咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 51 篇 期刊文献

馆藏范围

  • 128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 79 篇 工学
    • 61 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 20 篇 信息与通信工程
    • 11 篇 电气工程
    • 8 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 5 篇 机械工程
    • 5 篇 光学工程
    • 5 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 化学工程与技术
    • 2 篇 石油与天然气工程
  • 44 篇 理学
    • 26 篇 数学
    • 14 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 4 篇 系统科学
    • 2 篇 化学
  • 20 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 9 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 6 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 3 篇 医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学

主题

  • 6 篇 deep learning
  • 5 篇 computational mo...
  • 3 篇 conferences
  • 3 篇 support vector m...
  • 3 篇 public key crypt...
  • 3 篇 accuracy
  • 3 篇 quantum cryptogr...
  • 3 篇 privacy
  • 3 篇 cryptography
  • 2 篇 learning systems
  • 2 篇 scalability
  • 2 篇 sustainable deve...
  • 2 篇 telecommunicatio...
  • 2 篇 temperature meas...
  • 2 篇 genes
  • 2 篇 5g mobile commun...
  • 2 篇 medical services
  • 2 篇 quality of servi...
  • 2 篇 adversarial mach...
  • 2 篇 monitoring

机构

  • 7 篇 state key labora...
  • 6 篇 science and tech...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 care college of ...
  • 5 篇 institute of sys...
  • 5 篇 department of co...
  • 5 篇 saveetha institu...
  • 5 篇 saveetha institu...
  • 5 篇 tianjin key labo...
  • 4 篇 college of compu...
  • 4 篇 state key labora...
  • 4 篇 amrita vishwa vi...
  • 4 篇 research center ...
  • 3 篇 center for cyber...
  • 3 篇 shandong provinc...
  • 3 篇 state key labora...
  • 3 篇 center for intel...
  • 3 篇 department of mu...
  • 3 篇 school of comput...

作者

  • 6 篇 zhang yichen
  • 5 篇 guo hong
  • 5 篇 yu song
  • 5 篇 prabhakar krishn...
  • 5 篇 krishnan prabhak...
  • 5 篇 kharchenko vyach...
  • 5 篇 xu bingjie
  • 4 篇 lingjun pu
  • 4 篇 yang yang
  • 4 篇 chen ziyang
  • 4 篇 jingdong xu
  • 4 篇 fesenko herman
  • 4 篇 xinjing yuan
  • 4 篇 balakrishnan t. ...
  • 4 篇 u. samson ebenez...
  • 4 篇 ebenezar u. sams...
  • 4 篇 guan xiaohong
  • 4 篇 t. suresh balakr...
  • 3 篇 zeng bo
  • 3 篇 hongli zhang

