咨询与建议

限定检索结果

文献类型

  • 349 篇 会议
  • 327 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 460 篇 工学
    • 365 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 125 篇 信息与通信工程
    • 83 篇 电气工程
    • 72 篇 控制科学与工程
    • 49 篇 生物工程
    • 44 篇 网络空间安全
    • 37 篇 生物医学工程(可授...
    • 31 篇 电子科学与技术(可...
    • 29 篇 安全科学与工程
    • 27 篇 机械工程
    • 22 篇 仪器科学与技术
    • 21 篇 光学工程
    • 15 篇 交通运输工程
    • 14 篇 动力工程及工程热...
  • 185 篇 理学
    • 93 篇 数学
    • 53 篇 生物学
    • 37 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 13 篇 化学
  • 119 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 40 篇 医学
    • 34 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 20 篇 公共卫生与预防医...
    • 15 篇 药学(可授医学、理...
  • 32 篇 法学
    • 17 篇 社会学
    • 15 篇 法学
  • 9 篇 经济学
  • 9 篇 军事学
  • 7 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学

主题

  • 34 篇 authentication
  • 26 篇 security
  • 25 篇 machine learning
  • 21 篇 deep learning
  • 20 篇 blockchain
  • 18 篇 internet of thin...
  • 15 篇 privacy
  • 14 篇 information secu...
  • 14 篇 cryptography
  • 12 篇 data privacy
  • 12 篇 feature extracti...
  • 12 篇 protocols
  • 12 篇 artificial intel...
  • 12 篇 accuracy
  • 11 篇 access control
  • 11 篇 wireless communi...
  • 10 篇 computer science
  • 10 篇 federated learni...
  • 9 篇 reliability
  • 9 篇 wireless sensor ...

机构

  • 21 篇 state key labora...
  • 18 篇 center for secur...
  • 16 篇 center for cyber...
  • 14 篇 purple mountain ...
  • 13 篇 center for cyber...
  • 13 篇 center for secur...
  • 11 篇 department of co...
  • 11 篇 school of cyber ...
  • 10 篇 department of co...
  • 9 篇 information secu...
  • 9 篇 department of co...
  • 9 篇 center for cyber...
  • 9 篇 data assurance a...
  • 9 篇 information secu...
  • 9 篇 center for cyber...
  • 9 篇 department of co...
  • 8 篇 cispa helmholtz ...
  • 8 篇 the purple mount...
  • 8 篇 computer network...
  • 8 篇 department of co...

作者

  • 30 篇 das ashok kumar
  • 20 篇 taher m. ghazal
  • 18 篇 ghazal taher m.
  • 17 篇 ashok kumar das
  • 16 篇 mahmood khalid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 mohammad kamrul ...
  • 13 篇 hasan mohammad k...
  • 12 篇 gupta brij b.
  • 11 篇 zeng yong
  • 10 篇 zhang rui
  • 10 篇 mohammad wazid
  • 10 篇 fan chun-i
  • 9 篇 nurhizam safie m...
  • 9 篇 munir ahmad
  • 9 篇 choo kim-kwang r...
  • 9 篇 shamshad salman
  • 9 篇 amrita
  • 8 篇 ali hamza najim

