咨询与建议

限定检索结果

文献类型

  • 172 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 345 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 181 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 36 篇 电气工程
    • 30 篇 控制科学与工程
    • 23 篇 生物工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电子科学与技术(可...
    • 13 篇 安全科学与工程
    • 13 篇 网络空间安全
    • 10 篇 机械工程
    • 10 篇 建筑学
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 交通运输工程
  • 118 篇 理学
    • 72 篇 数学
    • 27 篇 物理学
    • 27 篇 生物学
    • 16 篇 系统科学
    • 13 篇 统计学(可授理学、...
  • 49 篇 管理学
    • 32 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 22 篇 法学
    • 13 篇 法学
    • 11 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 农学
  • 4 篇 经济学
  • 4 篇 文学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 security
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 326 篇 英文
  • 18 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
345 条 记 录,以下是1-10 订阅
排序:
Exploring Author Style in Nakba Short Stories: A Comparative Study of Transformer-Based Models  1
Exploring Author Style in Nakba Short Stories: A Comparative...
收藏 引用
1st International Workshop on Nakba Narratives as Language Resources, Nakba-NLP 2025
作者: Hamed, Osama Zaidkilani, Nadeem Department of Computer Systems Engineering Palestine Technical University-Kadoorie Palestine Department of Computer Engineering and Security Mathematics University Rovira i Virgili Spain Department of Engineering and Technology Al-Zaytona University of Science and Technology Palestine
Measuring semantic similarity and analyzing authorial style are fundamental tasks in Natural Language Processing (NLP), with applications in text classification, cultural analysis, and literary studies. This paper inv... 详细信息
来源: 评论
Arabic Topic Classification Corpus of the Nakba Short Stories  1
Arabic Topic Classification Corpus of the Nakba Short Storie...
收藏 引用
1st International Workshop on Nakba Narratives as Language Resources, Nakba-NLP 2025
作者: Hamed, Osama Zaidkilani, Nadeem Department of Computer Systems Engineering Palestine Technical University-Kadoorie Palestine Department of Computer Engineering and Security Mathematics University Rovira i Virgili Spain Department of Engineering and Technology Al-Zaytona University of Science and Technology Palestine
In this paper, we enrich Arabic Natural Language Processing (NLP) resources by introducing the "Nakba Topic Classification Corpus (NTCC)," a novel annotated Arabic corpus derived from narratives about the Na... 详细信息
来源: 评论
Secure Lattice-Based Signature Scheme for Internet of Things Applications
收藏 引用
IEEE Access 2025年 13卷 75985-75999页
作者: Prajapat, Sunil Gautam, Deepika Kumar, Pankaj Jangirala, Srinivas Das, Ashok Kumar Sikdar, Biplab Srinivasa Ramanujan Department of Mathematics Central University of Himachal Pradesh Dharamshala 176206 India Jindal Global Business School O. P. Jindal Global University Haryana 131001 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Computer Science and Engineering College of Informatics Korea University Seoul 02841 South Korea Department of Electrical and Computer Engineering National University of Singapore 117583 Singapore
The enormous benefits of Internet of Things (IoT) technology have driven its deployment in various applications. Additionally, the development of quantum computers has directed attention towards lattice-based cryptogr... 详细信息
来源: 评论
Two-stage effective attentional generative adversarial network
收藏 引用
Applied Intelligence 2025年 第8期55卷 1-11页
作者: Jin, Mingyu Yu, Qinkai Zhang, Chong Xue, Haochen Zhao, Shuliang College of Computer and Cyber Security Hebei Normal University No. 20 Nan’erhuan East Road Hebei Shijiazhuang050024 China Electrical and Computer Engineering Northwestern University Clark Street EvanstonIL60208 United States Department of Mathematics Science University of Liverpool Brownlow Hill Merseyside LiverpoolL35UE United Kingdom School of Advanced Technology Xi’an Jiaotong-Liverpool University Ren’ai Road Jiangsu Suzhou215123 China
Although GAN models have succeeded in relevant tests, text-to-image modelling using GANs to synthesize high-quality images is still challenging. Existing multi-stage models face several problems: first, the scale is t... 详细信息
