咨询与建议

限定检索结果

文献类型

  • 35 篇 会议
  • 27 篇 期刊文献

馆藏范围

  • 62 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 23 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 6 篇 土木工程
    • 5 篇 信息与通信工程
    • 4 篇 船舶与海洋工程
    • 4 篇 生物工程
    • 3 篇 控制科学与工程
    • 2 篇 光学工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电气工程
    • 2 篇 建筑学
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 交通运输工程
  • 16 篇 理学
    • 5 篇 海洋科学
    • 4 篇 数学
    • 3 篇 物理学
    • 3 篇 生物学
    • 1 篇 化学
    • 1 篇 大气科学
    • 1 篇 地球物理学
    • 1 篇 统计学(可授理学、...
  • 5 篇 管理学
    • 3 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 经济学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 12 篇 computational mo...
  • 9 篇 computer simulat...
  • 9 篇 humans
  • 6 篇 animation
  • 4 篇 application soft...
  • 4 篇 biological syste...
  • 3 篇 avatars
  • 3 篇 information scie...
  • 2 篇 computer science
  • 2 篇 wireless communi...
  • 2 篇 autonomous agent...
  • 2 篇 authentication
  • 2 篇 computer graphic...
  • 2 篇 predictive model...
  • 2 篇 analytical model...
  • 2 篇 speech synthesis
  • 2 篇 artificial intel...
  • 2 篇 kinematics
  • 2 篇 shape
  • 1 篇 internet of thin...

机构

  • 5 篇 center for secur...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 3 篇 computer network...
  • 3 篇 college of elect...
  • 3 篇 department of co...
  • 3 篇 center for human...
  • 2 篇 department of ps...
  • 2 篇 school of mathem...
  • 2 篇 bioengineering d...
  • 2 篇 department of bi...
  • 2 篇 neuroinformatics...
  • 2 篇 department of ps...
  • 2 篇 scienze cliniche...
  • 2 篇 department of ne...
  • 2 篇 department of co...
  • 2 篇 norment institut...
  • 2 篇 national yunlin ...
  • 2 篇 huawei
  • 2 篇 supercomputing c...

作者

  • 5 篇 n.i. badler
  • 5 篇 zhang jilin
  • 5 篇 sachin shetty
  • 4 篇 zhou li
  • 4 篇 das ashok kumar
  • 4 篇 ashok kumar das
  • 4 篇 badler norman i.
  • 4 篇 mahmood khalid
  • 3 篇 t.i. oren
  • 3 篇 wan jian
  • 3 篇 mohammad wazid
  • 3 篇 wang jue
  • 3 篇 andreas tolk
  • 3 篇 shetty sachin
  • 3 篇 amit kumar mishr...
  • 3 篇 shamshad salman
  • 3 篇 tolk andreas
  • 2 篇 levent yilmaz
  • 2 篇 ghaith rabadi
  • 2 篇 william t. scher...

