咨询与建议

限定检索结果

文献类型

  • 19 篇 会议
  • 16 篇 期刊文献

馆藏范围

  • 35 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 27 篇 工学
    • 17 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 5 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 动力工程及工程热...
    • 2 篇 生物医学工程(可授...
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
  • 8 篇 理学
    • 3 篇 数学
    • 3 篇 物理学
    • 2 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 4 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学
    • 1 篇 作物学

主题

  • 4 篇 authentication
  • 2 篇 feature extracti...
  • 1 篇 electromagnetic ...
  • 1 篇 spiking neural n...
  • 1 篇 internet of thin...
  • 1 篇 low cost
  • 1 篇 university timet...
  • 1 篇 action quality a...
  • 1 篇 mtln model
  • 1 篇 data privacy
  • 1 篇 chemical substan...
  • 1 篇 failure analysis
  • 1 篇 deep learning
  • 1 篇 frequency modula...
  • 1 篇 trichloroethylen...
  • 1 篇 safety
  • 1 篇 tracking (positi...
  • 1 篇 quantum entangle...
  • 1 篇 passwords
  • 1 篇 long short-term ...

机构

  • 5 篇 guangxi colleges...
  • 4 篇 school of inform...
  • 4 篇 guangxi cooperat...
  • 4 篇 school of comput...
  • 2 篇 school of mathem...
  • 2 篇 department of ps...
  • 2 篇 guangxi key lab ...
  • 2 篇 guangxi experime...
  • 2 篇 department of bu...
  • 2 篇 faculty of softw...
  • 2 篇 school of comput...
  • 2 篇 state key labora...
  • 1 篇 departments of n...
  • 1 篇 physics departme...
  • 1 篇 school of cognit...
  • 1 篇 unic cnrs gif su...
  • 1 篇 department of ps...
  • 1 篇 neural basis of ...
  • 1 篇 faculty of healt...
  • 1 篇 ist austria klos...

作者

  • 2 篇 senhui qiu
  • 2 篇 ye miao
  • 2 篇 jinjie bi
  • 2 篇 ashraf osman ibr...
  • 2 篇 junxiu liu
  • 2 篇 yi cao
  • 2 篇 qiang fu
  • 2 篇 xuemei ding
  • 2 篇 fadhil mukhlif
  • 2 篇 miao ye
  • 2 篇 yuling luo
  • 2 篇 wang yong
  • 2 篇 yong wang
  • 2 篇 fan ya
  • 1 篇 sommer wieland
  • 1 篇 huang tao
  • 1 篇 krainak michael ...
  • 1 篇 qi jin
  • 1 篇 sarasua ignacio
  • 1 篇 li hongchao

