咨询与建议

限定检索结果

文献类型

  • 172 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 345 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 229 篇 工学
    • 180 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 35 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 120 篇 理学
    • 75 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 7 篇 accuracy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...
  • 4 篇 college of mathe...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 duan xueyuan

语言

  • 325 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
345 条 记 录,以下是161-170 订阅
排序:
Two-Layer SVM, Towards Deep Statistical Learning
Two-Layer SVM, Towards Deep Statistical Learning
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Alireza Kazemi Reza Boostani Mahmoud Odeh Mohammad Rasmi AL-Mousa Mathematics Department Faculty of Science Shiraz University Shiraz Fars Iran CSE&IT Dept. Electrical and Computer Engineering School Shiraz University Shiraz Fars Iran Department of Management Information System Zarqa University Jordan Department of Cyber Security Faculty of Information Technology Zarqa University Zarqa Jordan
Support Vector Machine (SVM) is originally a binary large-margin classifier emerged from the concept of structural risk minimization. Multiple solutions such as one-versus-one and one-versus-all have been proposed for... 详细信息
来源: 评论
PDA Construction via Union of Cartesian Product Cache Configurations for Coded Caching
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Jinyu Cheng, Minquan Wan, Kai Caire, Giuseppe Key Lab of Education Blockchain and Intelligent Technology Ministry of Education China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin541004 China School of Mathematics and Statistics Guangxi Normal University Guilin541004 China School of Electronic Information and Communications Huazhong University of Science and Technology Wuhan430074 China Electrical Engineering and Computer Science Department Technische Universität Berlin Berlin10587 Germany
Caching is an efficient technique to reduce peak traffic by storing popular content in local caches. Placement delivery array (PDA) proposed by Yan et al. is a combinatorial structure to design coded caching schemes w... 详细信息
来源: 评论
Privacy engineering in the Wild: Understanding the Practitioners’ Mindset, Organisational Aspects, and Current Practices
arXiv
收藏 引用
arXiv 2022年
作者: Iwaya, Leonardo Horn Ali Babar, Muhammad Rashid, Awais Centre for Research on Engineering Software Technologies The University of Adelaide AdelaideSA5005 Australia Australia research group Department of Mathematics and Computer Science Karlstad University Sweden Bristol Cyber Security Group Department of Computer Science University of Bristol United Kingdom REPHRAIN: National Research Centre on Privacy Harm Reduction and Adversarial Influence Online United Kingdom
Privacy engineering, as an emerging field of research and practice, comprises the technical capabilities and management processes needed to implement, deploy, and operate privacy features and controls in working syste... 详细信息
来源: 评论
Traffic engineering in Dynamic Hybrid Segment Routing Networks
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF
收藏 引用
Internet of Things (Netherlands) 2023年 22卷
作者: Zahoor, Amina Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Ayub, Muhammad Faizan Conti, Mauro Das, Ashok Kumar Department of Computer Science COMSATS University Islamabad Sahiwal Campus 57000 Pakistan Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Sahiwal 57000 Pakistan Department of Mathematics University of Padua Padua 35131 Italy Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India
IoT-enabled Smart Grid (IoT-SG) is an emerging paradigm that enables the bi-direction communication of IoT devices and hardware to efficiently collect and transmit the consumer's information over the Internet. How... 详细信息
来源: 评论
Detection of Liver Disease Using Machine Learning Approach
Detection of Liver Disease Using Machine Learning Approach
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Pravin Ramdas Kshirsagar Dhoma Harshavardhan Reddy Mallika Dhingra Dharmesh Dhabliya Ankur Gupta Department of Artificial Intelligence G H Raisoni College of Engineering Nagpur Maharashtra India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Mumbai Maharashtra India Department of Mathematics and Statistics Manipal University Jaipur Jaipur Rajasthan India Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science and Engineering Vaish College of Engineering Rohtak Haryana India
For more effective therapy, it’s critical to get an early diagnosis of liver illness. Due to the disease’s modest symptoms, it is a very difficult challenge for medical experts to forecast the disease in its early s... 详细信息
来源: 评论
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors  16th
Blockchain-Based Efficient Public Integrity Auditing for Clo...
收藏 引用
16th International Conference on Information security and Cryptology, Inscrypt 2020
作者: Li, Shanshan Xu, Chunxiang Zhang, Yuan Yang, Anjia Wen, Xinsheng Chen, Kefei School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China College of Cyber Security Jinan University Guangzhou China Department of Mathematics Hangzhou Normal University Hangzhou China Key Laboratory of Dynamic Cognitive System of Electromagnetic Spectrum Space Ministry of Industry and Information Technology Nanjing University of Aeronautics and Astronautics Nanjing China
Public integrity auditing enables a user to delegate a third-party auditor (TPA) to periodically audit the integrity of the outsourced data. Whereas, the security of public auditing schemes relies on the trustworthine... 详细信息
来源: 评论
A Review on Application of Deep Learning in Natural Language Processing
A Review on Application of Deep Learning in Natural Language...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Pravin Ramdas Kshirsagar Dhoma Harshavardhan Reddy Mallika Dhingra Dharmesh Dhabliya Ankur Gupta Department of Artificial Intelligence G H Raisoni College of Engineering Nagpur Maharashtra India Trainee Security Analyst JunoClinic Davman Technology Services Private Limited Mumbai Maharashtra India Department of Mathematics and Statistics Manipal University Jaipur Jaipur Rajasthan India Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science and Engineering Vaish College of Engineering Rohtak Haryana India
Natural Language Processing (NLP) is a developing method utilized in building different sorts of Artificial Intelligence (AI) that is available in today’s time. More intellectual applications will tend to be a primar... 详细信息
来源: 评论
A Review on Comparative study of 4G, 5G and 6G Networks
A Review on Comparative study of 4G, 5G and 6G Networks
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Pravin Ramdas Kshirsagar Dhoma Harshavardhan Reddy Mallika Dhingra Dharmesh Dhabliya Ankur Gupta Department of Artificial Intelligence G H Raisoni College of Engineering Nagpur Maharashtra India Trainee Security Analyst JunoClinic Davman Technology Services Pvt. Ltd Mumbai Maharashtra India Department of Mathematics and Statistics Manipal University Jaipur Jaipur Rajasthan India Department of Information Technology Vishwakarma Institute of Information Technology Pune Maharashtra India Department of Computer Science and Engineering Vaish College of Engineering Rohtak Haryana India
In the previous several years, wireless telecommunications technology has seen a significant change. The term “generation” in the context of wireless communication typically describes to a shift in the essential cha... 详细信息
来源: 评论
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split Federated Learning Scheme for Non-IID Data
Efficient Privacy-Preserving ML for IoT: Cluster-Based Split...
收藏 引用
Cyber security in Networking Conference (CSNet)
作者: Mohamad Arafeh Mohamad Wazzeh Hakima Ould-Slimane Chamseddine Talhi Azzam Mourad Hadi Otrok Department of Software and IT engineering Ecole de Technologie Superieure (ETS) Montreal Canada Department of Mathematics and Computer Science Universite de Quebec a Trois-Rivieres (UQTR) Canada Division of Science New York University Abu Dhabi UAE Department of CSM Cyber Security Systems and Applied AI Research Center Lebanese American University Beirut Lebanon Department of EECS Center of Cyber-Physical Systems (C2PS) Khalifa University Abu Dhabi UAE
This paper proposes a scheme addressing the challenges of integrating privacy-preserving distributed machine learning in the Internet of Things (IoT) context while improving the efficiency of the learning process and ...
来源: 评论