns application using model testing
Validating security design patterns application using model ...
收藏 引用
2013 8th International Conference on Availability, Reliability and security, ARES 2013
作者: Kobashi, Takanori Yoshioka, Nobukazu Okubo, Takao Kaiya, Haruhiko Washizaki, Hironori Fukazawa, Yoshiaki Waseda University Computer Science and Engineer Department Tokyo Japan GRACE Center National Institute of Informatics Tokyo Japan Information Security Division Institute of Information Security Yokohama Japan Architecture Research Division National Institute of Informatics Tokyo Japan Waseda University Computer Science and Engineering Tokyo Japan
Software developers are not necessarily security specialists, security patterns provide developers with the knowledge of security specialists. Although security patterns are reusable and include security knowledge, it... 详细信息
来源: 评论
Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015) : Jeddah, Kingdom of Saudi Arabia. 30 November - 3 December 2015
收藏 引用
BMC genomics 2016年 第6期17 Suppl 6卷 487页
作者: Jerry W. Shay Noriko Homma Ruyun Zhou Muhammad Imran Naseer Adeel G. Chaudhary Mohammed Al-Qahtani Nobutaka Hirokawa Maryam Goudarzi Albert J. Fornace Saleh Baeesa Deema Hussain Mohammed Bangash Fahad Alghamdi Hans-Juergen Schulten Angel Carracedo Ishaq Khan Hanadi Qashqari Nawal Madkhali Mohamad Saka Kulvinder S. Saini Awatif Jamal Jaudah Al-Maghrabi Adel Abuzenadah Adeel Chaudhary Mohammed Al Qahtani Ghazi Damanhouri Heba Alkhatabi Anne Goodeve Laura Crookes Nikolas Niksic Nicholas Beauchamp Adel M. Abuzenadah Jim Vaught Bruce Budowle Mourad Assidi Abdelbaset Buhmeida Leena Merdad Sudhir Kumar Sayaka Miura Karen Gomez Mahmood Rasool Ahmed Rebai Sajjad Karim Hend F. Nour Eldin Heba Abusamra Elham M. Alhathli Nada Salem Mohammed H. Al-Qahtani Hossam Faheem Ashok Agarwa Eberhard Nieschlag Joachim Wistuba Oliver S. Damm Mohd A. Beg Taha A. Abdel-Meguid Hisham A. Mosli Osama S. Bajouh Serdar Coskun Muhammad Abu-Elmagd Ashraf Dallol Sahar Hakamy Wejdan Al-Qahtani Asia Al-Harbi Shireen Hussain Burak Ozkosem Rick DuBois Safia S. Messaoudi Maryam T. Dandana Touhami Mahjoub Wassim Y. Almawi S. Abdalla M. Nabil Al-Aama Asmaa Elzawahry Tsuyoshi Takahashi Sachiyo Mimaki Eisaku Furukawa Rie Nakatsuka Isao Kurosaka Takahiko Nishigaki Hiromi Nakamura Satoshi Serada Tetsuji Naka Seiichi Hirota Tatsuhiro Shibata Katsuya Tsuchihara Toshirou Nishida Mamoru Kato Sajid Mehmood Naeem Mahmood Ashraf Awais Asif Muhammad Bilal Malik Siddique Mehmood Aadil Hussain Qazi Mohammad Sajid Jamal Mughees Uddin Siddiqui Mohammad A. Alzohairy Mohammad A. Al Karaawi Taoufik Nedjadi Heba Al-Khattabi Adel Al-Ammari Ahmed Al-Sayyad Hédia Zitouni Nozha Raguema Marwa Ben Ali Wided Malah Raja Lfalah Wassim Almawi Mohammed Elanbari Andrey Ptitsyn Sana Mahjoub Rabeb El Ghali Bechir Achour Nidhal Ben Amor Brahim N’siri Hamid Morjani Esam Azhar Vera Chayeb Maryam Dendena Hedia Zitouni Khedija Zouari-Limayem Bassem Refaat Ahmed M. Ashshi Sarah A. Batwa Hazem Ramadan Amal Awad Ahmed Ateya Adel Galal Ahmed El-Shemi Ahmad Ashshi Mohammed Basalamah Youjin Na Cha University of Texas Southwestern Medical Center Dallas USA Department of Cell Biology and Anatomy Graduate School of Medicine the University of Tokyo Tokyo Japan Center of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Department of Biochemistry and Molecular & Cellular Biology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Oncology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Radiation Medicine Lombardi Comprehensive Cancer Center Georgetown University Washington USA Center of Excellence in Genomic Medicine Research (CEGMR) King Abdulaziz University Jeddah Kingdom of Saudi Arabia King Fahd Medical Research Centre King Abdulaziz University Jeddah Saudi Arabia Centre of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Sheffield Diagnostic Genetic Service Sheffield Children’s NHS Foundation Trust Western Bank Sheffield UK Center of