咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是121-130 订阅
排序:
Pioneering Advanced Deep Multi-Task Learning Model for Precise COVID-19 Diagnosis  2
Pioneering Advanced Deep Multi-Task Learning Model for Preci...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Kordnoori, Shirin Alqammaz, Abdullah Sabeti, Maliheh Boostani, Reza Mostafaei, Hamidreza Agha Banihashemi, Saeed Seyed Islamic Azad University North Tehran Branch Department of Computer Engineering Tehran Iran Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan College of Engineering University of Business and Technology Jeddah21448 Saudi Arabia Shiraz University Faculty of Electrical and Computer Engineering Cse and It Departmnet Shiraz Iran Islamic Azad University Shiraz University North Tehran Branch Department of Statistics Tehran Iran Islamic Azad University North Tehran Branch Department of Mathematics Tehran Iran
To address the urgent need for intelligent systems capable of simultaneously identifying COVID-19 cases and delineating lung infection regions in CT scan images, we introduce a multi-task architecture. Initially, our ... 详细信息
来源: 评论
Chimp Optimization Algorithm Based Feature Selection with Machine Learning for Medical Data Classification
收藏 引用
computer Systems Science & engineering 2023年 第12期47卷 2791-2814页
作者: Firas Abedi Hayder M.A.Ghanimi Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Ali Hashim Abbas Zahraa H.Kareem Hussein Muhi Hariz Ahmed Alkhayyat Department of Mathematics College of EducationAl-Zahraa University for WomenKarbalaIraq Biomedical Engineering Department College of EngineeringUniversity ofWarith Al-AnbiyaaKarbalaIraq Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Computer Science Department Security Engineering LabPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt College of Information Technology Imam Jaafar Al-Sadiq UniversityAl-Muthanna66002Iraq Department of Medical Instrumentation Techniques Engineering Al-Mustaqbal University CollegeHillah51001Iraq Computer Engineering Department Mazaya University CollegeDhi QarIraq College of Technical Engineering the Islamic UniversityNajafIraq
Datamining plays a crucial role in extractingmeaningful knowledge fromlarge-scale data repositories,such as data warehouses and *** rule mining,a fundamental process in data mining,involves discovering correlations,pa... 详细信息
来源: 评论
On an attack on RSA with small CRT-exponents
收藏 引用
Science China(Information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1,2 , WANG XiaoYun 3 & XU GuangWu 3,4 1 Key Laboratory of Cryptologic Technology and Information security, Ministry of Education, Shandong University, Jinan 250100, China 2 School of mathematics, Shandong University, Jinan 250100, China 3 Institute for Advanced Study, Tsinghua University, Beijing 100084, China 4 department of Electrical engineering and computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, USA 1. Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China2. School of Mathematics Shandong University Jinan 250100 China3. Institute for Advanced Study Tsinghua University Beijing 100084 China4. Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee WI 53201 USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 评论
Detection of Liver Disease Using Machine Learning Approach  5
Detection of Liver Disease Using Machine Learning Approach
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kshirsagar, Pravin Ramdas Reddy, Dhoma Harshavardhan Dhingra, Mallika Dhabliya, Dharmesh Gupta, Ankur G H Raisoni College of Engineering Department of Artificial Intelligence Maharashtra Nagpur India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Maharashtra Mumbai India Manipal University Jaipur Department of Mathematics and Statistics Rajasthan Jaipur India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Vaish College of Engineering Department of Computer Science and Engineering Haryana Rohtak India
For more effective therapy, it's critical to get an early diagnosis of liver illness. Due to the disease's modest symptoms, it is a very difficult challenge for medical experts to forecast the disease in its e... 详细信息
来源: 评论
A Scalable Platform to Collect, Store, Visualize and Analyze Big Data in Real- Time  3
A Scalable Platform to Collect, Store, Visualize and Analyze...
收藏 引用
3rd International Conference on Innovative Practices in Technology and Management, ICIPTM 2023
作者: Kshirsagar, Pravin Ramdas Reddy, Dhoma Harshavardhan Dhingra, Mallika Dhabliya, Dharmesh Gupta, Ankur S B Jain College of Engineering and Technology Department of Artificial Intelligence Maharashtra Nagpur India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Maharashtra Mumbai India Manipal University Jaipur Department of Mathematics and Statistics Rajasthan Jaipur India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Vaish College of Engineering Department of Computer Science and Engineering Haryana Rohtak India
Examination and evaluation of sentiment The most popular area for dissecting and extracting knowledge from communication data from many sources, such as Facebook, Instagram, Twitter, Amazon, and so on, is known as min... 详细信息
来源: 评论
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split Federated Learning Scheme for Non-IID Data  7
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split...
