咨询与建议

限定检索结果

文献类型

  • 171 篇 期刊文献
  • 170 篇 会议
  • 7 册 图书

馆藏范围

  • 348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 231 篇 工学
    • 183 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 36 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 6 篇 仪器科学与技术
  • 120 篇 理学
    • 76 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 15 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 50 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 文学
  • 5 篇 农学
  • 4 篇 经济学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 9 篇 deep learning
  • 9 篇 security
  • 8 篇 data privacy
  • 8 篇 artificial intel...
  • 7 篇 blockchain
  • 7 篇 protocols
  • 7 篇 privacy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 college of cyber...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 5 篇 national cheng k...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...

作者

  • 12 篇 conti mauro
  • 9 篇 huang yanze
  • 9 篇 lin limei
  • 7 篇 hsieh sun-yuan
  • 7 篇 xu li
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 kumari saru

语言

  • 319 篇 英文
  • 28 篇 其他
  • 3 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
348 条 记 录,以下是211-220 订阅
排序:
Amateur Drones Detection: A machine learning approach utilizing the acoustic signals in the presence of strong interference
arXiv
收藏 引用
arXiv 2020年
作者: Uddin, Zahoor Altaf, Muhammad Bilal, Muhammad Nkenyereye, Lewis Bashir, Ali Kashif COMSATS University Islamabad Wah Campus Pakistan Div. of Computer and Electronics Systems Engineering Hankuk University of Foreign Studies Yongin-si17035 Korea Republic of Department of Computer and Information Security Sejong University Seoul Korea Republic of Department of Computing and Mathematics Manchester Metropolitan University United Kingdom
MSC Codes 68T45, 68T10, 62H30,Owing to small size, sensing capabilities and autonomous nature, the Unmanned Air Vehicles (UAVs) have enormous applications in various areas e.g., remote sensing, navigation, archaeology... 详细信息
来源: 评论
DynaComm: Accelerating distributed CNN training between edges and clouds through dynamic communication scheduling
arXiv
收藏 引用
arXiv 2021年
作者: Cai, Shangming Wang, Dongsheng Wang, Haixia Lyu, Yongqiang Xu, Guangquan Zheng, Xi Vasilakos, Athanasios V. Department of Computer Science and Technology Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518066 China Big Data School Qingdao Huanghai University Qingdao266427 China College of Intelligence and Computing Tianjin University Tianjin300350 China Department of Computing Macquarie University SydneyNSW2109 Australia College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China School of Electrical and Data Engineering University of Technology Sydney Australia Department of Computer Science Electrical and Space Engineering Lulea University of Technology Lulea97187 Sweden
To reduce uploading bandwidth and address privacy concerns, deep learning at the network edge has been an emerging topic. Typically, edge devices collaboratively train a shared model using real-time generated data thr... 详细信息
来源: 评论
The Battery Capacity of Energy-storing Quantum Systems
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Xue Yang, Yan-Han Alimuddin, Mir Salvia, Raffaele Fei, Shao-Ming Zhao, Li-Ming Nimmrichter, Stefan Luo, Ming-Xing The School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China School of Computer and Network Security Chengdu University of Technology Chengdu610059 China Department of Physics of Complex Systems S. N. Bose National Center for Basic Sciences Kolkata700106 India Scuola Normale Superiore PisaI-56127 Italy School of Mathematical Sciences Capital Normal University Beijing100048 China Max-Planck-Institute for Mathematics in the Sciences Leipzig04103 Germany Naturwissenschaftlich-Technische Fakultät Universität Siegen Siegen57068 Germany CAS Center for Excellence in Quantum Information and Quantum Physics Hefei230026 China Shenzhen Institute for Quantum Science and Engineering Southern University of Science and Technology Shenzhen518055 China
The quantum battery capacity is introduced in this letter as a figure of merit that expresses the potential of a quantum system to store and supply energy. It is defined as the difference between the highest and the l... 详细信息
来源: 评论
Accelerating NATO Transformation with SnTEE: Experiments with Network security Function Virtualization in Coalition Networks
Accelerating NATO Transformation with SnTEE: Experiments wit...
收藏 引用
International Conference on Military Communications and Information Systems (ICMCIS)
作者: Roberto Rigolin F. Lopes Johannes F. Loevenich Konrad Wrona Paulo H. L. Rettore Jerry Falkcrona Joseph Mathews Nils Nordbotten Bogdan Vasilache Thorsten Lampe Olwen L. Worthington Juha Röning Secure Communications & Information (SIX) Thales Deutschland Ditzingen Germany Department of Mathematics/Computer Science University of Osnabrück Osnabrück Germany NATO Cyber Security Centre The Hague Netherlands Military University of Technology Warsaw Poland Communication Systems (KOM) Fraunhofer FKIE Bonn Germany Cyber Defence and C2 Technology Swedish Defence Research Agency Linköping Sweden Information Technology Division U.S. Naval Research Laboratory Washington DC USA Thales Norway Oslo Norway WonderBit B.V. Almere The Netherlands Defence Science and Technology Laboratory (Dstl) UK Ministry of Defence London United Kingdom Information Technology and Electrical Engineering University of Oulu Oulu Finland
