咨询与建议

限定检索结果

文献类型

  • 175 篇 期刊文献
  • 166 篇 会议
  • 7 册 图书

馆藏范围

  • 348 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 230 篇 工学
    • 180 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 55 篇 信息与通信工程
    • 35 篇 电气工程
    • 30 篇 控制科学与工程
    • 23 篇 生物工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电子科学与技术(可...
    • 13 篇 安全科学与工程
    • 13 篇 网络空间安全
    • 10 篇 机械工程
    • 10 篇 建筑学
    • 9 篇 交通运输工程
    • 8 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 8 篇 土木工程
    • 7 篇 材料科学与工程(可...
  • 117 篇 理学
    • 73 篇 数学
    • 27 篇 生物学
    • 26 篇 物理学
    • 16 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 50 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 23 篇 法学
    • 14 篇 法学
    • 11 篇 社会学
  • 14 篇 医学
    • 13 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 7 篇 公共卫生与预防医...
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 2 篇 艺术学

主题

  • 13 篇 authentication
  • 10 篇 internet of thin...
  • 10 篇 cryptography
  • 8 篇 deep learning
  • 8 篇 artificial intel...
  • 7 篇 data privacy
  • 7 篇 security
  • 7 篇 blockchain
  • 6 篇 public key crypt...
  • 6 篇 data mining
  • 6 篇 accuracy
  • 6 篇 robustness
  • 5 篇 covid-19
  • 5 篇 big data
  • 5 篇 computers
  • 5 篇 feature extracti...
  • 5 篇 machine learning
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 information syst...

机构

  • 7 篇 state key labora...
  • 6 篇 department of in...
  • 6 篇 department of co...
  • 6 篇 school of mathem...
  • 6 篇 department of in...
  • 6 篇 college of compu...
  • 6 篇 department of ma...
  • 5 篇 school of comput...
  • 5 篇 vishwakarma inst...
  • 5 篇 fujian universit...
  • 5 篇 trainee security...
  • 5 篇 school of cyber ...
  • 5 篇 vaish college of...
  • 5 篇 manipal universi...
  • 4 篇 jinan university...
  • 4 篇 school of comput...
  • 4 篇 department of pr...
  • 4 篇 trainee security...
  • 4 篇 school of busine...
  • 4 篇 computer and inf...

作者

  • 13 篇 conti mauro
  • 8 篇 huang yanze
  • 8 篇 lin limei
  • 7 篇 das ashok kumar
  • 6 篇 ankur gupta
  • 6 篇 dharmesh dhabliy...
  • 6 篇 dhoma harshavard...
  • 6 篇 hsieh sun-yuan
  • 6 篇 xu li
  • 6 篇 mallika dhingra
  • 5 篇 zhang lei
  • 5 篇 dhingra mallika
  • 5 篇 pravin ramdas ks...
  • 5 篇 reddy dhoma hars...
  • 5 篇 qianhong wu
  • 5 篇 fu yu
  • 5 篇 dhabliya dharmes...
  • 5 篇 choo kim-kwang r...
  • 5 篇 wang kun
  • 5 篇 susilo willy

