咨询与建议

限定检索结果

文献类型

  • 173 篇 期刊文献
  • 170 篇 会议
  • 7 册 图书

馆藏范围

  • 350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 183 篇 计算机科学与技术...
    • 144 篇 软件工程
    • 58 篇 信息与通信工程
    • 37 篇 电气工程
    • 30 篇 控制科学与工程
    • 24 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 11 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 122 篇 理学
    • 76 篇 数学
    • 28 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 13 篇 医学
    • 13 篇 基础医学(可授医学...
    • 11 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 9 篇 deep learning
  • 9 篇 security
  • 8 篇 data privacy
  • 8 篇 artificial intel...
  • 7 篇 blockchain
  • 7 篇 protocols
  • 7 篇 accuracy
  • 7 篇 privacy
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 college of cyber...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 12 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 6 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 kumari saru

语言

  • 322 篇 英文
  • 27 篇 其他
  • 3 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
350 条 记 录,以下是231-240 订阅
排序:
Deep Variational Network Toward Blind Image Restoration
arXiv
收藏 引用
arXiv 2020年
作者: Yue, Zongsheng Yong, Hongwei Zhao, Qian Zhang, Lei Meng, Deyu Wong, Kwan-Yee K. The School of Mathematics and Statistics Xi’an Jiaotong University Xi’an China The Department of Computer Science The University of Hong Kong Hong Kong The Department of Computing The Hong Kong Polytechnic University Hong Kong The School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China The Macau Institute of Systems Engineering Macau University of Science and Technology Taipa China
Blind image restoration (IR) is a common yet challenging problem in computer vision. Classical model-based methods and recent deep learning (DL)-based methods represent two different methodologies for this problem, ea... 详细信息
来源: 评论
Study of CdZnTeSe Gamma-Ray Detector under Various Bias Voltages
收藏 引用
Materials Sciences and Applications 2020年 第8期11卷 553-559页
作者: Mebougna L. Drabo Stephen U. Egarievwe Utpal N. Roy Benicia A. Harrison Carmella A. Goree Emmanuel K. Savage Ralph B. James Department of Mechanical & Civil Engineering and Construction Management Alabama A&M University Huntsville AL USA Nuclear Engineering and Radiological Science Center Alabama A&M University Huntsville AL USA Department of Electrical Engineering and Computer Science Alabama A&M University Huntsville AL USA Department of Nonproliferation and National Security Brookhaven National Laboratory Upton NY USA Science and Technology Directorate Savannah River National Laboratory Aiken SC USA Biological and Environmental Sciences Department Alabama A&M University Huntsville AL USA Department of Physics Chemistry and Mathematics Alabama A&M University Huntsville AL USA
Cadmium zinc telluride selenide (CdZnTeSe) is a new semiconductor material for gamma-ray detection and spectroscopy applications at room temperature. It has very high crystal quality compared to similar materials such... 详细信息
来源: 评论
Inconsistencies among spectral robustness metrics  1
收藏 引用
14th EAI International Conference on Heterogeneous Networking for Quality, Reliability, security and Robustness, Qshine 2018
作者: Wang, Xiangrong Feng, Ling Kooij, Robert E. Marzo, Jose L. Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft Netherlands Computing Science Department Institute of High Performance Computing A*STAR Singapore Singapore iTrust Centre for Research in Cyber Security Singapore University of Technology and Design Singapore Singapore Institute of Informatics and Applications University of Girona Girona Spain
Network robustness plays a critical role in the proper functioning of modern society. It is common practice to use spectral metrics, to quantify the robustness of networks. In this paper we compare eight different spe... 详细信息
来源: 评论
Erratum to:Recent Advances of Chimp Optimization Algorithm:Variants and Applications
收藏 引用
Journal of Bionic engineering 2024年 第3期21卷 1618-1618页
作者: Mohammad Sh.Daoud Mohammad Shehab Laith Abualigah Mohammad Alshinwan Mohamed Abd Elaziz Mohd Khaled Yousef Shambour Diego Oliva Mohammad A.Alia Raed Abu Zitar College of Engineering Al Ain University112612 Abu DhabiUnited Arab Emirates College of Computer Sciences and Informatics Amman Arab UniversityAmman 11953Jordan Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl Al-Bayt UniversityMafraq 25113Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman 19328Jordan MEU Research Unit Middle East UniversityAmman 11831Jordan Applied Science Research Center Applied Science Private UniversityAmman 11931Jordan School of Computer Sciences Universiti Sains Malaysia11800 Pulau PinangMalaysia Faculty of Information Technology Applied Science Private UniversityAmman 11931Jordan Department of Mathematics Faculty of ScienceZagazig UniversityZagazig 7120001Egypt The Custodian of the Two Holy Mosques Institute for Hajj and Umrah Research Umm Al-Qura UniversityMakkah 24382Saudi Arabia Depto.de Innovacio′n Basada en la Informacio′n y el Conocimiento Universidad de GuadalajaraCUCEI45129 GuadalajaraMexico Cyber Security Department Faculty of Science and Information TechnologyAl Zaytoonah University of JordanAmman 11733Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi38044 Abu DhabiUnited Arab Emirates School of Engineering and Technology Sunway University Malaysia27500 Petaling JayaMalaysia