语言

  • 33 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Complex Information Security and Electronic Computing Systems"
35 条 记 录,以下是1-10 订阅
排序:
Thermal Residue-Based Password Attacks and the Ways to Counteract the Same
Thermal Residue-Based Password Attacks and the Ways to Count...
收藏 引用
2022 International Siberian Conference on Control and Communications, SIBCON 2022
作者: Prozorova, Elizaveta A. Department of Integrated Information Security of Electronic Computing Systems Tomsk Russia
This article covers possible password attacks, describing thermal residue-based post factum password attacks and the ways to counteract the same, with test results provided as to the possibility of intercepting a pass... 详细信息
来源: 评论
Optimization Techniques in University Timetabling Problem:Constraints,Methodologies,Benchmarks,and Open Issues
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 6461-6484页
作者: Abeer Bashab Ashraf Osman Ibrahim Ibrahim Abakar Tarigo Hashem Karan Aggarwal Fadhil Mukhlif Fuad A.Ghaleb Abdelzahir Abdelmaboud Faculty of Computer Science&Information Technology Alzaiem Alazhari University13311KhartoumSudan Faculty Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400SabahMalaysia Department of Computer Science University of SharjahSharjah27272United Arab Emirates Electronic and Communication Engineering Department Maharishi Markandeshwar Deemed to be UniversityMullanaAmbala133207HaryanaIndia Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi Malaysia81310JohorMalaysia Department of Information Systems King Khaled UniversityMuhayel61913AseerSaudi Arabia
University timetabling problems are a yearly challenging task and are faced repeatedly each *** problems are considered nonpolynomial time(NP)and combinatorial optimization problems(COP),which means that they can be s... 详细信息
来源: 评论
Efficient Resource Allocation Algorithm in Uplink OFDM-Based Cognitive Radio Networks
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3045-3064页
作者: Omar Abdulghafoor Musbah Shaat Ibraheem Shayea Ahmad Hamood Abdelzahir Abdelmaboud Ashraf Osman Ibrahim Fadhil Mukhlif Herish Badal Norafida Ithnin Ali Khadim Lwas Electronic&Telecommunications Engineering Department The American University of KurdistanDuhokKurdistan RegionIraq CTTC BarcelonaSpain Faculty of Electrical and Electronics Engineering Istanbul Technical UniversityIstanbulTurkey Department of Information Systems King Khalid UniversityMuhayel AseerSaudi Arabia Faculty of Computing and Informatics University Malaysia SabahKota KinabaluMalaysia Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi MalaysiaJohorMalaysia R&D Ministry of Industry and MineralsBaghdadIraq
The computational complexity of resource allocation processes,in cognitive radio networks(CRNs),is a major issue to be ***,the complicated solution of the optimal algorithm for handling resource allocation in CRNs mak... 详细信息
来源: 评论
Thermal Residue-Based Password Attacks and the Ways to Counteract the Same
Thermal Residue-Based Password Attacks and the Ways to Count...
收藏 引用
Siberian Conference on Control and Communications (SIBCON)
作者: Elizaveta A. Prozorova Department of Integrated Information Security of Electronic Computing Systems Tomsk State University of Control Systems and Radioelectronics (TUSUR) Tomsk Russia
This article covers possible password attacks, describing thermal residue-based post factum password attacks and the ways to counteract the same, with test results provided as to the possibility of intercepting a pass... 详细信息
来源: 评论
Watermarking and Encryption for electronic Medical Records (EMR) security Based on mCloud  2
Watermarking and Encryption for Electronic Medical Records (...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Abdulshaheed, Haider Rasheed Abbas, Yaseen Saadi Tawfeq, Jamal F. Ateeq, Karamath Alnawayseh, Saif. E. A. Ghazal, Taher M. Baghdad College Of Economic Sciences University Computer Engineering Techniques Department Baghdad Iraq College Of Engineering Al-Nahrain University Electronic And Communications Engineering Department Baghdad Iraq Medical Technical College Al-Farahidi University Department Of Medical Instrumentation Technical Engineering Baghdad10070 Iraq School Of Computing Skyline University College University City Sharjah Sharjah United Arab Emirates College Of Engineering Mutah University Department Of Electrical Engineering Al-Karak Jordan Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
Providing quality healthcare services and promoting collaborative clinical research are easier and more efficient with electronic medical record (EMR) systems. All aspects of care are included in electronic health rec... 详细信息
来源: 评论
On authenticated skyline query processing over road networks
On authenticated skyline query processing over road networks
收藏 引用
作者: Zhu, Xiaoyu Wu, Jie Chang, Wei Zakirul Alam Bhuiyan, Md Raymond Choo, Kim-Kwang Qi, Fang Liu, Qin Wang, Guojun School of Computer Science and Engineering Central South University Changsha China Center for Networked Computing Temple University PhiladelphiaPA United States Department of Computer and Information Sciences Saint Joseph's University PhiladelphiaPA United States Department of Computer Science Fordham University New York CityNY United States Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX United States School of Computer Science and Electronic Engineering Hunan University Changsha China School of Computer Science Guangzhou University Guangzhou China
In recent times, many location-based service providers (LBSPs) choose to outsource data query services to third-party cloud service providers (CSPs). This allows users to easily search for points of interests (POIs), ... 详细信息
来源: 评论
Less is more: Feature selection for adversarial robustness with compressive counter-adversarial attacks
arXiv
收藏 引用
arXiv 2021年
作者: Ozfatura, Emre Hameed, Muhammad Zaid Ozfatura, Kerem Gunduz, Deniz Information Processing and Communications Lab Department of Electrical and Electronic Engineering Imperial College London United Kingdom Resilient Information Systems Security Group Department of Computing Imperial College London United Kingdom
A common observation regarding adversarial attacks is that they mostly give rise to false activation at the penultimate layer to fool the classifier. Assuming that these activation values correspond to certain feature... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论
Small file read performance optimization based on redis cache in distributed storage system  13th
Small file read performance optimization based on redis cach...
收藏 引用
13th International Conference on Genetic and Evolutionary computing, ICGEC 2019
作者: Wei, Bizhong Deng, Liqiang Fan, Ya Ye, Miao School of Computer Science and Information Security Guilin University of Electronic Technology GuilinGuangxi541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology GuilinGuangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology GuilinGuangxi541004 China
At present, small files stored in most of the distributed storage systems account for a large proportion, how to improve the storage efficiency of small file has long been a hot issue in the academic community. In the... 详细信息
来源: 评论
computing Power in the Sky: Digital Twin-assisted Collaborative computing with Multi-UAV Networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论