咨询与建议

限定检索结果

文献类型

  • 172 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 345 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 229 篇 工学
    • 180 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 35 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 120 篇 理学
    • 75 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 7 篇 accuracy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...
  • 4 篇 college of mathe...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 duan xueyuan

语言

  • 325 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
345 条 记 录,以下是181-190 订阅
排序:
Towards Cluster-Based Split Federated Learning Approach for Continuous User Authentication
Towards Cluster-Based Split Federated Learning Approach for ...
收藏 引用
Cyber security in Networking Conference (CSNet)
作者: Mohamad Wazzeh Mohamad Arafeh Hakima Ould-Slimane Chamseddine Talhi Azzam Mourad Hadi Otrok Department of Software and IT Engineering Ecole de Technologie Supérieure (ÉTS) Montreal Canada Department of Mathematics and Computer Science Université du Québec à Trois-Riviéres (UQTR) Trois-Rivières Canada Department of CSM Cyber Security Systems and Applied AI Research Center Lebanese American University Beirut Lebanon Division of Science New York University Abu Dhabi UAE Department of EECS Center of Cyber-Physical Systems (C2PS) Khalifa University Abu Dhabi UAE
In today's rapidly evolving technological landscape, ensuring the security of systems requires continuous authentication over sessions and comprehensive access management during user interaction with a device. Wit...
来源: 评论
Achieving Privacy-Preserving Iris Identification Via El Gamal
收藏 引用
computers, Materials & Continua 2019年 第8期61卷 727-738页
作者: Yong Ding Lei Tian Bo Han Huiyong Wang Yujue Wang James Xi Zheng Guangxi Key Laboratory of Cryptography and Information Security School of Computer and Information SecurityGuilin University of Electronic TechnologyGuilin541004China School of Mathematics and Computer Science Guilin University of Electronic TechnologyGuilin541004China Software Engineering Department of Computing Macquarie UniversitySydneyNSW 2109 Australia
Currently,many biometric systems maintain the user’s biometrics and templates in plaintext format,which brings great privacy risk to uses’biometric *** are unique and almost unchangeable,which means it is a great co... 详细信息
来源: 评论
EWT: Efficient Wavelet-Transformer for Single Image Denoising
arXiv
收藏 引用
arXiv 2023年
作者: Li, Juncheng Cheng, Bodong Chen, Ying Gao, Guangwei Zeng, Tieyong The School of Communication & Information Engineering Shanghai University Shanghai China Jiangsu Key Laboratory of Image and Video Understanding for Social Safety Nanjing University of Science and Technology Nanjing China The School of Computer Science and Technology Xidian University Xian China The Department of Cyberspace Security Beijing Electronic Science & Technology Institute Beijing China The Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing China The Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China The Department of Mathematics The Chinese University of Hong Kong New Territories Hong Kong
Transformer-based image denoising methods have achieved encouraging results in the past year. However, it must uses linear operations to model long-range dependencies, which greatly increases model inference time and ... 详细信息
来源: 评论
Watermarking for Out-of-distribution Detection
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Qizhou Liu, Feng Zhang, Yonggang Zhang, Jing Gong, Chen Liu, Tongliang Han, Bo Department of Computer Science Hong Kong Baptist University Hong Kong School of Mathematics and Statistics The University of Melbourne Australia School of Computer Science The University of Sydney Australia PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of MoE China Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China TML Lab The University of Sydney Australia
Out-of-distribution (OOD) detection aims to identify OOD data based on representations extracted from well-trained deep models. However, existing methods largely ignore the reprogramming property of deep models and th... 详细信息
来源: 评论
A survey on security and privacy issues of UAVs
arXiv
收藏 引用
arXiv 2021年
作者: Mekdad, Yassine Aris, Ahmet Babun, Leonardo Fergougui, Abdeslam E.L. Conti, Mauro Lazzeretti, Riccardo Uluagac, A. Selcuk Laboratory of Computer Networks and Systems Moulay Ismail University of Meknes Zitoune Meknes11201 Morocco Cyber-Physical Systems Security Lab Department of Electrical and Computer Engineering Florida International University MiamiFL33174 United States Department of Mathematics University of Padua Padua35121 Italy Department of Computer Control and Management Engineering "Antonio Ruberti" Sapienza University of Rome Rome00185 Italy
