咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是151-160 订阅
排序:
Related-key boomerang and rectangle attacks: Theory and experimental analysis
Related-key boomerang and rectangle attacks: Theory and expe...
收藏 引用
作者: Kim, Jongsung Hong, Seokhie Preneel, Bart Biham, Eli Dunkelman, Orr Keller, Nathan Division of E-Business Kyungnam University Kyungnam 630-701 Korea Republic of Center for Information Security and Technologies Korea University Seoul 136-701 Korea Republic of Department of Electrical Engineering Katholieke Universiteit Leuven B-3001 Leuven-Heverlee Belgium Department of Computer Science Technion Haifa 32000 Israel Department of Computer Science University of Haifa 31905 Haifa Israel Department of Mathematics Bar Ilan University Ramat-Gan 52900 Israel
In 2004, we introduced the related-key boomerang/rectangle attacks, which allow us to enjoy the benefits of the boomerang attack and the related-key technique, simultaneously. The new attacks were used since then to a... 详细信息
来源: 评论
On the link between explicit MPC and the face lattice of the lifted feasible domain
收藏 引用
IFAC-PapersOnLine 2022年 第16期55卷 308-313页
作者: Ştefan S. Mihai Florin Stoican Bogdan D. Ciubotaru Department of Automatic Control and Systems Engineering University "Politehnica" of Bucharest 313 Splaiul Independenţei Sector 6 060042 Bucharest Romania Research Center for Logic Optimization and Security (LOS) Department of Computer Science Faculty of Mathematics and Computer Science University of Bucharest.
The paper provides a geometric interpretation for the explicit solution of the quadratic cost, linear-constrained MPC (model predictive control) problem. We link the face lattice of the lifted feasible domain (defined... 详细信息
来源: 评论
Data Processing Technology for Network Abnormal Traffic Detection  4
Data Processing Technology for Network Abnormal Traffic Dete...
收藏 引用
4th International Conference on Machine Learning and Big Data Analytics for IoT security and Privacy, SPIoT 2023
作者: Wang, Kun Fu, Yu Duan, Xueyuan Xu, Jianqiao Liu, Taotao Department of Information Security Naval University of Engineering Wuhan430033 China School of Mathematics and Information Engineering Xinyang Vocational and Technical College Xinyang464000 China College of Computer and Information Technology Xinyang Normal University Xinyang464000 China Henan Key Laboratory of Analysis and Applications of Education Big Data Xinyang Normal University Xinyang464000 China
At present, the threats to network security are also increasing, among which abnormal traffic detection is the key link to ensure network security. Traditional detection methods based on signature or threshold are oft... 详细信息
来源: 评论
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC)
Cyber Deception System based on Monte Carlo Simulation in th...
收藏 引用
International Conference on computer, Information and Telecommunication Systems (CITS)
作者: Joelle Kabdjou Elie Fute Tagne Danda B. Rawat Jaime Acosta Charles Kamhoua Department of Mathematics and Computer Science University of Dschang Dschang Cameroon Department of Computer Engineering University of Buea Buea Dschang Cameroon Department of Electrical Engineering and Computer Science Howard University Washington USA DEVCOM Army Research Laboratory Network Security Branch Adelphi US
The frequency of malicious activities by cyber attackers is on the rise, posing a significant challenge to counter cyber attacks in the Mobile Edge Computing (MEC) environment. The vulnerability of wireless networks, ...
来源: 评论
Inconsistencies among spectral robustness metrics  1
收藏 引用
14th EAI International Conference on Heterogeneous Networking for Quality, Reliability, security and Robustness, Qshine 2018
作者: Wang, Xiangrong Feng, Ling Kooij, Robert E. Marzo, Jose L. Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands Computing Science Department Institute of High Performance Computing A*STAR Singapore Singapore iTrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore Singapore Institute of Informatics and Applications University of Girona Girona Spain
Network robustness plays a critical role in the proper functioning of modern society. It is common practice to use spectral metrics, to quantify the robustness of networks. In this paper we compare eight different spe... 详细信息
来源: 评论
A chaotic artificial bee colony algorithm based on lévy search
A chaotic artificial bee colony algorithm based on lévy sea...
收藏 引用
作者: Lin, Shijie Dong, Chen Wang, Zhiqiang Guo, Wenzhong Chen, Zhenyi Ye, Yin College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Key Laboratory of Information Security of Network Systems Fuzhou350116 China Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350116 China Department of Electrical Engineering University of South Florida TampaFL33620 United States
A Lévy search strategy based chaotic artificial bee colony algorithm (LABC) is proposed in this paper. The chaotic sequence, global optimal mechanism and Lévy flight mechanism were introduced respectively in... 详细信息
来源: 评论
Electronic national lotteries
收藏 引用
8th International Conference on Financial Cryptography, FC 2004
作者: Konstantinou, Elisavet Liagkou, Vasiliki Spirakis, Paul Stamatiou, Yannis C. Yung, Moti Research and Academic Computer Technology Institute P.O. Box 1122 Patras26110 Greece Department of Computer Engineering and Informatics University of Patras Patras26500 Greece Department of Mathematics University of the Aegean Karlovassi Samos83200 Greece on Communications and Information Systems Security University of the Aegean and Athens University of Economics and Business Greece Computer Science Columbia University New YorkNY United States
We describe the design and implementation of secure and robust protocol and system for a national electronic lottery. Electronic lotteries at a national level are a viable cost effective alternative to mechanical ones... 详细信息
来源: 评论
CRANE: A Genuine Framework based on Verifiable Searchable Encryption security and Resource Constraints Balancing on Client Side
CRANE: A Genuine Framework based on Verifiable Searchable En...
收藏 引用
International Conference on Smart Communications and Networking (SmartNets)
作者: Marius Iulian Mihailescu Stefania Loredana Nita Valentina Marascu Faculty of Engineering and Computer Science Scientific Research Center in Mathematics and Computer Science SPIRU HARET University Bucharest Romania Department of Computer and Cybernetic Security Military Technical Academy “Ferdinand I” Bucharest Romania
This paper introduces an authentic framework that relies on verifiable searchable encryption security and a mechanism for managing resource limitations on the client-side. The framework is specifically designed to tac... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Explaining Learned Reward Functions with Counterfactual Trajectories
arXiv
收藏 引用
arXiv 2024年
作者: Wehner, Jan Oliehoek, Frans Siebert, Luciano Cavalcante CISPA Helmholtz Center for Information Security Germany Department of Intelligent Systems Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands
Learning rewards from human behavior or feedback is a promising approach to aligning AI systems with human values but fails to consistently extract correct reward functions. Interpretability tools could enable users t... 详细信息
来源: 评论