咨询与建议

限定检索结果

文献类型

  • 176 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 349 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 184 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 电气工程
    • 32 篇 控制科学与工程
    • 23 篇 生物工程
    • 15 篇 电子科学与技术(可...
    • 14 篇 生物医学工程(可授...
    • 14 篇 安全科学与工程
    • 14 篇 网络空间安全
    • 12 篇 机械工程
    • 10 篇 建筑学
    • 10 篇 交通运输工程
    • 9 篇 土木工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 6 篇 仪器科学与技术
  • 119 篇 理学
    • 74 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 51 篇 管理学
    • 34 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 24 篇 法学
    • 14 篇 法学
    • 12 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 5 篇 农学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 329 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
349 条 记 录,以下是41-50 订阅
排序:
Data Analytic for Healthcare Cyber Physical System
收藏 引用
IEEE Transactions on Network Science and engineering 2023年 第5期10卷 2490-2502页
作者: Gan, Wensheng Hu, Kaixia Huang, Gengsen Chien, Wei-Che Chao, Han-Chieh Meng, Weizhi Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan National Dong Hwa University Department of Electrical Engineering Hualien97401 Taiwan UCSI University Institute of Computer Science and Innovation Kuala Lumpur Malaysia Department of Applied Mathematics and Computer Science Cyber Security Section Lyngby2800 Denmark
Nowadays, a large number of AI-powered healthcare cyber-physical systems (CPSs) have been used in healthcare services. In order to provide better care, AI-powered healthcare CPSs analyze the data they collect using a ... 详细信息
来源: 评论
A Review of Lightweight security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph Networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Intermittent Fault Diagnosis of Split-Star Networks and its Applications
收藏 引用
IEEE Transactions on Parallel and Distributed Systems 2023年 第4期34卷 1253-1264页
作者: Song, Jiankang Lin, Limei Huang, Yanze Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou Fujian350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou Fujian350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid increase of the number of processors in multiprocessor systems and the fast expansion of interconnection networks, the reliability of interconnection network is facing severe challenges, where the fast ... 详细信息
来源: 评论
EBAKE-SE: A novel ECC-based authenticated key exchange between industrial IoT devices using secure element
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 358-366页
作者: Chintan Patel Ali Kashif Bashir Ahmad Ali AlZubi Rutvij Jhaveri School of Artificial Intelligence Information Technology and Cyber SecurityRashtriya Raksha UniversityGujaratIndia Department of Computing and Mathematics Manchester Metropolitan UniversityUnited Kingdom Woxsen School of Business Woxsen UniversityIndia Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Computer Science Department Community CollegeKing Saud UniversityP.O.Box 28095Riyadh11437Saudi Arabia Department of Computer Science and Engineering School of TechnologyPandit Deendayal Energy UniversityGujaratIndia
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product *** suffers from various challenges,and security is one of the key challenge among those *** and access con... 详细信息
来源: 评论
Distributed privacy-preserving secure aggregation in vehicular communication
Distributed privacy-preserving secure aggregation in vehicul...
收藏 引用
3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011
作者: Qin, Bo Wu, Qianhong Domingo-Ferrer, Josep Susilo, Willy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Department of Mathematics School of Science Xi'an University of Technology China School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Wollongong Australia
Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs sho... 详细信息
来源: 评论
A reliable color image encryption scheme based on a novel dual-wing hyperchaotic map
收藏 引用
Expert Systems with Applications 2025年 289卷
作者: Mohammed Jabbar Obaid Ammar Ali Neamah Ali A. Shukur Viet-Thanh Pham Giuseppe Grassi Department of Cyber Security College of Sciences Al-Mustaqbal University Babylon 51001 Iraq Faculty of Computer Science and Mathematics University of Kufa Najaf Iraq Faculty of Electronics Technology Industrial University of Ho Chi Minh City Ho Chi Minh City Vietnam Department of Engineering for Innovation University of Salento Lecce Italy
A symmetric image encryption algorithm based on a chaotic higher dimensional map is proposed to protect color images against unauthorized access. The algorithm employs a two-phase process: chaotic pixel shuffling for ...
来源: 评论
Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain
收藏 引用
computers, Materials & Continua 2020年 第12期65卷 2247-2262页
作者: Jieren Cheng Jun Li Naixue Xiong Meizhu Chen Hao Guo Xinzhi Yao School of Compute Science and Cyberspace Security Hainan UniversityHaikou570228China Hainan Blockchain Technology Engineering Research Center Hainan UniversityHaikou570228China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464USA
Nowadays,as lightweight mobile clients become more powerful and widely used,more and more information is stored on lightweight mobile clients,user sensitive data privacy protection has become an urgent concern and pro... 详细信息
来源: 评论
Effective Big Data Analysis Based on Sockets. Application to Biomedical Data Processing  11
Effective Big Data Analysis Based on Sockets. Application to...
收藏 引用
11th International Conference on Advanced computer Information Technologies, ACIT 2021
作者: Melnyk, Vasyl Kuzmych, Olena Bahniuk, Nataliia Cherniashchuk, Nataliia Hlynchuk, Liudmyla Mekush, Oksana Lutsk National Technical University Department of Computer Engineering and Cyber Security Lutsk Ukraine Eastern European National University Department of Applied Mathematics Lutsk Ukraine
This paper implements a cluster system based on personal computers with the involvement of traditional TCP and sockets based on the virtual interface architecture with a mechanism of data splitting and the possibility... 详细信息
来源: 评论
An efficient quantum blind digital signature scheme
收藏 引用
Science China(Information Sciences) 2017年 第8期60卷 226-239页
作者: Hong LAI Mingxing LUO Josef PIEPRZYK Zhiguo QU Shudong LI Mehmet A.ORGUN College of Computer and Information Science Southwest University Information Security and National Computing Grid Laboratory School of Information Science and TechnologySouthwest Jiaotong University School of Electrical Engineering and Computer Science Queensland University of Technology Institute of Computer Science Polish Academy of Sciences School of Computer and Software Nanjing University of Information Science and Technology College of Mathematics and Information Science Shandong Technology and Business University School of Computer Science National University of Defense Technology Department of Computing Macquarie University Faculty of Information Technology Macau University of Science and Technology
Recently, many quantum digital signature(QDS) schemes have been proposed to authenticate the integration of a message. However, these quantum signature schemes just consider the situation for bit messages,and the sign... 详细信息
来源: 评论