来源: 评论
Privacy-Preserving Interactive Semantic Codec Training for IoT-Based Holographic Counterparts
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Xu, Jinpeng Chen, Liang Lin, Limei Wang, Xiaoding Huang, Yanze Xu, Li Piran, Md. Jalil Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of
The use of IoT-based semantic codecs to process complex contextual semantic information in holographic counterparts introduces significant privacy risks, as it may expose sensitive data, thereby increasing the likelih... 详细信息
来源: 评论
The effect of heat acclimation on critical environmental limits and rate of rectal temperature change
收藏 引用
Journal of Applied Physiology 2025年 第5期138卷 1150-1160页
作者: Bogaard, Timo van den Klous, Lisa Cottle, Rachel M. Erp, Jan Van Daanen, Hein A. M. Department of Human Movement Sciences Faculty of Behavioural and Movement Sciences Amsterdam Movement Sciences Vrije Universiteit van Amsterdam Amsterdam Netherlands Netherlands Organization for Applied Scientific Research (TNO) Department of Human Performance Unit Defence Safety and Security Soesterberg Netherlands Department of Kinesiology Pennsylvania State University Pennsylvania United States Department Human Media Interaction Faculty Electrical Engineering University of Twente Mathematics and Computer Science Enschede Netherlands
Quantifying the effect of heat acclimation (HA) on critical wet-bulb globe temperature (WBGTcrit) and rate of rectal temperature change (vTre) is relevant for developing guidelines with regards to occupational safety ... 详细信息
来源: 评论
A Survey on Decentralized Identifiers and Verifiable Credentials
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Mazzocca, Carlo Acar, Abbas Uluagac, Selcuk Montanari, Rebecca Bellavista, Paolo Conti, Mauro University of Salerno Department of Information and Electrical Engineering and Applied Mathematics Fisciano84084 Italy Florida International University Cyber-Physical Systems Security Lab School of Computing and Information Science MiamiFL33174 United States University of Bologna Department of Computer Science and Engineering Bologna40136 Italy University of Padua Department of Mathematics Padua35131 Italy
Digital identity has always been one of the keystones for implementing secure and trustworthy communications among parties. The ever-evolving digital landscape has undergone numerous technological transformations that... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
Socio-Technical security Modelling and Simulations in Cyber-Physical Systems: Outlook on Knowledge, Perceptions, Practices, Enablers, and Barriers
收藏 引用
IET Cyber-Physical Systems: Theory and Applications 2025年 第1期10卷
作者: Ani, Uchenna Daniel Al-Mhiqani, Mohammed Tuptuk, Nilufer Hailes, Stephen McKendrick Watson, Jeremy Daniel School of Computer Science and Mathematics Keele University Keele United Kingdom Department of Computer Science University of Huddersfield Huddersfield United Kingdom Department of Security and Crime Science University College London London United Kingdom Department of Computer Science University College London London United Kingdom Department of Science Technology Engineering and Public Policy University College London London United Kingdom
Socio-Technical security Modelling and Simulation (STSec-M&S) is a technique used for reasoning and representing security viewpoints that include both the social and technical aspects of a system. It has shown gre... 详细信息
来源: 评论
Generative AI-Enabled Quantum Encryption Algorithm for Securing IoT-Based Healthcare Application Using Blockchain
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Prajapat, Sunil Kumar, Pankaj Das, Ashok Kumar Muhammad, Ghulam Central University of Himachal Pradesh Srinivasa Ramanujan Department of Mathematics Dharamshala176215 India International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11543 Saudi Arabia
The integration of Artificial Intelligence (AI) with the Internet of Things (IoT) has transformed numerous domains through the AI of Things (AIoT). Nonetheless, AIoT encounters issues related to energy usage and carbo... 详细信息
来源: 评论