咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 319 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 368 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 109 篇 信息与通信工程
    • 96 篇 电气工程
    • 75 篇 控制科学与工程
    • 62 篇 生物工程
    • 40 篇 网络空间安全
    • 34 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物医学工程(可授...
    • 18 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 交通运输工程
  • 164 篇 理学
    • 83 篇 数学
    • 64 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 24 篇 物理学
    • 21 篇 系统科学
    • 18 篇 化学
  • 109 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 36 篇 法学
    • 19 篇 法学
    • 17 篇 社会学
  • 33 篇 医学
    • 27 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 9 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 32 篇 security
  • 30 篇 machine learning
  • 29 篇 deep learning
  • 28 篇 feature extracti...
  • 26 篇 privacy
  • 20 篇 blockchain
  • 19 篇 cloud computing
  • 16 篇 internet of thin...
  • 16 篇 accuracy
  • 15 篇 training
  • 14 篇 scalability
  • 14 篇 deep neural netw...
  • 14 篇 computational mo...
  • 13 篇 data privacy
  • 13 篇 authentication
  • 13 篇 protocols
  • 12 篇 support vector m...
  • 12 篇 semantics
  • 12 篇 federated learni...
  • 12 篇 cryptography

机构

  • 50 篇 school of cyber ...
  • 49 篇 school of comput...
  • 41 篇 school of cyber ...
  • 29 篇 school of comput...
  • 28 篇 national enginee...
  • 26 篇 services computi...
  • 26 篇 hubei engineerin...
  • 25 篇 hubei key labora...
  • 25 篇 institute of inf...
  • 25 篇 cluster and grid...
  • 23 篇 engineering rese...
  • 20 篇 school of softwa...
  • 18 篇 school of inform...
  • 17 篇 hubei key labora...
  • 16 篇 school of cyber ...
  • 16 篇 center for cyber...
  • 16 篇 hubei engineerin...
  • 16 篇 school of cyber ...
  • 15 篇 purple mountain ...
  • 14 篇 state key labora...

作者

  • 35 篇 zhou pan
  • 34 篇 jin hai
  • 29 篇 hai jin
  • 21 篇 hu shengshan
  • 21 篇 taher m. ghazal
  • 19 篇 ghazal taher m.
  • 17 篇 mohammad kamrul ...
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 15 篇 zhang leo yu
  • 15 篇 deqing zou
  • 14 篇 hasan mohammad k...
  • 14 篇 zhou ziqi
  • 14 篇 li minghui
  • 13 篇 liu daizong
  • 13 篇 amrita
  • 12 篇 zou deqing
  • 12 篇 gupta brij b.
  • 11 篇 wan wei
  • 10 篇 xu zichuan

语言

  • 642 篇 英文
  • 72 篇 其他
  • 5 篇 中文
检索条件"机构=Center for Cyber Security and Cryptology Computer Science and Engineering"
718 条 记 录,以下是711-720 订阅
排序:
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
收藏 引用
International Journal of security and Networks 2010年 第1期5卷 35-44页
作者: Xu, Li Chen, Sisheng Huang, Xinyi Mu, Yi Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China Department of Mathematics and Computer Science FuQing Branch Fujian Normal University FuQing 350300 China School of Computer Science and Software Engineering Center for Computer and Information Security Research University of Wollongong NSW 2522 Australia
Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad ho... 详细信息
来源: 评论
On the security of a clipped hopfield neural network-based cryptosystem
On the security of a clipped hopfield neural network-based c...
收藏 引用
7th Multimedia and security Workshop 2005, MM and Sec'05
作者: Socek, Daniel Culibrk, Dubravko Dept. of Computer Science and Engineering Center for Cryptology and Information Security Florida Atlantic University 777 Glades Road Boca Raton FL 33431-0991 Dept. of Computer Science and Engineering Florida Atlantic University 777 Glades Road Boca Raton FL 33431-0991
A cryptosystem based on a clipped Hopfield neural network (CHNN) was recently proposed primarily for encryption of digital images and videos. The system is fast and suitable for hardware implementation. The present pa... 详细信息
来源: 评论
An improvement to a biometric-based multimedia content protection scheme
An improvement to a biometric-based multimedia content prote...
收藏 引用
Multimedia and security Workshop 2006, MM and Sec'06
作者: Socek, Daniel Sramka, Michal Marques, Oge Ćulibrk, Dubravko Department of Computer Science and Engineering Florida Atlantic University 777 Glades Road Boca Raton FL 33431-0991 United States Department of Mathematical Sciences Florida Atlantic University 777 Glades Road Boca Raton FL 33431-0991 United States Center for Cryptology and Information Security Florida Atlantic University 777 Glades Road Boca Raton FL 33431-0991 United States
A biometric-based method for multimedia content protection was recently proposed. The method relies on biometric data of the user and a layered encryption mechanism to achieve confidentiality of the multimedia content... 详细信息
来源: 评论
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Im...
收藏 引用
International Conference on security and Privacy for Emerging Areas in Communications Networks (SecureComm)
作者: D. Socek Shujun Li S.S. Magliveras B. Furht Center for Cryptology and Information Security and Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL USA Department of Electronic Engineering City University of Hong Kong Kowloon Hong Kong China Center for Cryptology and Information Security USA Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL USA
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold... 详细信息
来源: 评论
Optimization Algorithms in Machine Learning  1
Optimization Algorithms in Machine Learning
收藏 引用
丛书名: engineering Optimization: Methods and Applications
1000年
作者: Debashish Das Ali Safaa Sadiq Seyedali Mirjalili
This book explores the development of several new learning algorithms that utilize recent optimization techniques and meta-heuristics. It addresses well-known models such as particle swarm optimization, genetic algori... 详细信息
来源: 评论
Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey
收藏 引用
ACM Computing Surveys 1000年
作者: Xiuyuan Chen Junzuo Lai Chao Lin Xinyi Huang Debiao He College of Cyber Security Jinan University Guangzhou China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou China School of Cyber Science and Engineering Wuhan University Wuhan China
Payment Channel Networks (PCNs), pivotal for blockchain scalability, facilitate multiple off-chain payments between any two users. They utilize scripts to define and execute payment conditions in various blockchains, ... 详细信息
来源: 评论
Digital Resilience: Navigating Disruption and Safeguarding Data Privacy  1
收藏 引用
丛书名: EAI/Springer Innovations in Communication and Computing
1000年
作者: Shishir Kumar Shandilya Agni Datta Yash Kartik Atulya Nagar
来源: 评论
cyber security and Digital Forensics  1
收藏 引用
丛书名: Lecture Notes in Networks and Systems
1000年
作者: Nihar Ranjan Roy Sudeep Tanwar Usha Batra
来源: 评论