This paper introduces a virtual laboratory for experiments with cybersecurity functions in coalition networks. The motivation comes from the NATO Allied Command Transformation (ACT) initiative on Science and Technolog...
来源: 评论
反向连边在大型分层网络中的影响(英文)
收藏 引用
engineering 2024年 第5期 240-249页
作者: 曹浩森 胡斌斌 莫小雨 陈都鑫 高建喜 袁烨 陈关荣 Tamás Vicsek 管晓宏 张海涛 MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Mechanical and Aerospace Engineering Nanyang Technological University Jiangsu Key Laboratory of Networked Collective Intelligence School of Mathematics Southeast University Department of Computer Science Rensselaer Polytechnic Institute Department of Electronic Engineering City University of Hong Kong Department of Biological Physics E?tv?s University MOE Key Laboratory for Intelligent Networks and Network Security School of Automation Science and Engineering Xi'an Jiaotong University
Hierarchical networks are frequently encountered in animal groups, gene networks, and artificial engineering systems such as multiple robots, unmanned vehicle systems, smart grids, wind farm networks,and so forth. The...
来源: 评论
An Enhanced Feature Selection Approach based on Mutual Information for Breast Cancer Diagnosis  6
An Enhanced Feature Selection Approach based on Mutual Infor...
收藏 引用
6th International Conference on Image and Signal Processing and their Applications, ISPA 2019
作者: Zemmal, Nawel Azizi, Nabiha Ziani, Amel Benzebouchi, Nacer Eddine Aldwairi, Monther Badji Mokhtar University Labged Laboratory Annaba23000 Algeria Department of Mathematics and Computer Science Mohamed Cherif Messaadia University Souk-Ahras41000 Algeria Lri Laboratory: Information Research Laboratory Computer Science Department Annaba23000 Algeria Jordan University of Science and Technology Department of Network Engineering and Security Irbid22110 Jordan
Breast cancer is the most feared disease in the female population. Early detection plays an important role to improve prognosis. Mammography is the best examination for the detection of breast cancer. However, in some... 详细信息
来源: 评论
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
收藏 引用
Science China(Information Sciences) 2018年 第5期61卷 291-305页
作者: Huige WANG Kefei CHEN Baodong QIN Ziyuan HU Department of Network Engineering Anhui Science and Technology University Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Mathematics Hangzhou Normal University Westone Cryptologic Research Center National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications State Key Laboratory of Cryptology
Original public-key encryption is viewed as a tool to encrypt point-to-point *** data is aimed at a particular user,where a sender encrypts a message x under a specified public key P *** this case,only the owner of th... 详细信息
来源: 评论
VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT
arXiv
收藏 引用
arXiv 2020年
作者: Fu, Anmin Zhang, Xianglong Xiong, Naixue Gao, Yansong Wang, Huaqun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210094 China Northeastern State University Department of Mathematics and Computer Science TahlequahOK United States Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China
Due to the strong analytical ability of big data, deep learning has been widely applied to model the collected data in industrial IoT. However, for privacy issues, traditional data-gathering centralized learning is no... 详细信息
来源: 评论
Analysis of variance of graph-clique mining for scalable proof of work  14th
Analysis of variance of graph-clique mining for scalable pro...
收藏 引用
14th International Conference on Information security and Cryptology, Inscrypt 2018
作者: Anada, Hiroaki Matsushima, Tomohiro Su, Chunhua Meng, Weizhi Kawamoto, Junpei Bag, Samiran Sakurai, Kouichi Department of Information Security University of Nagasaki Nagasaki Japan Department of Informatics Graduate School and Faculty of Information Science and Electrical Engineering Kyushu University Fukuoka Japan Division of Computer Science University of Aizu Aizuwakamatsu Japan Department of Applied Mathematics and Computer Science Technical University of Denmark Kongens Lyngby Denmark School of Computing Science Newcastle University Newcastle upon Tyne United Kingdom
Recently, Bitcoin is becoming one of the most popular decentralized cryptographic currency technologies, and Bitcoin mining is a process of adding transaction records to Bitcoin’s public ledger of past transactions o... 详细信息
来源: 评论
VerifyTL: Secure and verifiable collaborative transfer learning
arXiv
收藏 引用
arXiv 2020年
作者: Ma, Zhuoran Ma, Jianfeng Miao, Yinbin Liu, Ximeng Zheng, Wei Choo, Kim-Kwang Raymond Deng, Robert H. School of Cyber Engineering Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Key Laboratory of Information Security of Network Systems College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249 United States School of Information Systems Singapore Management University Singapore188065 Singapore
Getting access to labelled datasets in certain sensitive application domains can be challenging. Hence, one often resorts to transfer learning to transfer knowledge learned from a source domain with sufficient labelle... 详细信息
来源: 评论