Innovations in Personalized Medicine King Abdulaziz University Jeddah Saudi Arabia President ISBER Editor-in-Chief Biopreservation & Biobanking ᅟ USA Institute of Applied Genetics Department of Molecular and Medical Genetics University of North Texas Health Science Center Fort Worth USA Department of Dental Public Health Faculty of Dentistry King Abdulaziz University Jeddah Saudi Arabia Institute for Genomics and Evolutionary Medicine Temple University Philadelphia USA Center of Excellence in Genomic Medicine King Abdulaziz University Jeddah Kingdom of Saudi Arabia Laboratory of Molecular and Cellular Screening Processes (Bioinformatics Group) Centre of Biotechnology of Sfax Sfax Tunisia Fujitsu Technology Solutions International ᅟ ᅟ Case Western Reserve University School of Medicine and Lerner College of Medicine Cleveland Clinic Foundation Cleveland USA American Center for Reproductive Medicine Andrology Center Cleveland USA Center for Reproductive Medicine and
O1 Regulation of genes by telomere length over long distances Jerry W. Shay O2 The microtubule destabilizer KIF2A regulates the postnatal establishment of neuronal circuits in addition to prenatal cell survival, cell ...
来源: 评论
An Improved J-M Software Reliability Growth Model
An Improved J-M Software Reliability Growth Model
收藏 引用
International Conference on Measurement, Instrumentation and Automation (ICMIA 2012)
作者: Zhao, Liu Yan Xun, Luo Xun, Ao Jian Kai, Xue Ping, Luo The China Information Technology Security Evaluation Center China The Department of electronic and computer engineering The Hong Kong University of Science and Technology Hong Kong The PLA 95973 unit Chenggong County KunmingYunnan China The Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology School of SoftwareTsinghua University Beijing 100084 China
Reliability is an important software trustworthy attribute. But most existent reliability model don't consider the severity degree of software fault, so traditional software reliability model can't reflect the... 详细信息
来源: 评论
The development of topic model based on beta-negative binomial process
The development of topic model based on beta-negative binomi...
收藏 引用
2nd International Conference on Mechanical engineering, Industrial Electronics and Informatization, MEIEI 2013
作者: Liu, Ya-Shu Yan, Han-Bing Department of Computer Science Beijing University of Civil Engineering and Architecture Beijing 100044 China National Institute of Network and Information Security National Computer network Emergency Response technical Team Coordination Center of China Beijing 100029 China
Topic Model is one of the important subfields in Data Mining, which has been developed very quickly and has been applicated in many fields in recent years. Many researchers have been engaged in this field. In this pap... 详细信息
来源: 评论
Fusion of depth and vision information for human detection
收藏 引用
Journal of Computational information Systems 2013年 第20期9卷 8147-8154页
作者: Zhu, Bohui Ding, Yongsheng Hua, Jing Hao, Kuangrong Hong, Lijuan College of Information Sciences and Technology Donghua University Shanghai 201620 China The Third Research Institute of Ministry of Public Security Shanghai 200031 China Engineering Research Center of Digitized Textile and Fashion Technology Ministry of Education China Department of Computer Science Wayne State University Detroit MI 48202 United States
In this paper, we present a novel approach to detect human base on the fusion of depth and vision information. Instead of conventional human detection method which is mostly done in color image, our approach not only ... 详细信息
来源: 评论
Accountable authority identity-based encryption with public traceability  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Lai, Junzuo Deng, Robert H. Zhao, Yunlei Weng, Jian School of Information Systems Singapore Management University Singapore Singapore Software School Fudan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con... 详细信息
来源: 评论