咨询与建议

限定检索结果

文献类型

  • 170 篇 期刊文献
  • 166 篇 会议

馆藏范围

  • 336 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 179 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 34 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 120 篇 理学
    • 75 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 artificial intel...
  • 5 篇 privacy
  • 4 篇 support vector m...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 trainee security...
  • 4 篇 computer and inf...
  • 4 篇 college of mathe...
  • 4 篇 department of co...
  • 4 篇 shanghai key lab...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 duan xueyuan

语言

  • 316 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
336 条 记 录,以下是111-120 订阅
排序:
Deep Learning Approach for Complex Activity Recognition using Heterogeneous Sensors from Wearable Device
Deep Learning Approach for Complex Activity Recognition usin...
收藏 引用
2021 Research, Invention, and Innovation Congress: Innovation Electricals and Electronics, RI2C 2021
作者: Hnoohom, Narit Jitpattanakul, Anuchit You, Ilsun Mekruksavanich, Sakorn Mahidol University Image Information and Intelligence Laboratory Department of Computer Engineering Faculty of Engineering Nakhon Pathom Thailand King Mongkut's University of Technology North Bangkok Intelligent and Nonlinear Dynamic Innovations Research Center Department of Mathematics Faculty of Applied Science Bangkok Thailand Soonchunhyang University Department of Information Security Engineering Asan31538 Korea Republic of University of Phayao School of Information and Communication Technology Department of Computer Engineering Phayao Thailand
The classification of simple and complex sequences of operations is made easier according to the use of heterogeneous sensors from a wearable device. Sensor-based human activity recognition (HAR) is being used in smar... 详细信息
来源: 评论
Identity-Based Authentication for On-Demand Charging of Electric Vehicles
arXiv
收藏 引用
arXiv 2022年
作者: Asokraj, Surudhi Bianchi, Tommaso Brighente, Alessandro Conti, Mauro Poovendran, Radha The Network Security Lab The Department of Electrical and Computer Engineering University of Washington SeattleWA98195-2500 United States The Department of Mathematics University of Padua Via Trieste 63 Padua35121 Italy
Dynamic wireless power transfer provides means for charging Electric Vehicles (EVs) while driving, avoiding stopping for charging and hence fostering their widespread adoption. Researchers devoted much effort over the... 详细信息
来源: 评论
A Generalized Outage Prediction Model for Various Types of Extreme Climate Events in Texas
A Generalized Outage Prediction Model for Various Types of E...
收藏 引用
IEEE International Conference on Big Data
作者: Jangjae Lee Sangkeun Matthew Lee Stephanie German Paal Supriya Chinthavali Zachry Department of Civil and Environmental Engineering Texas A&M University College Station TX USA Computer Science and Mathematics Division Oak Ridge National Laboratory Oak Ridge TN USA Geospatial Science and Human Security Division Oak Ridge National Laboratory Oak Ridge TN USA
This study proposes a generalized model for predicting power outages for various types of extreme weather events. To accomplish the objective of this research, diverse features (e.g., weather data, geographical featur... 详细信息
来源: 评论
Speaker's Emotions Recognition Module Based on the GoogleLeNet Neural Network
Speaker's Emotions Recognition Module Based on the GoogleLeN...
收藏 引用
2022 International Conference on Smart Information Systems and Technologies, SIST 2022
作者: Tereikovskyi, Ihor Tereikovska, Liudmyla Kryvoruchko, Olena Tereikovskyi, Oleh Tyshchenko, Dmytro Franchuk, Tamara National Technical University Of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Dept. Of System Programming And Specialized Computer Systems Kyiv Ukraine Kyiv National University Of Construction And Architecture Dept. Of Information Technology For Design And Applied Mathematics Kyiv Ukraine Kyiv National University Of Trade And Economics Dept. Of Software Engineering And Cyber Security Kyiv Ukraine National Technical University Of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Dept. Of Department Of Computer Engineering Kyiv Ukraine
The article is devoted to the development of means for recognition of the emotions of the speaker, based on the neural network analysis of fixed fragments of the voice signal. The possibility of improving recognition ... 详细信息
来源: 评论
