咨询与建议

限定检索结果

文献类型

  • 1,835 篇 会议
  • 1,221 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 3,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,010 篇 工学
    • 1,569 篇 计算机科学与技术...
    • 1,252 篇 软件工程
    • 579 篇 信息与通信工程
    • 295 篇 控制科学与工程
    • 240 篇 电气工程
    • 194 篇 生物工程
    • 182 篇 电子科学与技术(可...
    • 168 篇 网络空间安全
    • 127 篇 生物医学工程(可授...
    • 115 篇 机械工程
    • 112 篇 安全科学与工程
    • 83 篇 仪器科学与技术
    • 76 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 63 篇 交通运输工程
  • 808 篇 理学
    • 452 篇 数学
    • 211 篇 生物学
    • 163 篇 物理学
    • 131 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 59 篇 化学
  • 527 篇 管理学
    • 332 篇 管理科学与工程(可...
    • 213 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 137 篇 法学
    • 86 篇 社会学
  • 137 篇 医学
    • 112 篇 临床医学
    • 105 篇 基础医学(可授医学...
    • 61 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 58 篇 经济学
    • 57 篇 应用经济学
  • 29 篇 军事学
  • 28 篇 农学
  • 21 篇 文学
  • 19 篇 教育学
  • 10 篇 艺术学

主题

  • 102 篇 information secu...
  • 100 篇 authentication
  • 91 篇 security
  • 90 篇 internet of thin...
  • 87 篇 cryptography
  • 78 篇 machine learning
  • 75 篇 deep learning
  • 66 篇 accuracy
  • 65 篇 protocols
  • 58 篇 feature extracti...
  • 58 篇 privacy
  • 55 篇 training
  • 49 篇 computational mo...
  • 48 篇 blockchain
  • 47 篇 artificial intel...
  • 42 篇 computer securit...
  • 41 篇 computer science
  • 40 篇 predictive model...
  • 40 篇 encryption
  • 39 篇 servers

机构

  • 75 篇 school of cyber ...
  • 66 篇 institute of inf...
  • 54 篇 state key labora...
  • 45 篇 department of co...
  • 43 篇 department of co...
  • 40 篇 school of inform...
  • 36 篇 department of co...
  • 31 篇 department of in...
  • 30 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 security enginee...
  • 26 篇 school of inform...
  • 20 篇 center for secur...
  • 19 篇 department of co...
  • 19 篇 university of ch...
  • 17 篇 school of comput...
  • 16 篇 department of cy...
  • 16 篇 department of el...
  • 15 篇 key laboratory o...
  • 15 篇 guangxi key lab ...

作者

  • 40 篇 choo kim-kwang r...
  • 38 篇 das ashok kumar
  • 30 篇 walid el-shafai
  • 24 篇 kim-kwang raymon...
  • 20 篇 susilo willy
  • 20 篇 naglaa f.soliman
  • 20 篇 taher m. ghazal
  • 19 篇 mohammad kamrul ...
  • 18 篇 mahmood khalid
  • 17 篇 ashok kumar das
  • 17 篇 fathi e.abd el-s...
  • 17 篇 chen kai
  • 17 篇 kai chen
  • 16 篇 guo yuanxiong
  • 16 篇 el-shafai walid
  • 16 篇 cao xiaochun
  • 16 篇 ghazal taher m.
  • 15 篇 amjed abbas ahme...
  • 14 篇 gong yanmin
  • 14 篇 ahmed amjed abba...

语言

  • 2,929 篇 英文
  • 126 篇 其他
  • 41 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Engineering and Information Security"
3097 条 记 录,以下是1-10 订阅
排序:
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and Telecommunications College of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Department of Computer Science and Engineering University College of Engineering Department of Computer Engineering National Institute of Technology Kurukshetra
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Global Spatial-Temporal information Encoder-Decoder Based Action Segmentation in Untrimmed Video
收藏 引用
Tsinghua Science and Technology 2025年 第1期30卷 290-302页
作者: Yichao Liu Yiyang Sun Zhide Chen Chen Feng Kexin Zhu Department of Computer and Cyberspace Security Fujian Normal UniversityFuzhou 350007China Department of Information Engineering Sun Yat-sen UniversityKaohsiung 80424China
Action segmentation has made significant progress,but segmenting and recognizing actions from untrimmed long videos remains a challenging *** state-of-the-art methods focus on designing models based on temporal ***,th... 详细信息
来源: 评论
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach  25th
ARP Spoofing Mitigation for the E2 Interface in Open RAN:...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has relea... 详细信息
来源: 评论
security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing  25th
Security Function for 5G-Advanced and 6G: Malicious UE Det...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Park, Jaehyoung Kim, Jihye Lee, Jong-Hyouk Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of
Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate log... 详细信息
来源: 评论
Privacy Enhanced P2P Power Trading Using DID-Based Identity Verification in a Microgrid  25th
Privacy Enhanced P2P Power Trading Using DID-Based Identity ...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Lee, Taeyang Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of
Smart meters play a crucial role in accurately measuring power usage and distribution data in microgrids. However, fine-grained data collection raises significant privacy concerns. To address this, it is essential to ... 详细信息
来源: 评论
Review of dehazing techniques: challenges and future trends
收藏 引用
Multimedia Tools and Applications 2025年 第3期84卷 1103-1131页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. EL-Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
The phenomenon of atmospheric haze arises due to the scattering of light by minute particles suspended in the atmosphere. This optical effect gives rise to visual degradation in images and videos. The degradation is p... 详细信息
来源: 评论
Analysis of Tomato Leaf Diseases Detection Models  8th
Analysis of Tomato Leaf Diseases Detection Models
收藏 引用
8th International Conference on Intelligent Technologies, ICIT 2023
作者: Satyarthi, Devshri Arya, K.V. Rathore, Santosh Singh Mishra, Richa Multimedia and Information Security Research Group Department of Computer Science and Engineering ABV-IIITM 474015 Gwalior India
Plant leaf disease distresses the growth of the plant. Therefore, early detection and classification of plant leaf disease is vital for healthy crops such as tomatoes. This early detection of tomato leaf disease in pl... 详细信息
来源: 评论
Unveiling the Pruning Risks on Privacy Vulnerabilities of Deep Neural Networks
Unveiling the Pruning Risks on Privacy Vulnerabilities of De...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Kuang, Wenxin Liang, Qizhuang Sun, Peng Fu, Wei Hu, Qiao Hu, Yupeng College of Computer Science and Electronic Engineering Hunan University Changsha China Department of Information Security Naval University of Engineering Wuhan China
Large-scale deep neural networks (DNNs), such as large language models, have gained immense popularity due to their outstanding performance across various tasks. However, their application in resource-constrained scen... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论