收藏 引用
7th Cyber security in Networking Conference, CSNet 2023
作者: Arafeh, Mohamad Wazzeh, Mohamad Ould-Slimane, Hakima Talhi, Chamseddine Mourad, Azzam Otrok, Hadi Department of Software and It Engineering Montreal Canada Department of Mathematics and Computer Science Canada New York University Division of Science Abu Dhabi United Arab Emirates Cyber Security Systems and Applied Ai Research Center Lebanese American University Department of Csm Beirut Lebanon Khalifa University Department of Eecs Abu Dhabi United Arab Emirates
This paper proposes a scheme addressing the challenges of integrating privacy-preserving distributed machine learning in the Internet of Things (IoT) context while improving the efficiency of the learning process and ... 详细信息
来源: 评论
Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment
收藏 引用
computer Systems Science & engineering 2023年 第12期47卷 3127-3144页
作者: Firas Abedi Hayder M.A.Ghanimi Abeer D.Algarni Naglaa F.Soliman Walid El-Shafai Ali Hashim Abbas Zahraa H.Kareem Hussein Muhi Hariz Ahmed Alkhayyat Department of Mathematics College of EducationAl-Zahraa University forWomenKarbalaIraq Biomedical Engineering Department College of EngineeringUniversity ofWarith Al-AnbiyaaKarbalaIraq Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt College of Information Technology Imam Jaafar Al-Sadiq UniversityAl-Muthanna66002Iraq Department of Medical Instrumentation Techniques Engineering Al-Mustaqbal University CollegeHillah51001Iraq Computer Engineering Department Mazaya University CollegeDhi QarIraq College of Technical Engineering The Islamic UniversityNajafIraq
Computational intelligence(CI)is a group of nature-simulated computationalmodels and processes for addressing difficult real-life *** CI is useful in the UAV domain as it produces efficient,precise,and rapid ***,unman... 详细信息
来源: 评论
A Review on Application of Deep Learning in Natural Language Processing  5
A Review on Application of Deep Learning in Natural Language...
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kshirsagar, Pravin Ramdas Reddy, Dhoma Harshavardhan Dhingra, Mallika Dhabliya, Dharmesh Gupta, Ankur G H Raisoni College of Engineering Department of Artificial Intelligence Maharashtra Nagpur India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Maharashtra Mumbai India Manipal University Jaipur Department of Mathematics and Statistics Rajasthan Jaipur India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Vaish College of Engineering Department of Computer Science and Engineering Haryana Rohtak India
Natural Language Processing (NLP) is a developing method utilized in building different sorts of Artificial Intelligence (AI) that is available in today's time. More intellectual applications will tend to be a pri... 详细信息
来源: 评论
A Review on Comparative study of 4G, 5G and 6G Networks  5
A Review on Comparative study of 4G, 5G and 6G Networks
收藏 引用
5th International Conference on Contemporary Computing and Informatics, IC3I 2022
作者: Kshirsagar, Pravin Ramdas Reddy, Dhoma Harshavardhan Dhingra, Mallika Dhabliya, Dharmesh Gupta, Ankur G H Raisoni College of Engineering Department of Artificial Intelligence Maharashtra Nagpur India Trainee Security Analyst JunoClinic Davman Technology Services Pvt. Ltd Maharashtra Mumbai India Manipal University Jaipur Department of Mathematics and Statistics Rajasthan Jaipur India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Vaish College of Engineering Department of Computer Science and Engineering Haryana Rohtak India
In the previous several years, wireless telecommunications technology has seen a significant change. The term 'generation' in the context of wireless communication typically describes to a shift in the essenti... 详细信息
来源: 评论
Hardware Performance Evaluation of SHA-3 Candidate Algorithms
收藏 引用
Journal of Information security 2012年 第2期3卷 69-76页
作者: Yaser Jararweh Lo’ai Tawalbeh Hala Tawalbeh Abidalrahman Moh’d Computer Science Department Jordan University of Science and Technology(CHiS) Irbid Jordan Director of Cryptographic Hardware and Information Security Lab (CHiS) Computer Engineering DepartmentJordan University of Science and Technology Irbid Jordan Engineering Mathematics & Internetworking Dalhousie University Halifax Canada
Secure Hashing Algorithms (SHA) showed a significant importance in today’s information security applications. The National Institute of Standards and Technology (NIST), held a competition of three rounds to replace S... 详细信息
来源: 评论