咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是131-140 订阅
排序:
Analysis of variance of graph-clique mining for scalable proof of work  14th
Analysis of variance of graph-clique mining for scalable pro...
收藏 引用
14th International Conference on Information security and Cryptology, Inscrypt 2018
作者: Anada, Hiroaki Matsushima, Tomohiro Su, Chunhua Meng, Weizhi Kawamoto, Junpei Bag, Samiran Sakurai, Kouichi Department of Information Security University of Nagasaki Nagasaki Japan Department of Informatics Graduate School and Faculty of Information Science and Electrical Engineering Kyushu University Fukuoka Japan Division of Computer Science University of Aizu Aizuwakamatsu Japan Department of Applied Mathematics and Computer Science Technical University of Denmark Kongens Lyngby Denmark School of Computing Science Newcastle University Newcastle upon Tyne United Kingdom
Recently, Bitcoin is becoming one of the most popular decentralized cryptographic currency technologies, and Bitcoin mining is a process of adding transaction records to Bitcoin’s public ledger of past transactions o... 详细信息
来源: 评论
The role of semantics in games and simulations
收藏 引用
computers in Entertainment 2008年 第4期6卷
作者: Tutenel, Tim Bidarra, Rafael Smelik, Ruben M. De Kraker, Klaas Jan D. Delft University of Technology Netherlands TNO Defense Safety and Security Netherlands Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Netherlands Modeling and Simulation Department TNO Defense Safety and Security Netherlands
Powerful graphics hardware is enabling strong improvements in both the appearance and the complexity of virtual worlds for games and simulations. However, current practices in the design and development of virtual wor... 详细信息
来源: 评论
Data Preprocessing Technology in Network Traffic Anomaly Detection
Data Preprocessing Technology in Network Traffic Anomaly Det...
收藏 引用
作者: Duan, Xueyuan Fu, Yu Wang, Kun Department of Information Security Naval University of Engineering Wuhan430033 China College of Computer and Information Technology Xinyang Normal University Xinyang464000 China Henan Key Laboratory of Analysis and Applications of Education Big Data Xinyang464000 China School of Mathematics and Information Engineering Xinyang Vocational and Technical College Xinyang464000 China
computer network plays a very important role in today’s world. With the development of network technology and the increasing popularity of network topology, network management is facing huge challenges. Among them, f... 详细信息
来源: 评论
Application of Finite Partially Ordered Sets in the Determination of Production Chain Planning Strategy  7
Application of Finite Partially Ordered Sets in the Determin...
收藏 引用
7th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2023
作者: Sobchuk, Valentyn Laptiev, Oleksandr Tsyganivska, Iryna Zhuravlev, Viktor Taras Shevchenko National University of Kyiv Engineering Sciences Mechanical and Mathematical Faculty Department of Integral and Differential Equations Kyiv Ukraine Taras Shevchenko National University of Kyiv Technical Sciences Faculty of Information Tehnology Department of Cyber Security and Information Protection Kyiv Ukraine Taras Shevchenko National University of Kyiv Physics and Mathematics Sciences Mechanical and Mathematical Faculty Department of Algebra and Computer Mathematics Kyiv Ukraine
Using the implemented planning mechanisms in modern IAMS, an approach has been developed for the application of elements of the apparatus of the mathematical theory of categories for the automation of production proce... 详细信息
来源: 评论
A new secret sharing scheme based on commutative encrypted function
A new secret sharing scheme based on commutative encrypted f...
收藏 引用
International Forum on Information Technology and Applications
作者: He, Jun Li, Ximei Li, Lijuan Tang, Chunming Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan 418000 China School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong 510006 China State Key Laboratory of Information Security Institute of Software Science CAS Beijing 100080 China
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ... 详细信息
来源: 评论
A new forward-secure proxy signature scheme
A new forward-secure proxy signature scheme
收藏 引用
2010 International Forum on Information Technology and Applications, IFITA 2010
作者: He, Jun Li, Ximei Li, Lijuan Tang, Chunming Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan 418000 China School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong 510006 China State Key Laboratory of Information Security Institute of Software Science CAS Beijing 100080 China
Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it hav... 详细信息
来源: 评论
3D CAD Drawing Watermarking Based on Three Components
3D CAD Drawing Watermarking Based on Three Components
收藏 引用
IEEE International Conference on Image Processing
作者: Ki-ryong Kwon Hey-jung Chang Gwang S. Jung Kwang-seok Moon Suk-hwan Lee Divisiorn of Electronic Computer and Telecommuication Engineering Pukyong National University South Korea Department of Mathematics and Computer Science CUNY USA Department of Information Security Tongmyong University South Korea
This paper proposed a watermarking for copyright protection of 3D CAD design drawing based on 3 basic components that are Line, ARC, and 3DFACE. The watermark is embedded into the length in Line, the radius of curvatu... 详细信息
来源: 评论
The Immense Impact of Reverse Edges on Large Hierarchical Networks
收藏 引用
engineering 2024年 第5期36卷 240-249页
作者: Haosen Cao Bin-Bin Hu Xiaoyu Mo Duxin Chen Jianxi Gao Ye Yuan Guanrong Chen Tamás Vicsek Xiaohong Guan Hai-Tao Zhang MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China School of Mechanical and Aerospace Engineering Nanyang Technological UniversitySingapore 639798Singapore Jiangsu Key Laboratory of Networked Collective Intelligence School of MathematicsSoutheast UniversityNanjing 210096China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA Department of Electronic Engineering City University of Hong KongHong Kong 999077China Department of Biological Physics Eötvös UniversityBudapest 1117Hungary MOE Key Laboratory for Intelligent Networks and Network Security School of Automation Science and EngineeringXi’an Jiaotong UniversityXi’an 710049China
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so *** structure o... 详细信息
来源: 评论
Energy optimal selection of access points in wireless sensor networks
Energy optimal selection of access points in wireless sensor...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
作者: Xin, Qin Yao, Xiaolan He, Wei Universite Catholique de Louvain Department of Applied Mathematics Louvain-la-Neuve Belgium National University of Defense Technology School of Computer Science Changsha China State Key Laboratory of Power Transmission Equipment and System Security and New Technology College of Electrical Engineering Chongqing University China
In a Wireless Sensor Networks (WSN), there are normally one or several sensor nodes working as Access Points (AP), which are able to provide a relay for other sensors to an external Internet connection. Since WSNs are... 详细信息
来源: 评论
Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication
Distributed Privacy-Preserving Secure Aggregation in Vehicul...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Bo Qin Qianhong Wu Josep Domingo-Ferrer Willy Susilo Department of Mathematics School of Science Xi'an University of Technology China Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain School of Computer Wuhan University of China China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs sho... 详细信息
来源: 评论