语言

  • 618 篇 英文
  • 60 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Center for Cryptology and Information Security and Department of Computer Science and Engineering"
684 条 记 录,以下是81-90 订阅
排序:
A security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
A metasurface-based light-to-microwave transmitter for hybrid wireless communications
收藏 引用
Light(science & Applications) 2022年 第6期11卷 1139-1148页
作者: Xin Ge Zhang Ya Lun Sun Bingcheng Zhu Wei Xiang Jiang Qian Yu Han Wei Tian Cheng-Wei Qiu Zaichen Zhang Tie Jun Cui State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast University210096 NanjingChina National Mobile Communications Research Laboratory School of Information Science and EngineeringSoutheast University210096 NanjingChina Frontiers Science Center for Mobile Information Communication and Security Southeast University210096 NanjingChina Purple Mountain Laboratories 211111 NanjingChina Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore
Signal conversion plays an important role in many applications such as communication,sensing,and *** signal conversion between optical and microwave frequencies is a crucial step to construct hybrid communication syst... 详细信息
来源: 评论
Encrypted Domain Secret Medical-Image Sharing with Secure Outsourcing Computation in IoT Environment
收藏 引用
IEEE Internet of Things Journal 2024年 第2期11卷 2382-2393页
作者: Huang, Jingwang Cui, Qi Zhou, Zhili Yu, Keping Yang, Ching-Nung Choo, Kim-Kwang Raymond Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou510006 China Nanjing University Information Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanyang Technological University School of Electrical and Electronic Engineering Jurong West639798 Singapore Guangzhou University Institute of Artificial Intelligence and Blockchain Guangzhou510006 China Hosei University Graduate School of Science and Engineering Tokyo184-8584 Japan National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan The University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
In existing secret medical-image sharing (SMIS) schemes, to protect and manage secret medical-images (SMIs), the sharing and recovery of each SMI are implemented by local servers of medical institutions. However, sinc... 详细信息
来源: 评论
Fair Incentive Allocation for Secure Data Sharing in Blockchain Systems: A Shapley Value Based Mechanism  3rd
Fair Incentive Allocation for Secure Data Sharing in Block...
收藏 引用
3rd International Conference on Autonomous Unmanned Systems, ICAUS 2023
作者: Yang, Ming Feng, Honglin Wang, Xin Jiao, Xuguo Wu, Xiaoming Qin, Shuwei Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Information and Control Engineering Qingdao University of Technology Qingdao China State Key Laboratory of Industrial Control Technology College of Control Science and Engineering Zhejiang University Hangzhou China Department of Public Security of Shandong Province Shandong Intelligent Public Security Joint Innovation Center Jinan China
In the contemporary era of information technology, the exponential surge in data has rendered colossal potential value, which would be fully unlocked through data circulation and sharing. However, when the data contai... 详细信息
来源: 评论
Preserving Privacy of User Identity Based on Pseudonym Variable in 5G
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 5551-5568页
作者: Mamoon M.Saeed Mohammad Kamrul Hasan Rosilah Hassan Rania Mokhtar Rashid A.Saeed Elsadig Saeid Manoj Gupta Electrical Engineering Department Faculty of EngineeringAlzaiem Alazahri UniversityKhartoumSudan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti KebangsaanMalaysia(UKM)43600BangiMalaysia Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityPO Box 11099Taif21944Saudi Arabia Department of Electronics Engineering College of EngineeringSudan University of Science and TechnologyKhartoumSudan Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia
The fifth generation(5G)system is the forthcoming generation of the mobile communication *** has numerous additional features and offers an extensively high data rate,more capacity,and low ***,these features and appli... 详细信息
来源: 评论
Brain-inspired artificial intelligence research: A review
收藏 引用
science China(Technological sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论
Implementing OIML R46 Communication Unit for DLMS/COSEM security Suite 1 and Passing CTT V3.1 Test  20
Implementing OIML R46 Communication Unit for DLMS/COSEM Secu...
收藏 引用
20th IEEE International Conference on Networking, Sensing and Control, ICNSC 2023
作者: Chien, Chun-Tsai Wang, Chien-Lung Liao, I-En Wang, Sying-Jyan National Chung Hsing University Taiwan Information Security Center Taichung City402 Taiwan National Chung Hsing University Department of Computer Science and Engineering Taichung City402 Taiwan
With the growing deployment of smart metering systems, ensuring secure and reliable communication between smart meters and utility providers is crucial. The DLMS/COSEM security Suite 1 offers a standardized framework ... 详细信息
来源: 评论
Survey on Blockchain-Based Internet of Things security Technologies  10
Survey on Blockchain-Based Internet of Things Security Techn...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Meng, Qingrui Sun, Zhihong Lv, Zheng Cheng, Qiang Liu, Wei Chen, Yun Naval University of Engineering Department of Information Security Hubei Wuhan China Wuhan Institute of Technologe Computer Science and Engineering Hubei Wuhan China Simulation Training Center Air Force Early Warning Academy Hubei Wuhan China Naval University of Engineering Simulation Training Center Hubei Wuhan China
Internet of Things(IoT) terminals are characterized by large number, wide distribution, complex hierarchical structure, etc., and are often in complex environments, which are more susceptible to attacks than tradition... 详细信息
来源: 评论
A comprehensive study and performance analysis of deep neural network-based approaches in wind time-series forecasting
收藏 引用
Journal of Reliable Intelligent Environments 2023年 第2期9卷 183-200页
作者: Rahman, Md. Mijanur Shakeri, Mohammad Khatun, Fatema Tiong, Sieh Kiong Alkahtani, Ammar Ahmed Samsudin, Nurul Asma Amin, Nowshad Pasupuleti, Jagadeesh Hasan, Mohammad Kamrul Department of Computer Science and Engineering Jatiya Kabi Kazi Nazrul Islam University Trishal Mymensingh2224 Bangladesh Department of Electrical and Electronic Engineering Bangabandhu Sheikh Mujibur Rahman Science & Technology University Gopalganj Dhaka8100 Bangladesh Jalan Ikram-Uniten Selangor Kajang43000 Malaysia Center for Cyber Security School of Information Science and Technology Universiti Kebangsaan Malaysia UKM Selangor Bangi43600 Malaysia
The increasing energy demand and expansion of power plants are provoking the effects of greenhouse gas emissions and global warming. To mitigate these issues, renewable energies (like solar, wind, and hydropower) are ... 详细信息
来源: 评论
Privacy Data Management Mechanism Based on Blockchain and Federated Learning
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 37-53页
作者: Mingsen Mo Shan Ji Xiaowan Wang Ghulam Mohiuddin Yongjun Ren Engineering Research Center of Digital Forensics of Ministry of Education School of ComputerNanjing University of Information Science&TechnologyNanjing210044China Zhengde Polytechnic Nanjing211106China Xi’an University of Posts&Telecommunications Xi’an710061China Department of Cyber Security at VaporVM Abu Dhabi999041United Arab Emirates
Due to the extensive use of various intelligent terminals and the popularity of network social tools,a large amount of data in the field of medical *** to manage these massive data safely and reliably has become an im... 详细信息
来源: 评论