咨询与建议

限定检索结果

文献类型

  • 229 篇 会议
  • 221 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 313 篇 工学
    • 242 篇 计算机科学与技术...
    • 181 篇 软件工程
    • 77 篇 信息与通信工程
    • 56 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 36 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 26 篇 生物工程
    • 17 篇 安全科学与工程
    • 16 篇 机械工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 光学工程
    • 10 篇 动力工程及工程热...
    • 10 篇 化学工程与技术
    • 9 篇 仪器科学与技术
    • 9 篇 交通运输工程
  • 130 篇 理学
    • 82 篇 数学
    • 30 篇 统计学(可授理学、...
    • 28 篇 生物学
    • 22 篇 物理学
    • 17 篇 系统科学
    • 12 篇 化学
  • 75 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 20 篇 法学
    • 14 篇 社会学
    • 6 篇 法学
  • 17 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
    • 8 篇 公共卫生与预防医...
  • 5 篇 经济学
  • 4 篇 教育学
  • 3 篇 农学
  • 3 篇 军事学
  • 1 篇 文学

主题

  • 12 篇 authentication
  • 12 篇 cryptography
  • 11 篇 deep learning
  • 10 篇 computational mo...
  • 10 篇 information secu...
  • 10 篇 accuracy
  • 9 篇 feature extracti...
  • 9 篇 machine learning
  • 9 篇 cloud computing
  • 9 篇 training
  • 8 篇 security
  • 8 篇 privacy
  • 7 篇 public key crypt...
  • 6 篇 internet of thin...
  • 6 篇 intrusion detect...
  • 6 篇 object detection
  • 6 篇 data privacy
  • 6 篇 computer archite...
  • 6 篇 wireless communi...
  • 6 篇 predictive model...

机构

  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 key lab of infor...
  • 8 篇 department of co...
  • 7 篇 department of co...
  • 5 篇 shandong provinc...
  • 5 篇 computer departm...
  • 5 篇 research center ...
  • 5 篇 school of inform...
  • 5 篇 key laboratory o...
  • 5 篇 national cheng k...
  • 4 篇 college of compu...
  • 4 篇 department of co...
  • 4 篇 computer network...
  • 4 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 department of el...
  • 4 篇 fujian universit...
  • 4 篇 department of co...
  • 4 篇 national compute...

作者

  • 7 篇 xu li
  • 6 篇 liu lei
  • 6 篇 weng jian
  • 6 篇 choo kim-kwang r...
  • 6 篇 hsieh sun-yuan
  • 6 篇 huang yanze
  • 6 篇 lin limei
  • 6 篇 sun jin
  • 6 篇 liu ximeng
  • 5 篇 guo liangmin
  • 5 篇 akhtar zahid
  • 5 篇 luo yonglong
  • 5 篇 wang hui-ming
  • 4 篇 li xiong
  • 4 篇 mahmoud m. badr
  • 4 篇 hu rose qingyang
  • 4 篇 cong runmin
  • 4 篇 chen fulong
  • 4 篇 li qi
  • 4 篇 zhang hongli

语言

  • 393 篇 英文
  • 53 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer Information and Network Security"
454 条 记 录,以下是1-10 订阅
排序:
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science PhiladelphiaPA19122 United States
Mobile Opportunistic networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
Endogenous security of FQn networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Enhancing TrUStAPIS Methodology in the Web of Things with LLM-Generated IoT Trust Semantics  26th
Enhancing TrUStAPIS Methodology in the Web of Things with LL...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Ferraris, Davide Kotis, Konstantinos Kalloniatis, Christos Network Information and Computer Security Lab University of Malaga Malaga Spain Department of Cultural Technology and Communication University of the Aegean Mytilene Greece
In the Internet of Things (IoT) there are ecosystems where their physical’smart’ entities virtually interact with each other. Often, this interaction occurs among unknown entities, making trust an essential requirem... 详细信息
来源: 评论
Controllable False Data Injection Attack  5th
Controllable False Data Injection Attack
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Kokkonda, Jayasree Jahnavi, M. Department of Information Technology G. Narayanamma Institute of Technology and Science Hyderabad India Department of Computer Network and Information Security Narayanamma Institute of Technology and Science Hyderabad India
Yet the Internet of Things continues to grow significantly. A cyber-physical system faces a variety of security challenges due to the network connections made by the various kinds of devices and large systems that mak... 详细信息
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, networking and Applications, MetaCom 2023
作者: Morales, Daniel Agudo, Isaac Lopez, Javier Itis Software Universidad de Málaga Network Information and Computer Security Lab Department of Computer Science Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,... 详细信息
来源: 评论
Federated Transfer Learning for On-Device LLMs Efficient Fine Tuning Optimization
收藏 引用
Big Data Mining and Analytics 2025年 第2期8卷 430-446页
作者: Chuantao Li Bruce Gu Zhigang Zhao Youyang Qu Guomao Xin Jidong Huo Longxiang Gao Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000Chinaand also with Shandong Provincial Key Laboratory of Computer NetworksJinan 250000China Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000Chinaand also with Department of Computer ScienceFudan UniversityShanghai 200000China TelChina Group Co.Ltd. Jinan 250000China Key Laboratory of Computing Power Network and Information Security Shandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000Chinaand also with College Oceanography and Space InformaticsChina University of Petroleum(East China)Qingdao 266000China
The proliferation of Large Language Models(LLMs)has catalyzed the growth of various *** is therefore imperative to ensure the controlled and beneficial application of LLMs across specific domains for downstream tasks ... 详细信息
来源: 评论
Continuous and Transparent E-Invigilation of E-Assessments
International Journal of Emerging Technologies in Learning
收藏 引用
International Journal of Emerging Technologies in Learning 2023年 第14期18卷 78-104页
作者: Ketab, Salam S. Al Abdulwahid, Abdulwahid Centre for Security Communications and Network Research at Plymouth University Plymouth United Kingdom Computer and Information Technology Department Jubail Industrial College Royal Commission for Jubail and Yanbu Jubail Saudi Arabia
A massive number of users are currently utilizing e-learning. Despite the flexibility provided, the traditional methods of course delivery are still used, including e-examinations. There is significant concern about t... 详细信息
来源: 评论