咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 129 篇 会议
  • 1 册 图书

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 147 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 56 篇 信息与通信工程
    • 43 篇 电气工程
    • 37 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 19 篇 安全科学与工程
    • 11 篇 机械工程
    • 10 篇 光学工程
    • 9 篇 网络空间安全
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 土木工程
  • 87 篇 理学
    • 54 篇 数学
    • 23 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 系统科学
    • 5 篇 化学
  • 60 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 19 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
  • 15 篇 法学
    • 10 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 3 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 deep learning
  • 11 篇 blockchain
  • 10 篇 authentication
  • 9 篇 machine learning
  • 9 篇 security
  • 9 篇 training
  • 8 篇 internet of thin...
  • 8 篇 artificial intel...
  • 8 篇 privacy
  • 6 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 blockchains
  • 4 篇 access control
  • 4 篇 data privacy
  • 4 篇 optimization
  • 4 篇 smart contract
  • 4 篇 encryption
  • 4 篇 data models
  • 4 篇 forensics
  • 3 篇 intrusion detect...

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 national yunlin ...
  • 8 篇 cyber security d...
  • 8 篇 computer enginee...
  • 7 篇 department of co...
  • 7 篇 school of cyber ...
  • 6 篇 department of co...
  • 6 篇 university of el...
  • 6 篇 sejong universit...
  • 5 篇 the university o...
  • 5 篇 protocol enginee...
  • 5 篇 school of comput...
  • 5 篇 sejong universit...
  • 5 篇 school of comput...
  • 5 篇 peng cheng labor...
  • 5 篇 beijing key labo...
  • 5 篇 school of comput...
  • 4 篇 ghana technology...
  • 4 篇 information secu...

作者

  • 15 篇 das ashok kumar
  • 14 篇 mahmood khalid
  • 12 篇 jong-hyouk lee
  • 11 篇 lee jong-hyouk
  • 9 篇 fan chun-i
  • 9 篇 gong chen
  • 8 篇 kim tai-hoon
  • 8 篇 hyoung-kyu song
  • 7 篇 bhattacharyya de...
  • 7 篇 cao xiaochun
  • 6 篇 young-gab kim
  • 6 篇 yang jian
  • 6 篇 kim young-gab
  • 6 篇 shamshad salman
  • 6 篇 xu qianqian
  • 5 篇 jihye kim
  • 5 篇 yang zhiyong
  • 5 篇 jaehyoung park
  • 5 篇 huang qingming
  • 5 篇 park jaehyoung

语言

  • 233 篇 英文
  • 62 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer and Information Security & Convergence Engineering for Intelligent"
299 条 记 录,以下是21-30 订阅
排序:
Copyright and License Agreement History Management Framework for Outsourced Software
Copyright and License Agreement History Management Framework...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Lee, Taeyang Lee, Jinsue Woo, Seungchan Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Dept. of Computer and Information Security Seoul Korea Republic of
The practice of transitioning software development tasks to outsourcing has become increasingly prevalent. However, this approach presents challenges in systematically managing the historical records of copyright and ... 详细信息
来源: 评论
Decentralized Identifier System for Software Copyright Transfer and License Management
Decentralized Identifier System for Software Copyright Trans...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Woo, Seungchan Lee, Taeyang Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security Seoul Korea Republic of Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of
This paper presents a distributed identifier (DID) system that offers transparent and traceable outsourcing support platform for software development. The proposed system is designed to ensure the privacy of contracti... 详细信息
来源: 评论
Transfer Learning-Based Robust Insider Threat Detection  23
Transfer Learning-Based Robust Insider Threat Detection
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Kim, Yujun Kim, Deok-Han Kim, Young-Gab Sejong University Dept. of Computer and Information Security Convergence Engineering for Intelligent Drone Seoul South Korea
A malicious insider's threats who has access to the organization's systems and is familiar with security policies are difficult to detect and can cause significant financial damage. A reconstruction-based anom... 详细信息
来源: 评论
A Method for Quantitative Object De-Identification Analysis of Anonymized Video  23
A Method for Quantitative Object De-Identification Analysis ...
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Kim, Deok-Han Kim, Yujun Kim, Young-Gab Sejong University Dept. of Computer and Information Security Convergence Engineering for Intelligent Drone Seoul South Korea
The rise in video content has amplified the risk of information leakage, prompting the development of various anonymization techniques. These techniques include traditional methods such as pixelation, blurring, and ma... 详细信息
来源: 评论
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第4期21卷 2766-2778页
作者: Fan, Chun-I Karati, Arijit Wu, Shou-Li National Sun Yat-sen University Department of Computer Science and Engineering Information Security Research Center The Intelligent Electronic Commerce Research Center Kaohsiung804 Taiwan National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan
For many industrial applications, the smart card is a necessary safety component in user authentication. Smart cards provided to the users are used in open and public places, making them susceptible to physical and cl... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm
Decentralized identifier based illegal digital content distr...
收藏 引用
作者: Kwon, Soonhong Park, Jaehyoung Lee, Taeyang Oh, SungHeun Lee, Jong-Hyouk Department of Computer and Information Security & Convergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of Protocol Engineering Lab. Sejong University Seoul Korea Republic of Technical Research Center DigiCAP Seoul Korea Republic of
The coronavirus pandemic, which first began in December 2019, has completely changed our daily lives. In particular, daily online digital content consumption over the world has soared since the start of the coronaviru... 详细信息
来源: 评论
Trusted and Privacy-Preserving Billing System for Smart Grids
Trusted and Privacy-Preserving Billing System for Smart Grid...
收藏 引用
International Conference on Big Data and Smart Computing (BIGCOMP)
作者: Kayumov Abduaziz Shincheol Lee Ji Sun Shin Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul South Korea Department of Computer and Information Security Sejong University Seoul South Korea
With the advent of smart meters in recent years, privacy has become one of the biggest concerns in smart grids. While privacy is achieved by designing smart grid services while maintaining the anonymous participation ... 详细信息
来源: 评论
Research on Metaverse security and Forensics
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论
Holographic Multi-Channel QR Code based Copyright Distribution Management System
Holographic Multi-Channel QR Code based Copyright Distributi...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Kwon, Soonhong Son, Wooyoung Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Protocol Engineering Lab. Seoul Korea Republic of
In this paper, we address the growing challenges arising from the rapid expansion of the global digital content market, fueled by COVID-19-induced digital transformation and increased reliance on online streaming serv... 详细信息
来源: 评论