'Permanent' algorithm for the meeting shedule problem  16
'Permanent' algorithm for the meeting shedule problem
收藏 引用
16th IEEE International Conference on computer Science and Information Technologies, CSIT 2021
作者: Turbal, Yuriy Babych, Sergii Kunanets, Nataliia Melnyk, Leonid Pasichnyk, Volodymyr National University of Water and Environmental Engineering Department of Computer Science and Applied Mathematics Rivne Ukraine College of National University of Life and Environmental Sciences of Ukraine Software Engineering Rivne Ukraine National University 'Lviv Polytechnic' Department of Information Systems and Networks Lviv Ukraine National University of Water and Environmental Engineering Department of Finance and Economic Security Rivne Ukraine
An algorithm for solving the problem of scheduling meetings in the process of working on a project is proposed in the paper. The problem of project managers meetings with working groups is considered under certain res... 详细信息
来源: 评论
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development
arXiv
收藏 引用
arXiv 2022年
作者: Iwaya, Leonardo Horn Ali Babar, M. Rashid, Awais Wijayarathna, Chamila Centre for Research on Engineering Software Technologies The University of Adelaide AdelaideSA5005 Australia Australia Department of Mathematics and Computer Science Karlstad University Karlstad Sweden Bristol Cyber Security Group Department of Computer Science University of Bristol United Kingdom
An increasing number of mental health services are offered through mobile systems, a paradigm called mHealth. Although there is an unprecedented growth in the adoption of mHealth systems, partly due to the COVID-19 pa... 详细信息
来源: 评论
Real-Time GPS Spoofing Detection in Consumer Drones through Multi-Sensor Data Fusion and TimesNet
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Wang, Jialiang Nie, Liuyang Gu, Zhaojun Wang, Jingyu Tan, Rui Kumari, Saru Civil Aviation University of China College of Computer Science and Technology Tianjin300300 China Civil Aviation University of China Information Security Evaluation Center Tianjin300300 China Civil Aviation University of China College of Safety Science and Engineering Tianjin300300 China Chaudhary Charan Singh University Department of Mathematics Uttar Pradesh Meerut India Lovely Professional University School Chemical Engineering and Physical Sciences Punjab Jalandhar144411 India
To address the threat of GPS spoofing attacks on consumer drones, this paper proposes a real-time detection method based on multi-sensor data fusion and TimesNet. By integrating data from multi-source heterogeneous se... 详细信息
来源: 评论
Divertible Searchable Symmetric Encryption for Secure Cloud Storage
Divertible Searchable Symmetric Encryption for Secure Cloud ...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Xi Zhang Cheng Huang Ye Su Jing Qin Xuemin Shen School of Mathematics Shandong University Jinan China Department of Electrical and Computer Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Chinese Academy of Sciences Beijing China
Searchable Symmetric Encryption (SSE) is a promising method for users to store data in remote clouds securely and search them using keywords over an encrypted index. In this paper, we explore a new function named “ke... 详细信息
来源: 评论
Traffic Sign Detection Problems using Convolutional Neural Techniques in Image Processing
Traffic Sign Detection Problems using Convolutional Neural T...
收藏 引用
Intelligent Systems for Cybersecurity (ISCS), International Conference on
作者: A. S. F. Subhamathi C. Sathiyapriyan Anuradha. T A. Jose Anand Abdul Rheem M. R. Arun Department of Electrical and Electronics Engineering Karpagam Academy of Higher Education Coimbatore Tamilnadu Department of Computer Science and Engineering Cyber Security Aarupadai Veedu Institute of Technology Chennai Department of Electrical and Electronics Engineering KCG College of Technolog Chennai Tamil Nadu India Department of ECE KCG College of Technology Karapakkam Chennai Department of Mathematics & Humanities MMEC Maharshi Markandeshwar (Deemed to be University) Mullana Ambala Haryana Department of ECE Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai
Traffic sign detection is a critical component in advancing intelligent transportation systems and ensuring road safety. Convolutional Neural Networks (CNNs) have emerged as powerful tools in image processing and comp... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论