语言

  • 114 篇 英文
  • 12 篇 其他
  • 2 篇 中文
检索条件"机构=Computer Networks and Systems Security"
128 条 记 录,以下是41-50 订阅
排序:
An Incentive Mechanism for Privacy Preserved Data Trading with Verifiable Data Disturbance
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhang, Man Li, Xinghua Luo, Bin Ren, Yanbing Miao, Yinbin Liu, Ximeng Deng, Robert H. State Key Laboratory of Integrated Services Networks the School of Cyber Engineering Xidian University Xi’an710071 China Engineering Research Center of Big data Security Ministry of Education Xi’an710071 China The College of Mathematics and Computer Science Fuzhou University Fujian350108 China The Department of Information Systems Singapore Management University 80 Stamford Road Singapore
To motivate data owners’ (DOs’) trading willingness, the existing incentive mechanisms allow DOs to independently disturb data following data consumer’s (DC’s) availability requirement. However, they cannot motiva... 详细信息
来源: 评论
Utilizing low-cost optical sensor for the measurement of particulate matter and calculating Pearson's correlation coefficient  16
Utilizing low-cost optical sensor for the measurement of par...
收藏 引用
16th International Conference on Correlation Optics, COR 2023
作者: Kirešová, Simona Rusyn, Volodymyr Guzan, Milan Vorobets, George Sobota, Branislav Vorobets, Oleksandr Dept. of Theoretical and Industrial Electrical Engineering Technical University of Košice Letná 9 Košice042 00 Slovakia Dept. of Radio Engineering and Information Security Yuriy Fedkovych Chernivtsi National University 2 Kotsjubynskyi Str. Chernivtsi58000 Ukraine Dept. of Computer Systems and Networks Yuriy Fedkovych Chernivtsi National University 2 Kotsjubynskyi Str. Chernivtsi58000 Ukraine Dept. of Computers and Informatics Technical University of Košice Letná 9 Košice042 00 Slovakia
This article discusses the possibilities of measuring Particulate Matter using optical low-cost sensors. Depending on the sensor used, not only can there be problems with the positioning of the sensor with respect to ... 详细信息
来源: 评论
Overview Of Vanet Network security
Overview Of Vanet Network Security
收藏 引用
2022 International Conference on Information Science and Communications Technologies, ICISCT 2022
作者: Khujamatov, Halimjon Lazarev, Amir Akhmedov, Nurshod Asenbaev, Nurbek Bekturdiev, Aybek Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Faculty 'Computer Engineering' Tashkent Uzbekistan Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Data Communication Networks and Systems Department Tashkent Uzbekistan Nukus Branch of the Tashkent University of Information Technologies Named after Muhammad Al-Khwarizmi Information Security Department Nukus Uzbekistan
This article provides an overview of the security of VANET, which is a vehicle network. When reviewing this topic, publications of various researchers were considered. The article provides information security require... 详细信息
来源: 评论
AI in Education: Improving Quality for Both Centralized and Decentralized Frameworks
AI in Education: Improving Quality for Both Centralized and ...
收藏 引用
IEEE Education Engineering (EDUCON)
作者: Nisha Thorakkattu Madathil Saed Alrabaee Mousa Al-kfairy Rafat Damseh Abdelkader N Belkacem Department of Information Systems and Security College of IT United Arab Emirates University UAE College of Technological Innovation Zayed University Dubai United Arab Emirates Department of Computer Science and Software Engineering College of IT United Arab Emirates University UAE Department of Computer Engineering and Networks College of IT United Arab Emirates University UAE
Education is essential for achieving many Sustainable Development Goals (SDGs). Therefore, the education system focuses on empowering more educated people and improving the quality of the education system. One of the ... 详细信息
来源: 评论
VFGCN: A Vertical Federated Learning Framework With Privacy Preserving for Graph Convolutional Network
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Gang Li, Qingming Liu, Ximeng Yan, Xiaoran Dong, Qingkuan Wu, Huiwen Kong, Xiangjie Zhou, Li Zhejiang Lab HangZhou310000 China Zhejiang University College of Computer Science and Technology Hangzhou310058 China Fuzhou University Key Laboratory of Information Security of Network Systems College of Computer and Big Data Fuzhou350108 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Zhejiang University of Technology College of Computer Science and Technology Hangzhou310023 China Dalian University of Technology School of Software Dalian116620 China
Due to the robust representational capabilities of graph data, employing graph neural networks for its processing has demonstrated superior performance over conventional deep learning algorithms. Graph data encompasse... 详细信息
来源: 评论
AI-Driven Intelligent IoT systems for Real-Time Food Quality Monitoring and Analysis
AI-Driven Intelligent IoT Systems for Real-Time Food Quality...
收藏 引用
Trends in Quantum Computing and Emerging Business Technologies (TQCEBT), International Conference on
作者: Prabhakar Krishnan U. Samson Ebenezar R. Ranitha N. Purushotham T. Suresh Balakrishnan Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamil Nadu India Department of Computer Science and Engineering CARE College of Engineering Trichy Tamil Nadu Department of Computer Science and Engineering Mohan Babu University AP India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India
The system will monitor and analyse food quality along the supply chain in real time. The system has high performance due to the CNN algorithms. In terms of accuracy, CNN has a high performance (95.2%), precision (92.... 详细信息
来源: 评论
SkinFormer: Learning Statistical Texture Representation with Transformer for Skin Lesion Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Rongtao Wang, Changwei Zhang, Jiguang Xu, Shibiao Meng, Weiliang Zhang, Xiaopeng The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China CASIA Beijing China The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence Beijing University of Posts and Telecommunications China
Accurate skin lesion segmentation from dermoscopic images is of great importance for skin cancer diagnosis. However, automatic segmentation of melanoma remains a challenging task because it is difficult to incorporate... 详细信息
来源: 评论
SHaRPose: Sparse High-Resolution Representation for Human Pose Estimation
arXiv
收藏 引用
arXiv 2023年
作者: An, Xiaoqi Zhao, Lin Gong, Chen Wang, Nannan Wang, Di Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Integrated Services Networks Xidian University China
High-resolution representation is essential for achieving good performance in human pose estimation models. To obtain such features, existing works utilize high-resolution input images or fine-grained image tokens. Ho... 详细信息
来源: 评论
Arabic Documents Clustering using Bond Energy Algorithm and Genetic Algorithm
Arabic Documents Clustering using Bond Energy Algorithm and ...
收藏 引用
International Conference on Information and Communication systems (ICICS)
作者: Hadeel Alazzam Orieb AbuAlghanam Abdulsalam Alsmady Esra’ a Alhenawi Department of Intelligence Systems Al-Balqa Applied University Al-Salt Jordan Networks and Information Security Alahliyya Amman University Amman Jordan Department of Computer Engineering Jordan University of Science and Technology Irbid Jordan Department of Computer Science University of Jordan Amman Jordan
Text clustering is a popular data mining process used in data indexing and information retrieval. However, Existing clustering techniques suffer from several shortcomings such as sensitivity to the initial value, slow...
来源: 评论
Applied Aspects of Polyharmonic Functions for security and Reliability of Data Transmission
Applied Aspects of Polyharmonic Functions for Security and R...
收藏 引用
International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT)
作者: Oleksandr Laptiev Andrii Sobchuk Anton Ryzhov Oleh Perehuda Iryna Tsygansvska Serhii Kopytko Department of Cyber Security and Information Protection Faculty of information technology Taras Shevchenko National University of Kyiv Kyiv Ukraine Department of Information and Cyber Security State University of Information and Communication Technologies Kyiv Ukraine Department of General Mathematics Faculty of Mechanics and Mathematics Taras Shevchenko National University of Kyiv Kyiv Ukraine Department of Algebra and Computer Mathematics Faculty of Mechanics and Mathematics Taras Shevchenko National University of Kyiv Kyiv Ukraine Department of Information Systems and Networks Lviv Polytechnic National University Lviv Ukraine
At present, when armed conflicts have intensified, and especially against the background of Russia's armed aggression against Ukraine, a new era of development of high-precision means of protection and weapons has... 详细信息
来源: 评论