语言

  • 328 篇 英文
  • 19 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Computer Engineering and Security Mathematics"
348 条 记 录,以下是61-70 订阅
排序:
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers  4
Are you (Google) home? Detecting users’ presence through tr...
收藏 引用
4th Italian Conference on Cyber security, ITASEC 2020
作者: Caputo, D. Verderame, L. Merlo, A. Ranieri, A. Caviglione, L. Computer Security Lab Department of Informatics Bioengineering Robotics and Systems Engineering University of Genoa Italy Institute for Applied Mathematics and Information Technologies National Research Council of Italy Italy
Smart speakers and voice-based virtual assistants are core building blocks of modern smart homes. For instance, they are used to retrieve information, interact with other devices, and command a variety of Internet of ... 详细信息
来源: 评论
Privacy-Aware Artificial Intelligence with Homomorphic Encryption using Machine Learning
Privacy-Aware Artificial Intelligence with Homomorphic Encry...
收藏 引用
2023 International Conference on Sustainable Computing and Smart Systems, ICSCSS 2023
作者: Srinivasa Rao, B. Chattopadhyay, Saumitra Singh, Prashant Hazela, Bramah Sabarinathan, G. Yamini, Kalva Department of Computer Science and Engineering Bachupally Telangana Hyderabad India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Amity University Amity School of Engineering and Technology Lucknow Department of Computer Science and Engineering Uttar Pradesh India Psna College of Engineering and Technology Department of Mathematics Tamilnadu Dindigul India Sri Ramachandra Institute of Higher Education and Research Cyber Security in Computer Science and Engineering Tamilnadu Chennai India
Along with the expansion of machine learning (ML) applications, the amount of data required to create predictions increases. Big-data ML has always been limited by off-chip memory capacity and computational speed. Con... 详细信息
来源: 评论
Distributed Secure Storage Scheme Based on Sharding Blockchain
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4485-4502页
作者: Jin Wang Chenchen Han Xiaofeng Yu Yongjun Ren R.Simon Sherratt School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Business Nanjing UniversityNanjing210093China School of Computer School of SoftwareSchool of Cyberspace SecurityEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science&TechnologyNanjing210044China Department of Biomedical Engineering University of ReadingRG66AYUK
Distributed storage can store data in multiple devices or servers to improve data ***,in today’s explosive growth of network data,traditional distributed storage scheme is faced with some severe challenges such as in... 详细信息
来源: 评论
Multicast adaptive logic for Dynamic Adaptive Streaming over HTTP network
Multicast adaptive logic for Dynamic Adaptive Streaming over...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2015
作者: Dubin, Ran Dvir, Amit Hadar, Ofer Harel, Nissim Barkan, Refael Communication Systems Engineering Ben-Gurion University of the Negev Israel Cyber Security Center Department of Computer Science and Mathematics Ariel University Israel Computer Science Department Holon Institute of Technology Israel Computer Science School College of Management Academic Studies Israel
Video streaming constitutes the vast majority of Internet traffic and the DASH protocol has become the de-facto standard in the industry of multimedia delivery. The multicast method for information distribution has th... 详细信息
来源: 评论
LDoS Attacks Detection for ICPS NB-IoTs Environment via SE-Based CNN
收藏 引用
IEEE Systems Journal 2023年 第4期17卷 5280-5291页
作者: Cho, Hsin-Hung Tsai, Min-Yan Zeng, Jiang-Yi Yu, Chia-Mu Chao, Han-Chieh You, Ilsun National Ilan University Department of Computer Science and Information Engineering Yilan26047 Taiwan National Yang Ming Chiao Tung University Department of Information Management and Finance Hsinchu30010 Taiwan National Dong Hwa University Department of Electrical Engineering Hualien97401 Taiwan UCSI University Institute of Computer Science and Innovation Kuala Lumpur56000 Malaysia Kookmin University Department of Information Security Cryptology and Mathematics Seoul02707 Korea Republic of
After Industry 4.0 was proposed, cyber-physical systems (CPS) were also introduced into the industrial environment called the industrial CPS. Internet-of-Things (IoT) services in the industry make intelligent decision... 详细信息
来源: 评论
Permutation polynomials x~(2k+1+3)+ax2k+2+bx over F_(22k) and their differential uniformity
收藏 引用
Science China(Information Sciences) 2020年 第10期63卷 255-257页
作者: Jie PENG Lijing ZHENG Chunsheng WU Haibin KAN Mathematics and Science College Shanghai Normal University School of Mathematics and Physics University of South China Department of Mathematics Lianyungang Normal University Shanghai Key Laboratory of Intelligent Information Processing School of Computer ScienceFudan University Fudan-Zhongan Joint Laboratory of Blockchain and Information Security Shanghai Blockchain Engineering Research Center Shanghai Institute for Advanced Communication and Data Science Shanghai Institute of Intelligent Electronics & Systems
Dear editor,A polynomial f(x)∈Fq[x] is called a permutation polynomial (PP) over the finite field Fq if the associated mapping f:c (?) f(c) from Fq to itself is bijective.A PP f is called a complete permutati... 详细信息
来源: 评论
Proceedings of Fifth International Conference on Computing, Communications, and Cyber-security  1
收藏 引用
丛书名: Lecture Notes in Networks and Systems
1000年
作者: Sudeep Tanwar Pradeep Kumar Singh Maria Ganzha Gregory Epiphaniou
来源: 评论
Practical certificateless aggregate signatures from bilinear maps
Practical certificateless aggregate signatures from bilinear...
收藏 引用
作者: Gong, Zheng Long, Yu Hong, Xuan Chen, Kefei Distributed and Embedded Security Group Faculty of Electrical Engineering Mathematics and Computer Science University of Twente Enschede 7500 Netherlands Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China National Laboratory of Modern Communications Chengdu 610041 China
Aggregate signature is a digital signature with a striking property that anyone can aggregate n individual signatures on n different messages which are signed by n distinct signers, into a single compact signature to ... 详细信息
来源: 评论
Certificateless partially blind signatures
Certificateless partially blind signatures
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Zhang, Lei Zhang, Futai School of Computer Science and Technology Nanjing Normal University China Department of Computer Engineering and Mathematics Universitat Rovira I Virgili E-43007 Tarragona Catalonia Spain Jiangsu Engineering Research Center on Information Security and Privacy Protection Technology Nanjing China
Partially blind signature is a variant of blind signature. It allows a signer to explicitly include common information in a blind signature under some agreement with a receiver. It provides anonymity of users in appli... 详细信息
来源: 评论
On an attack on RSA with small CRT-exponents
收藏 引用
Science China(Information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1,2 , WANG XiaoYun 3 & XU GuangWu 3,4 1 Key Laboratory of Cryptologic Technology and Information security, Ministry of Education, Shandong University, Jinan 250100, China 2 School of mathematics, Shandong University, Jinan 250100, China 3 Institute for Advanced Study, Tsinghua University, Beijing 100084, China 4 department of Electrical engineering and computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, USA Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan China School of Mathematics Shandong University Jinan China Institute for Advanced Study Tsinghua University Beijing China Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 评论