咨询与建议

限定检索结果

文献类型

  • 380 篇 会议
  • 313 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 696 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 437 篇 工学
    • 351 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 106 篇 信息与通信工程
    • 94 篇 电气工程
    • 65 篇 控制科学与工程
    • 62 篇 生物工程
    • 38 篇 网络空间安全
    • 33 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
  • 163 篇 理学
    • 82 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 106 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 40 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
    • 15 篇 公共卫生与预防医...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 10 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 30 篇 machine learning
  • 29 篇 security
  • 28 篇 feature extracti...
  • 27 篇 deep learning
  • 23 篇 privacy
  • 20 篇 blockchain
  • 18 篇 cloud computing
  • 16 篇 internet of thin...
  • 14 篇 scalability
  • 14 篇 accuracy
  • 14 篇 training
  • 13 篇 deep neural netw...
  • 13 篇 computational mo...
  • 12 篇 support vector m...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 12 篇 cryptography
  • 11 篇 wireless sensor ...
  • 11 篇 semantics
  • 11 篇 protocols

机构

  • 46 篇 school of comput...
  • 46 篇 school of cyber ...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 25 篇 national enginee...
  • 25 篇 institute of inf...
  • 24 篇 hubei engineerin...
  • 23 篇 hubei key labora...
  • 23 篇 services computi...
  • 23 篇 engineering rese...
  • 23 篇 cluster and grid...
  • 18 篇 school of softwa...
  • 16 篇 school of cyber ...
  • 16 篇 hubei key labora...
  • 16 篇 hubei engineerin...
  • 16 篇 school of inform...
  • 15 篇 center for cyber...
  • 15 篇 school of cyber ...
  • 14 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 32 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 taher m. ghazal
  • 18 篇 hu shengshan
  • 18 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 15 篇 deqing zou
  • 15 篇 ahmed amjed abba...
  • 13 篇 liu daizong
  • 13 篇 zhang leo yu
  • 13 篇 hasan mohammad k...
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 12 篇 li minghui
  • 11 篇 zhou ziqi
  • 10 篇 xu zichuan
  • 9 篇 nurhizam safie m...

语言

  • 654 篇 英文
  • 38 篇 其他
  • 4 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
696 条 记 录,以下是51-60 订阅
排序:
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding  2
Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Recep...
收藏 引用
2nd International Conference on cyber Resilience, ICCR 2024
作者: Waseem, Ahsan Kamil, Mohd Azhan Umar Bhardwaj, Abhisehek Razim, Abdul Qadeer, Mohammed Abdul Ghazal, Taher M. Aligarh Muslim University Department Of Electrical Engineering Aligarh India Aligarh Muslim University Department Of Computer Engineering Aligarh India Stony Brook University Department Of Electrical And Computer Engineering New York United States Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
This study examines the growing number of satellites, this paper explores the importance of satellite tracking and highlights NOAA-15 for information transmission and weather monitoring. It offers a low-cost configura... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
Guardian of the Ensembles: Introducing Pairwise Adversarially Robust Loss for Resisting Adversarial Attacks in DNN Ensembles
Guardian of the Ensembles: Introducing Pairwise Adversariall...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Shukla, Shubhi Dalui, Subhadeep Alam, Manaar Datta, Shubhajit Mondal, Arijit Mukhopadhyay, Debdeep Chakrabarti, Partha Pratim Centre for Computational and Data Sciences Iit Kharagpur India Iit Kharagpur Computer Science and Engineering Department India Center for Cyber Security New York University Abu Dhabi United Arab Emirates Iit Kharagpur Department of Artificial Intelligence India Iit Patna Computer Science and Engineering Department India
Adversarial attacks rely on transferability, where an adversarial example (AE) crafted on a surrogate classifier tends to mislead a target classifier. Recent ensemble methods demonstrate that AEs are less likely to mi... 详细信息
来源: 评论
Information spreading in mobile social networks: Identifying the influential nodes using FPSO algorithm  10
Information spreading in mobile social networks: Identifying...
收藏 引用
10th International Conference on Information Technology: IoT and Smart City, ICIT 2022
作者: Zhang, Xinxin Xu, Li Xu, Zhenyu Sun, Hung-Min Lee, Chia-Wei College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China The Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Taitung University Taiwan
The most influential nodes are capable of generating maximum influence and widest information spread to their connected nodes in mobile social networks. Hence identifying high influential users plays an important role... 详细信息
来源: 评论
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 813-825页
作者: Shayla Islam Anil Kumar Budati Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah Institute of Computer Science&Digital Innovation ICSDIUCSI UniversityKuala Lumpur56000Malaysia Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Selangor43600Malaysia School of Engineering Computing and InformaticsDar Al-Hekma UniversityJeddah22246Saudi Arabia
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... 详细信息
来源: 评论
Detection and Recovery of RFID Harmonic Signal for Wi-Fi Interference
收藏 引用
Journal of Communications and Information Networks 2024年 第4期9卷 330-339页
作者: Chao Gong Ping Li Panlong Yang Zhao Lv School of Computer Science and Technology Anhui UniversityHefei 230000China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui University of TechnologyMa’anshan 243032China School of Computer science School of Cyber Science and EngineeringNanjing University of Information Science and TechnologyNanjing 210000China
In the realm of the Internet of things(IoT),radio frequency identification(RFID)technology is essential for linking physical objects to digital *** introduction of harmonic technology has expanded RFID’s applications... 详细信息
来源: 评论
Empowering Smart Homes with Fog Computing for IoT Connectivity
Empowering Smart Homes with Fog Computing for IoT Connectivi...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Mahdi, Ali Jafer Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq AI-Zahraa University for Women Department of Scientific Affairs Bangi43600 Malaysia College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Innovative grid technology leverages Information and Communication Technology (ICT) to enhance energy efficiency and mitigate losses. This paper introduces a 'novel three-tier hierarchical framework for smart home... 详细信息
来源: 评论
Revolutionizing FANETs with Reinforcement Learning: Optimized Data Forwarding and Real-Time Adaptability
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4295-4310页
作者: Mohammed, Yasir I. Hassan, Rosilah Hasan, Mohammad Kamrul Islam, Shayla Abbas, Huda Saleh Khan, Muhammad Asghar Khan, Muhammad Attique Center for Cyber Security Faculty of Information Science and Technology the National University of Malaysia Selangor Bangi43600 Malaysia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia Department of Computer Science Computer Science and Engineering College Taibah University Madinah Saudi Arabia Department of EE College of Engineering Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia Department of AI College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia
Unmanned Aerial Vehicles (UAVs), commonly known as drones, have significantly advanced wireless communication frameworks by enabling the formation of Flying Ad-Hoc Networks (FANETs). FANETs facilitate autonomous colla... 详细信息
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
Towards Demystifying Android Adware: Dataset and Payload Location  39
Towards Demystifying Android Adware: Dataset and Payload Loc...
收藏 引用
39th ACM/IEEE International Conference on Automated Software engineering Workshops, ASEW 2024
作者: Wang, Chao Liu, Tianming Zhao, Yanjie Zhang, Lin Du, Xiaoning Li, Li Wang, Haoyu Monash University Clayton Australia Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China The National Computer Emergency Response Beijing China Beihang University Beijing China
Adware represents a pervasive threat in the mobile ecosystem, yet its inherent characteristics have been largely overlooked by previous research. This work takes a crucial step towards demystifying Android adware. We ... 详细信息
来源: 评论