In the 21st century, the industry of drones, also known as Unmanned Aerial Vehicles (UAVs), has witnessed a rapid increase with its large number of airspace users. The tremendous benefits of this technology in civilia... 详细信息
来源: 评论
Bending of a circular flexible plate taking into account the initial curvature  49
Bending of a circular flexible plate taking into account the...
收藏 引用
49th International Conference on Vibroengineering
作者: Mamatova, G.U. Sugirbekova, A.K. Bekaulov, N.M. Department of Chemical Physics and Materials Science Al-Farabi Kazakh National University Almaty050040 Kazakhstan Department of Chair of Mathematics Physics and Informatics Teaching Methods Abai Kazakh National Pedagogical University Almaty050010 Kazakhstan Department of Computer Engineering and Information Security International IT University Almaty050000 Kazakhstan
In this article, an analytical solution of the problem of bending a round plate with an initial curvature is obtained. A round plate with an initial curvature as a structural element is widely used, the calculation of... 详细信息
来源: 评论
A Privacy-Preserving Access Control Protocol for Consumer Flying Vehicles in Smart City Applications
SSRN
收藏 引用
SSRN 2022年
作者: Mahmood, Khalid Saleem, Muhammad Asad Shamshad, Salman Ghaffar, Zahid Akram, Muhammad Wahid Conti, Mauro Das, Ashok Kumar National Yunlin University of Science and Technology Yunlin Taiwan Department of Computer Science COMSATS University Islamabad Sahiwal Campus Pakistan Department of Software Engineering The University of Lahore Lahore54590 Pakistan Department of Computer Science Barani Institute of Sciences Sahiwal57000 Pakistan Department of Mathematics University of Padua Padua35131 Italy Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500032 India Virginia Modeling Analysis and Simulation Center Old Dominion University SuffolkVA23435 United States
The Internet of Drones (IoD) offers supervised admittance to drones in a targeted fly zone as the byproduct of the Internet of Things (IoT). The term drone is the trendy alias for Intelligent Flying Vehicle (IFV). The... 详细信息
来源: 评论
Multiregion Multiscale Image Segmentation with Anisotropic Diffusion  25th
Multiregion Multiscale Image Segmentation with Anisotropic D...
收藏 引用
25th International Conference on Pattern Recognition Workshops, ICPR 2020
作者: Prasath, V. B. Surya Thanh, Dang Ngoc Hoang Hai, Nguyen Hoang Dvoenko, Sergey Department of Electrical Engineering and Computer Science University of Cincinnati CincinnatiOH45221 United States Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Center CincinnatiOH45229 United States Department of Biomedical Informatics College of Medicine University of Cincinnati CincinnatiOH45267 United States Department of Pediatrics University of Cincinnati College of Medicine CincinnatiOH45257 United States Department of Information Technology School of Business Information Technology University of Economics Ho Chi Minh City Ho Chi Minh City Viet Nam Department of Computer Science Vietnam-Korea University of Information and Communication Technology – The University of Danang Danang Viet Nam Department of Information Security Institute of Applied Mathematics and Computer Science Tula State University Tula city Russia
We present a multiregion image segmentation approach which utilizes multiscale anisotropic diffusion based scale spaces. By combining powerful edge preserving anisotropic diffusion smoothing with isolevel set linking ... 详细信息
来源: 评论
A polynomial size model with implicit SWAP gate counting for exact qubit reordering
arXiv
收藏 引用
arXiv 2020年
作者: Mulderij, Jesse Aardal, Karen I. Chiscop, Irina Phillipson, Frank Faculty of Electrical Engineering Mathematics & Computer Science Delft University of Technology Delft Netherlands Cyber Security & Robustness Department TNO Hague Netherlands
Due to the physics behind quantum computing, quantum circuit designers must adhere to the constraints posed by the limited interaction distance of qubits. Existing circuits need therefore to be modified via the insert... 详细信息
来源: 评论
A novel approach to reducing information leakage for quantum key distribution
arXiv
收藏 引用
arXiv 2021年
作者: Mao, Hao-Kun Zhao, Qiang Qiao, Yu-Cheng Yan, Bing-Ze Xu, Bing-Jie Abd El-Latif, Ahmed A. Li, Qiong Department of Computer Science and Technology Harbin Institute of Technology Harbin150080 China College of Software Engineering ZhengZhou University of Light Industry ZhengZhou450053 China Guangxi Key Lab Cryptography & Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom Egypt
Quantum key distribution (QKD) is an important branch of quantum information science as it holds promise for unconditionally secure communication. For QKD research, a central issue is to improve the final secure key r... 详细信息
来源: 评论