Erratum to:J Bionic Eng https://***/10.1007/*** this article the statement in the Funding information section was incorrectly given as‘22UQU4361183DSR03’and should have read‘23UQU4361183DSR03’.
来源: 评论
A review of uncertainty quantification in deep learning: Techniques, applications and challenges
arXiv
收藏 引用
arXiv 2020年
作者: Abdar, Moloud Pourpanah, Farhad Hussain, Sadiq Rezazadegan, Dana Liu, Li Ghavamzadeh, Mohammad Fieguth, Paul Cao, Xiaochun Khosravi, Abbas Rajendra Acharya, U. Makarenkov, Vladimir Nahavandi, Saeid Deakin University Australia College of Mathematics and Statistics Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Shenzhen518060 China Dibrugarh University Dibrugarh India Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland Google research United States Department of Systems Design Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Electronics and Computer Engineering Ngee Ann Polytechnic Clementi Singapore Department of Computer Science University of Quebec in Montreal MontrealQC Canada
—Uncertainty quantification (UQ) plays a pivotal role in the reduction of uncertainties during both optimization and decision making, applied to solve a variety of real-world applications in science and engineering. ... 详细信息
来源: 评论
A customized educational booster for online students in cybersecurity education  11
A customized educational booster for online students in cybe...
收藏 引用
11th International Conference on computer Supported Education, CSEDU 2019
作者: Rahouti, Mohamed Xiong, Kaiqi Department of Electrical Engineering University of South Florida TampaFL33620 United States Cyber Florida University of South Florida TampaFL33620 United States Department of Mathematics and Statistics University of South Florida TampaFL33620 United States Intelligent Computer Networking and Security Lab University of South Florida TampaFL33620 United States
Real-world lab experiments have been an integral part of computer science and engineering curriculums. However, human and computing resources as well as financial support to courses may be limited at many universities... 详细信息
来源: 评论
Cryptanalysis and improvement of a semi-quantum private comparison protocol based on Bell states
arXiv
收藏 引用
arXiv 2020年
作者: Xie, Li Li, Qin Yu, Fang Lou, Xiaoping Zhang, Cai School of Cyberspace Security Xiangtan University Xiangtan411105 China Faculty of Informatics Masaryk University Brno Czech Republic Department of Computer Science Jinan University Guangzhou510632 China College of Information Science and Engineering Hunan Normal University Changsha410081 China College of Mathematics and Informatics South China Agricultural University Guangzhou510642 China
Semi-quantum private comparison (SQPC) allows two participants with limited quantum ability to securely compare the equality of their secrets with the help of a semi-dishonest third party (TP). Recently, Jiang propose... 详细信息
来源: 评论
Privacy-preserving medical treatment system through nondeterministic finite automata
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Yang Deng, Robert H. Liu, Ximeng Wu, Yongdong Weng, Jian Zheng, Xianghan Rong, Chunming School of Information Systems Singapore Management University Singapore College of Mathematics and Computer Science Fuzhou University Fujian China State Key Laboratory of Integrated Services Networks Xidian University Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China School of Information Systems Singapore Management University Singapore Singapore Department of Computer Science Jinan University Guangdong China College of Mathematics and Computer Science Fuzhou University Fujian China Department of Electronic Engineering and Computer Science University of Stavanger Norway MingByte Technology Qingdao China
In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for the remote medical environment. P-Med makes use of the... 详细信息
来源: 评论
Blockchain-based privacy preservation for 5G-enabled drone communications
arXiv
收藏 引用
arXiv 2020年
作者: Wu, Yulei Dai, Hong-Ning Wang, Hao Choo, Kim-Kwang Raymond College of Engineering Mathematics and Physical Sciences University of Exeter ExeterEX4 4QF United Kingdom Faculty of Information Technology Macau University of Science and Technology United Kingdom Department of Computer Science Norwegian University of Science and Technology Gjøvik Norway Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX78249-0631 United States
5G-enabled drones have potential applications in a variety of both military and civilian settings (e.g., monitoring and tracking of individuals in demonstrations and/or enforcing of social / physical distancing during... 详细信息
来源: 评论
Exploratory Adversarial Attacks on Graph Neural Networks
Exploratory Adversarial Attacks on Graph Neural Networks
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Xixun Lin Chuan Zhou Hong Yang Jia Wu Haibo Wang Yanan Cao Bin Wang Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China Centre for Artificial Intelligence University of Technology Sydney Sydney Australia Department of Computing Macquarie University Sydney Australia Department of Computer Science and Technology Tsinghua University Beijing China Xiaomi AI Lab Beijing China
Graph neural networks (GNNs) have been successfully used to analyze non-Euclidean network data. Recently, there emerge a number of works to investigate the robustness of GNNs by adding adversarial noises into the grap... 详细信息
来源: 评论