语言

  • 58 篇 英文
  • 4 篇 其他
检索条件"机构=Center for Human Modeling and Simulation Computer and Information Science"
62 条 记 录,以下是1-10 订阅
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
收藏 引用
IEEE Access 2023年 11卷 74000-74020页
作者: Javed, Safdar Hussain Ahmad, Maaz Bin Asif, Muhammad Akram, Waseem Mahmood, Khalid Das, Ashok Kumar Shetty, Sachin College of Computing and Information Sciences Karachi75190 Pakistan Lahore Garrison University Department of Computer Science Lahore54810 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan International Institute of Information Technology at Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Department of Modeling SuffolkVA23435 United States Old Dominion University Center for Cybersecurity Education and Research SuffolkVA23435 United States
The objective of Advanced Persistent Threat (APT) attacks is to exploit Cyber-Physical Systems (CPSs) in combination with the Industrial Internet of Things (I-IoT) by using fast attack methods. Machine learning (ML) t... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced Research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment
收藏 引用
IEEE Internet of Things Journal 2023年 第18期10卷 16650-16657页
作者: Shamshad, Salman Mahmood, Khalid Shamshad, Usman Hussain, Ibrar Hussain, Shafiq Das, Ashok Kumar The University of Lahore Department of Software Engineering Lahore54590 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan Riphah International University Riphah School of Computing and Innovation Lahore54000 Pakistan University of Sahiwal Department of Computer Science Sahiwal57000 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Virginia Modeling Analysis and Simulation Center SuffolkVA23435 United States
The energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize the conventional intelligent transportation systems (ITSs) a... 详细信息
来源: 评论
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment
Multiclass Classification Approaches for Intrusion Detection...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Saksham Mittal Amit Kumar Mishra Mohammad Wazid D. P. Singh Ashok Kumar Das Sachin Shetty Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center Center for Cybersecurity Education and Research Old Dominion University Suffolk VA USA
Aerial Computing is one of the applications of Internet of Things (IoT) which makes use of autonomous aerial devices, such as drones and unmanned aerial vehicles (UAVs). The ubiquitous nature of IoT and aerial computi...
来源: 评论
Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication
Secure Location-based Authenticated Key Establishment Scheme...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Saurabh Agrawal Anusha Vangala Ashok Kumar Das Neeraj Kumar Sachin Shetty Sajal K. Das Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computer Science Missouri University of Science and Technology Rolla Missouri USA Department of Computer Science and Engineering Thapar University Patiala India Department of Computational Modeling and Simulation Engineering Old Dominion University Suffolk Virginia USA
Maritime communication helps vessels and ports plan their movements, exchange environmental information, and communicate among themselves. The vessels' movement and changing location are critical to keep them secu... 详细信息
来源: 评论
EM-PAD: An Effective Mechanism for Phishing Attack Detection
EM-PAD: An Effective Mechanism for Phishing Attack Detection
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Aakash Saksham Mittal Mohammad Wazid Amit Kumar Mishra Ashok Kumar Das Sachin Shetty Mohsen Guizani Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computational Modeling and Simulation Engineering Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk VA USA Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi UAE
In the present era, the increasing number of network devices and ubiquitous computing leads to the flow of enormous amounts of data traffic, including sensitive and confidential information, on the internet and carryi... 详细信息
来源: 评论
AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical Infrastructure
AKM-FCCI: Secure Authentication and Key Management Mechanism...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Vijay Karnatak Neha Tripathi Amit Kumar Mishra Mohammad Wazid Ashok Kumar Das Mohsen Guizani Sachin Shetty Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Machine Learning Department Mohamed bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi UAE Department of Computational Modeling and Simulation Engineering Virginia Modeling Analysis and Simulation Center Old Dominion University Suffolk VA USA
Critical infrastructure refers to the key systems, assets, and facilities, whether they are physical or virtual, that are necessary for the overall functioning of a country. As our reliance on technology and networked... 详细信息
来源: 评论
A Visual Analysis Approach for Deep Learning-based Precipitation Forecasting
A Visual Analysis Approach for Deep Learning-based Precipita...
收藏 引用
Pacific (formerly Asia-Pacific APVIS) Visualization Symposium
作者: Xuyi Lu Guan Li Ya Wang Yu Dong Dong Tian Guihua Shan Computer Network Information Center Chinese Academy of Sciences University of Chinese Academy of Sciences National Key Laboratory of Earth System Numerical Modeling and Application Institute of Atmospheric Physics Chinese Academy of Sciences Earth System Numerical Simulation Science Center Institute of Atmospheric Physics Chinese Academy of Sciences Computer Network Information Center Chinese Academy of Sciences Computer Network Information Center Chinese Academy of Sciences University of Chinese Academy of Sciences Hangzhou Institute for Advanced Study University of Chinese Academy of Sciences
Meteorological experts achieved promising results in improving the effectiveness of neural weather networks in precipitation forecasting by incorporating precipitation-optimized objectives into the loss function. Howe... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers
收藏 引用
International Journal of information and computer Security 2021年 第1-2期16卷 63-83页
作者: Liang, Xueping Shetty, Sachin Tosh, Deepak K. Foytik, Peter Zhang, Lingchen Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Virginia Modeling Analysis and Simulation Center Old Dominion University NorfolkVA United States Department of Computer Science University of Texas at EL Paso El PasoTX United States
Distributed ledger technology (DLT) provides decentralised services by removing the need of trust among distributed nodes in the distributed system. Transactions across the network are visible to all participants. How... 详细信息
来源: 评论