咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 129 篇 会议
  • 1 册 图书

馆藏范围

  • 299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 147 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 56 篇 信息与通信工程
    • 43 篇 电气工程
    • 37 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 19 篇 安全科学与工程
    • 11 篇 机械工程
    • 10 篇 光学工程
    • 9 篇 网络空间安全
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 6 篇 交通运输工程
    • 5 篇 土木工程
  • 87 篇 理学
    • 54 篇 数学
    • 23 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 系统科学
    • 5 篇 化学
  • 60 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 19 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
  • 15 篇 法学
    • 10 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 3 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 deep learning
  • 11 篇 blockchain
  • 10 篇 authentication
  • 9 篇 machine learning
  • 9 篇 security
  • 9 篇 training
  • 8 篇 internet of thin...
  • 8 篇 artificial intel...
  • 8 篇 privacy
  • 6 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 blockchains
  • 4 篇 access control
  • 4 篇 data privacy
  • 4 篇 optimization
  • 4 篇 smart contract
  • 4 篇 encryption
  • 4 篇 data models
  • 4 篇 forensics
  • 3 篇 intrusion detect...

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 national yunlin ...
  • 8 篇 cyber security d...
  • 8 篇 computer enginee...
  • 7 篇 department of co...
  • 7 篇 school of cyber ...
  • 6 篇 department of co...
  • 6 篇 university of el...
  • 6 篇 sejong universit...
  • 5 篇 the university o...
  • 5 篇 protocol enginee...
  • 5 篇 school of comput...
  • 5 篇 sejong universit...
  • 5 篇 school of comput...
  • 5 篇 peng cheng labor...
  • 5 篇 beijing key labo...
  • 5 篇 school of comput...
  • 4 篇 ghana technology...
  • 4 篇 information secu...

作者

  • 15 篇 das ashok kumar
  • 14 篇 mahmood khalid
  • 12 篇 jong-hyouk lee
  • 11 篇 lee jong-hyouk
  • 9 篇 fan chun-i
  • 9 篇 gong chen
  • 8 篇 kim tai-hoon
  • 8 篇 hyoung-kyu song
  • 7 篇 bhattacharyya de...
  • 7 篇 cao xiaochun
  • 6 篇 young-gab kim
  • 6 篇 yang jian
  • 6 篇 kim young-gab
  • 6 篇 shamshad salman
  • 6 篇 xu qianqian
  • 5 篇 jihye kim
  • 5 篇 yang zhiyong
  • 5 篇 jaehyoung park
  • 5 篇 huang qingming
  • 5 篇 park jaehyoung

语言

  • 233 篇 英文
  • 62 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer and Information Security & Convergence Engineering for Intelligent"
299 条 记 录,以下是31-40 订阅
排序:
UCI and EICN Integrated Model for Copyright Distribution Management
UCI and EICN Integrated Model for Copyright Distribution Man...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Kwon, Soonhong Son, Wooyoung Lee, Jong-Hyouk Sejong University Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Seoul Korea Republic of Sejong University Protocol Engineering Lab. Seoul Korea Republic of
With the recent surge in interest surrounding the metaverse environment, the significance of effective copyright license management has grown considerably. While systematic copyright management is crucial, the limitat... 详细信息
来源: 评论
Fractal Measurement of Images Human Brain from MRI
Fractal Measurement of Images Human Brain from MRI
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Anarova, Shahzoda Jabbarov, