咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是191-200 订阅
排序:
Systematic Luby Transform codes as incremental redundancy scheme
Systematic Luby Transform codes as incremental redundancy sc...
收藏 引用
AFRICON Conference
作者: T. L. Grobler E. R. Ackermann J. C. Olivier A. J. van Zyl Department of Electrical Electronic and Computer Engineering University of Pretoria Pretoria South Africa Defence Peace Safety and Security (DPSS) Council for Scientific and Industrial Research (CSIR) Pretoria South Africa Department of Mathematics and Applied Mathematics University of Pretoria Pretoria South Africa
Systematic Luby Transform (fountain) codes are investigated as a possible incremental redundancy scheme for EDGE. The convolutional incremental redundancy scheme currently used by EDGE is replaced by the fountain appr... 详细信息
来源: 评论
On the Privacy of Mental Health Apps: An Empirical Investigation and its Implications for Apps Development
arXiv
收藏 引用
arXiv 2022年
作者: Iwaya, Leonardo Horn Ali Babar, M. Rashid, Awais Wijayarathna, Chamila Centre for Research on Engineering Software Technologies The University of Adelaide AdelaideSA5005 Australia Australia Department of Mathematics and Computer Science Karlstad University Karlstad Sweden Bristol Cyber Security Group Department of Computer Science University of Bristol United Kingdom
An increasing number of mental health services are offered through mobile systems, a paradigm called mHealth. Although there is an unprecedented growth in the adoption of mHealth systems, partly due to the COVID-19 pa... 详细信息
来源: 评论
Stochastic Non-convex Ordinal Embedding with Stabilized Barzilai-Borwein Step Size
arXiv
收藏 引用
arXiv 2017年
作者: Ma, Ke Zeng, Jinshan Xiong, Jiechao Xu, Qianqian Cao, Xiaochun Liu, Wei Yao, Yuan State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences School of Computer Information Engineering Jiangxi Normal University Department of Mathematics Hong Kong University of Science and Technology Tencent Ai Lab
Learning representation from relative similarity comparisons, often called ordinal embedding, gains rising attention in recent years. Most of the existing methods are batch methods designed mainly based on the convex ... 详细信息
来源: 评论
Belief propagation for nonlinear block codes
Belief propagation for nonlinear block codes
收藏 引用
AFRICON Conference
作者: E. R. Ackermann T. L. Grobler A. J. van Zyl J. C. Olivier Department of Electrical Electronic and Computer Engineering University of Pretoria Pretoria South Africa Defence Peace Safety and Security (DPSS) Council for Scientific and Industrial Research (CSIR) Pretoria South Africa Department of Mathematics and Applied Mathematics University of Pretoria Pretoria South Africa
Special cases of the belief propagation algorithm are commonly used to decode various linear error correcting codes. We show that the belief propagation algorithm can also be applied to the decoding problem for nonlin... 详细信息
来源: 评论
On the design of a secure user authentication and key agreement scheme for wireless sensor networks
On the design of a secure user authentication and key agreem...
收藏 引用
作者: Kumari, Saru Das, Ashok Kumar Wazid, Mohammad Li, Xiong Wu, Fan Choo, Kim-Kwang Raymond Khan, Muhammad Khurram Department of Mathematics Chaudhary Charan Singh University MeerutUttar Pradesh250 005 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411 201 China Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer Science and Engineering Xiamen Institute of Technology Xiamen361021 China Department of Information Systems and Cyber Security The University of Texas at San Antonio San AntonioTX78249 United States School of Computer Science China University of Geosciences Wuhan China School of Information Technology & Mathematical Sciences University of South Australia AdelaideSA Australia Center of Excellence in Information Assurance King Saud University Riyadh Saudi Arabia
A wireless sensor network (WSN) typically consists of a large number of resource-constrained sensor nodes and several control or gateway nodes. Ensuring the security of the asymmetric nature of WSN is challenging, and... 详细信息
来源: 评论
Divertible Searchable Symmetric Encryption for Secure Cloud Storage
Divertible Searchable Symmetric Encryption for Secure Cloud ...
收藏 引用
GLOBECOM 2022 - 2022 IEEE Global Communications Conference
作者: Xi Zhang Cheng Huang Ye Su Jing Qin Xuemin Shen School of Mathematics Shandong University Jinan China Department of Electrical and Computer Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Chinese Academy of Sciences Beijing China
Searchable Symmetric Encryption (SSE) is a promising method for users to store data in remote clouds securely and search them using keywords over an encrypted index. In this paper, we explore a new function named “ke... 详细信息
来源: 评论
Local voting: Optimal distributed node scheduling algorithm for multihop wireless networks
arXiv
收藏 引用
arXiv 2017年
作者: Vergados, Dimitrios J. Amelina, Natalia Jiang, Yuming Kralevska, Katina Granichin, Oleg School of Electrical and Computer Engineering National Technical University of Athens Faculty of Mathematics and Mechanics Saint-Petersburg State University Department of Information Security and Communication Technology Norwegian University of Science and Technology
An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the s... 详细信息
来源: 评论
Recognition of altered gene-gene interaction using BiLSTM in different stages of lung adenocarcinoma  2
Recognition of altered gene-gene interaction using BiLSTM in...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Mallick, Partho Sinha, Mourani Poray, Jayanta Banerjee, Aiswaryya Sarkar, Souvik Ghosh, Anupam Department of Computer Application Techno India University EM4 Sector-V Saltlake West Bengal Kolkata700091 India Department of Mathematics Techno India University EM4 Sector-V Saltlake West Bengal Kolkata700091 India Department of Computer Science & Engineering Sister Nivedita University DG Block Action Area I 1/2 Newtown Kolkata700156 India Cyber Security Solution Architect Vokshith Enclave Road No. 3 Gajularamaram Telangana Hyderabad500055 India Department of ComputerScience&Engineering NetajiSubhasEngineering College Techno CityPanchpota Garia Kolkata700152 India
Cancer which is caused by abnormal growth or tumour snatches away millions of lives each year. Depending on the organ affected, we find various cancer types like blood, skin, lung, kidney, breast, prostrate, liver etc... 详细信息
来源: 评论
Computational Science and Its Applications – ICCSA 2012  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Beniamino Murgante Osvaldo Gervasi Sanjay Misra Nadia Nedjah Ana Maria A. C. Rocha David Taniar Bernady O. Apduhan
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational Science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. ... 详细信息
来源: 评论
Computational Science and Its Applications – ICCSA 2012  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Beniamino Murgante Osvaldo Gervasi Sanjay Misra Nadia Nedjah Ana Maria A. C. Rocha David Taniar Bernady O. Apduhan
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational Science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. ... 详细信息
来源: 评论