咨询与建议

限定检索结果

文献类型

  • 1,681 篇 会议
  • 1,163 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 2,868 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,860 篇 工学
    • 1,453 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 483 篇 信息与通信工程
    • 249 篇 控制科学与工程
    • 197 篇 电气工程
    • 193 篇 生物工程
    • 144 篇 电子科学与技术(可...
    • 143 篇 网络空间安全
    • 120 篇 生物医学工程(可授...
    • 107 篇 机械工程
    • 103 篇 安全科学与工程
    • 80 篇 光学工程
    • 69 篇 仪器科学与技术
    • 63 篇 动力工程及工程热...
    • 54 篇 交通运输工程
    • 53 篇 化学工程与技术
  • 800 篇 理学
    • 441 篇 数学
    • 213 篇 生物学
    • 157 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 107 篇 系统科学
  • 502 篇 管理学
    • 304 篇 管理科学与工程(可...
    • 209 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 136 篇 医学
    • 114 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 61 篇 药学(可授医学、理...
    • 57 篇 公共卫生与预防医...
  • 135 篇 法学
    • 88 篇 社会学
  • 59 篇 经济学
    • 58 篇 应用经济学
  • 25 篇 军事学
  • 23 篇 教育学
  • 23 篇 农学
  • 13 篇 文学
  • 8 篇 艺术学

主题

  • 90 篇 authentication
  • 83 篇 internet of thin...
  • 81 篇 deep learning
  • 80 篇 cryptography
  • 77 篇 machine learning
  • 76 篇 security
  • 72 篇 accuracy
  • 58 篇 information secu...
  • 56 篇 feature extracti...
  • 53 篇 training
  • 47 篇 computational mo...
  • 47 篇 blockchain
  • 46 篇 protocols
  • 43 篇 artificial intel...
  • 41 篇 privacy
  • 40 篇 computer science
  • 40 篇 predictive model...
  • 39 篇 convolutional ne...
  • 37 篇 cloud computing
  • 32 篇 support vector m...

机构

  • 113 篇 department of co...
  • 53 篇 school of softwa...
  • 40 篇 state key labora...
  • 39 篇 school of cyber ...
  • 38 篇 tsinghua nationa...
  • 34 篇 institute of inf...
  • 28 篇 school of comput...
  • 27 篇 department of el...
  • 26 篇 cyber security d...
  • 26 篇 security enginee...
  • 24 篇 key laboratory f...
  • 23 篇 department of co...
  • 22 篇 key laboratory o...
  • 22 篇 china informatio...
  • 21 篇 department of in...
  • 19 篇 center for secur...
  • 17 篇 school of comput...
  • 17 篇 center for cyber...
  • 17 篇 center for secur...
  • 16 篇 department of cy...

作者

  • 38 篇 das ashok kumar
  • 29 篇 choo kim-kwang r...
  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 21 篇 mohammad alauthm...
  • 21 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 pan xipeng
  • 17 篇 ghazal taher m.
  • 16 篇 munir ahmad
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 kim-kwang raymon...
  • 16 篇 cao xiaochun
  • 16 篇 alauthman mohamm...
  • 15 篇 hasan mohammad k...
  • 15 篇 ahmed amjed abba...

语言

  • 2,723 篇 英文
  • 99 篇 其他
  • 46 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Technology and Information Security"
2868 条 记 录,以下是1-10 订阅
排序:
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem
收藏 引用
Soft Computing 2024年 第17-18期28卷 10569-10582页
作者: Jain, Ashish Bansal, Sulabh Das, Nripendra Narayan Gupta, Shyam Sunder Department of Information Technology School of Information Security and Data Science Manipal University Jaipur Jaipur303007 India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Madhya Pradesh Gwalior474005 India
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic... 详细信息
来源: 评论
Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks:An Empirical Study
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第5期139卷 1635-1654页
作者: Shahad Alzahrani Hatim Alsuwat Emad Alsuwat Independent Researcher Specializing in Data Security and Privacy Taif26571Saudi Arabia Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah24382Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif26571Saudi Arabia
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among ***,the reliability and integrity of learned Bayesian network models are highly dependent on the quality... 详细信息
来源: 评论
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science and Engineering University College of EngineeringTindivanamMelpakkamTamil nadu 604001India Department of Computer Engineering National Institute of Technology KurukshetraIndia
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri... 详细信息
来源: 评论
IoT Smart Devices Risk Assessment Model Using Fuzzy Logic and PSO
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2245-2267页
作者: Ashraf S.Mashaleh Noor Farizah Binti Ibrahim Mohammad Alauthman Mohammad Almseidin Amjad Gawanmeh School of Computer Sciences Universiti Sains MalaysiaPenangMalaysia Department Computer Center Al-Balqa Applied UniversitySaltJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Department of Computer Science Tafila Technical UniversityTafilaJordan College of Engineering and IT University of DubaiDubaiUnited Arab Emirates
Increasing Internet of Things(IoT)device connectivity makes botnet attacks more dangerous,carrying catastrophic *** IoT botnets evolve,their dynamic and multifaceted nature hampers conventional detection *** paper pro... 详细信息
来源: 评论
Controllable False Data Injection Attack  5th
Controllable False Data Injection Attack
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Kokkonda, Jayasree Jahnavi, M. Department of Information Technology G. Narayanamma Institute of Technology and Science Hyderabad India Department of Computer Network and Information Security Narayanamma Institute of Technology and Science Hyderabad India
Yet the Internet of Things continues to grow significantly. A cyber-physical system faces a variety of security challenges due to the network connections made by the various kinds of devices and large systems that mak... 详细信息
来源: 评论
One Dimensional Conv-BiLSTM Network with Attention Mechanism for IoT Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3765-3781页
作者: Bauyrzhan Omarov Zhuldyz Sailaukyzy Alfiya Bigaliyeva Adilzhan Kereyev Lyazat Naizabayeva Aigul Dautbayeva Department of Information Systems Al-Farabi Kazakh National UniversityAlmatyKazakhstan Department of Information Technology and Security Abylkas Saginov Karaganda Technical UniversityKaragandaKazakhstan Department of Computer Science and Information Technology K.Zhubanov Aktobe Regional UniversityAktobeKazakhstan Department of Information Systems International Information Technology UniversityAlmatyKazakhstan Department of Computer Science Korkyt Ata Kyzylorda State UniversityKyzylordaKazakhstan
In the face of escalating intricacy and heterogeneity within Internet of Things(IoT)network landscapes,the imperative for adept intrusion detection techniques has never been more *** paper delineates a pioneering deep... 详细信息
来源: 评论
Dilation-Supervised Learning: A Novel Strategy for Scale Difference in Retinal Vessel Segmentation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1693-1707页
作者: Wang, Huadeng Zuo, Wenbin Li, Bingbing Pan, Xipeng Liu, Zhenbing Lan, Rushi Luo, Xiaonan Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Ganzhou Municipal Hospital Department of Pathology Ganzhou341000 China
Retinal fundus image segmentation based on deep learning is an important method for auxiliary diagnosis of ophthalmic diseases. Due to the scale difference of the blood vessels and the imbalance between foreground and... 详细信息
来源: 评论