咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是71-80 订阅
排序:
Cybersecurity Revolution via Large Language Models and Explainable AI  17
Cybersecurity Revolution via Large Language Models and Expla...
收藏 引用
17th International Conference on security of information and Networks, SIN 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Ihsan, Anuam Al-Dmour, Nidal A. College of Arts & Science Applied Science University Manama Bahrain Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of College of Engineering Mutah University Department of Computer Engineering Jordan
Integrating Groundbreaking advancements in AI, like language models, interpretable AI, and machine learning, opens up a world of exciting new possibilities. The Evolving face of cybersecurity and Modern cyber threats ... 详细信息
来源: 评论
Multidomain Object Detection Framework Using Feature Domain Knowledge Distillation
收藏 引用
IEEE Transactions on Cybernetics 2024年 第8期54卷 4643-4651页
作者: Jaw, Da-Wei Huang, Shih-Chia Lu, Zhi-Hui Fung, Benjamin C. M. Kuo, Sy-Yen National Taiwan University Department of Electrical Engineering Taipei106 Taiwan National Taipei University of Technology Department of Electronic Engineering Taipei106 Taiwan Fudan University School of Computer Science The Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai200433 China McGill University School of Information Studies MontrealQCH3A 1X1 Canada
Object detection techniques have been widely studied, utilized in various works, and have exhibited robust performance on images with sufficient luminance. However, these approaches typically struggle to extract valua... 详细信息
来源: 评论
Quantum Remote State Preparation Based on Quantum Network Coding
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 119-132页
作者: Zhen-Zhen Li Zi-Chen Li Yi-Ru Sun Haseeb Ahmad Gang Xu Xiu-Bo Chen School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Information Security Center State key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network *** this paper,a quantum remote state preparation scheme based on quantum network coding is *** with the... 详细信息
来源: 评论
Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning  7
Sockpuppets Detection Using Markov-Driven Graph Convolutiona...
收藏 引用
7th IEEE Conference on Dependable and Secure Computing, DSC 2024
作者: Fan, Chun-I Tsai, Ming-Feng Hu, Chun-Pin Wang, Ming-Hung National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan Information Security Research Center National Sun Yat-sen University Kaohsiung804 Taiwan Intelligent Electronic Commerce Research Center National Sun Yat-sen University Kaohsiung804 Taiwan National Chung Cheng University Departrment of Computer Science and Information Engineering Chiayi621 Taiwan
This paper introduces a novel framework for detecting sockpuppets in online social networks, utilizing an advanced approach that integrates Markov-driven Graph Convolutional Networks (MDGCN) with ensemble learning tec... 详细信息
来源: 评论
PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET
收藏 引用
IEEE Transactions on Vehicular Technology 2024年 第5期73卷 6727-6739页
作者: Awais, Syed Muhammad Yucheng, Wu Mahmood, Khalid Akram, Muhammad Wahid Hussain, Shafiq Das, Ashok Kumar Park, Youngho Chongqing University School of Microelectronics and Communication Engineering Chongqing400044 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin64002 Taiwan University of Lahore Department of Software Engineering Punjab Lahore54590 Pakistan University of Sahiwal Department of Computer Science Punjab Sahiwal57000 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Telangana Hyderabad500032 India Kyungpook National University School of Electronics Engineering Daegu41566 Korea Republic of
The intellectual and immense attainment of a smart city and auto-mobile vehicles are gradually growing. This growth drives Vehicular Ad-Hoc Network (VANET), a broadly operated complex network for inter-vehicular trans... 详细信息
来源: 评论
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature  1
收藏 引用
18th EAI International Conference on security and Privacy in Communication Networks, SecureComm 2022
作者: Ma, Ziqiang Li, Shuaigang Lin, Jingqiang Cai, Quanwei Fan, Shuqin Zhang, Fan Luo, Bo School of Information Engineering Ningxia University Yinchuan China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Science and Technology of China Hefei China State Key Laboratory of Cryptology Beijing China School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou310027 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou310027 China Department of Electrical Engineering and Computer Science University of Kansas Lawrence United States
In the resource-constrained environment such as the Internet of Things, the windowed Non-Adjacent-Form (wNAF) representation is usually used to improve the calculation speed of the scalar multiplication of ECDSA. This... 详细信息
来源: 评论
ANIMC: A Soft Approach for Autoweighted Noisy and Incomplete Multiview Clustering
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第2期3卷 192-206页
作者: Fang, Xiang Hu, Yuchong Zhou, Pan Wu, Dapeng Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering The School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Information Storage System Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Electrical and Computer Engineering University of Florida GainesvilleFL32611 United States
Multiview clustering has wide real-world applications because it can process data from multiple sources. However, these data often contain missing instances and noises, which are ignored by most multiview clustering m... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack
Software-Defined Networking Integrated with Cloud Native and...
收藏 引用
17th International Conference on Ubiquitous information Management and Communication, IMCOM 2023
作者: Fan, Chun-I Wang, Jun-Huei Shie, Cheng-Han Tsai, Yu-Lung National Sun Yat-sen University Department of Computer Science and Engineering Information Security Research Center Intelligent Electronic Commerce Research Center Kaohsiung Taiwan Information and Communication Security Technical Laboratories Telecommunication Laboratories Chunghwa Telecom Taoyuan Taiwan
SDN is a new network architecture that still faces traditional network attacks. Among the attacks, Distributed-Denial-of-Service is one of the most severe attacks, especially the TCP SYN Flooding attack, which has a m... 详细信息
来源: 评论
AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 1095-1104页
作者: Liaqat Ali Saif E.A.Alnawayseh Mohammed Salahat Taher M.Ghazal Mohsen A.A.Tomh Beenu Mago College of Engineering and Technology University of Science and Technology of FujairahFujairahUAE Electrical Engineering Department Faculty of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City Sharjah1797UAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia43600Malaysia Faculty of Computer Science NCBA&ELahore54660Pakistan School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE
The immediate international spread of severe acute respiratory syn-drome revealed the potential threat of infectious diseases in a closely integrated and interdependent *** an outbreak occurs,each country must have a ... 详细信息
来源: 评论