咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是201-210 订阅
排序:
Computational Science and Its Applications – ICCSA 2012  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Beniamino Murgante Osvaldo Gervasi Sanjay Misra Nadia Nedjah Ana Maria A. C. Rocha David Taniar Bernady O. Apduhan
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational Science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. ... 详细信息
来源: 评论
Computational Science and Its Applications – ICCSA 2012  1
收藏 引用
丛书名: Lecture Notes in computer Science
1000年
作者: Beniamino Murgante Osvaldo Gervasi Sanjay Misra Nadia Nedjah Ana Maria A. C. Rocha David Taniar Bernady O. Apduhan
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational Science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012.;... 详细信息
来源: 评论
Reduction of Server Load by Means of CMS Drupal
Reduction of Server Load by Means of CMS Drupal
收藏 引用
International Conference on Advanced computer Information Technologies (ACIT)
作者: Viktor Satsyk Roman Grudetsky Olena Kuzmych Nataliia Bahniuk Liudmyla Hlynchuk Yulia Melnychuk Department of Automation and Computer-Integrated Technologies Lutsk National Technical University Lutsk Ukraine Department of Computer Engineering and Cyber Security Lutsk National Technical University Lutsk Ukraine Department of Applied Mathematics Eastern European National University Lutsk Ukraine Department of Computer Science Lutsk National Technical University Lutsk Ukraine
In this paper description and analysis of simple methods of reducing (neutralization) the server load, as well as methods of optimization of Drupal based on embedded and additionally installed modules is done. An opti... 详细信息
来源: 评论
Authenticated Asymmetric Group Key Agreement Protocol and Its Application
Authenticated Asymmetric Group Key Agreement Protocol and It...
收藏 引用
IEEE International Conference on Communications
作者: Lei Zhang Qianhong Wu Bo Qin Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education Wuhan University of China China School of Science Department of Maths Xi''an University of Technology China
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is accessible to any entities while each user holds her respective secret decryption key. T... 详细信息
来源: 评论
Strong security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
International Conference on Applications and Techniques in Cyber security and Intelligence ATCI 2018  1
收藏 引用
丛书名: Advances in Intelligent Systems and Computing
1000年
作者: Jemal Abawajy Kim-Kwang Raymond Choo Rafiqul Islam Zheng Xu Mohammed Atiquzzaman
The book highlights innovative ideas, cutting-edge findings, and novel techniques, methods and applications touching on all aspects of technology and intelligence in smart city management and services. Above all, it e... 详细信息
来源: 评论
IronMask: Modular architecture for protecting deep face template
arXiv
收藏 引用
arXiv 2021年
作者: Kim, Sunpill Jeong, Yunseong Kim, Jinsu Kim, Jungkon Lee, Hyung Tae Seo, Jae Hong Department of Mathematics Research Institute for Natural Sciences Hanyang University Korea Republic of Division of Computer Science and Engineering College of Engineering Jeonbuk National University Korea Republic of Security Team Samsung Research Samsung Electronics Korea Republic of
Convolutional neural networks have made remarkable progress in the face recognition field. The more the technology of face recognition advances, the greater discriminative features into a face template. However, this ... 详细信息
来源: 评论
Autonomous Quadrotor Flight Stabilisation Based on a Complementary Filter and a PID Controller
Autonomous Quadrotor Flight Stabilisation Based on a Complem...
收藏 引用
IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT)
作者: Maryna Derkach Inna Skarga-Bandurova Danylo Matiuk Natalia Zagorodna Department of Computer Science and Engineering Volodymyr Dahl East Ukrainian National University Kyiv Ukraine Department of Cyber Security Ternopil Ivan Puluj National Technical University Ternopil Ukraine School of Engineering Computing and Mathematics Oxford Brookes University Oxford UK
One of the priority tasks in constructing a quadrotor is fault-tolerant control and stabilizing its flight. This paper proposes a quadrotor stabilization system based on onboard sensors, an accelerometer, a gyroscope,... 详细信息
来源: 评论
Vision Inspection of Bottle Caps in Drink Factories Using Convolutional Neural Networks
Vision Inspection of Bottle Caps in Drink Factories Using Co...
收藏 引用
IEEE International Conference on Intelligent computer Communication and Processing (ICCP)
作者: Mahdi Bahaghighat Fereshteh Abedini Misak S’hoyan Arthur-Jozsef Molnar Department of Electrical Engineering Raja University Qazvin Iran Department of Electrical Engineering Amirkabir University of Technology Tehran Iran Department of Information Security National Polytechnic University of Armenia Yerevan Iran Faculty of Mathematics and Computer Science Babeş-Bolyai University Cluj-Napoca Romania
Nowadays, the growth and development of artificial intelligence is more evident than any other time. Consequently, the development of machine vision systems in the industry has been studied extensively. The provision ...
来源: 评论
A Secure Communication Approach for Mobile Intelligent Terminal
A Secure Communication Approach for Mobile Intelligent Termi...
收藏 引用
International Conference on computer Sciences and Applications (CSA)
作者: Fan Zhang Cong Zhang Mingdi Xu Minghui Yang School of Mathematics & Computer Science Wuhan Polytechnic University Wuhan China System Software Department Wuhan Digital Engineering Institute Wuhan China Third Research Institute of Ministry of Public Security Shanghai China
Currently, various mobile intelligent terminals have penetrated into our daily life. But at the same time, security and privacy issues of mobile intelligent terminals become a serious problem. In this paper, we presen... 详细信息
来源: 评论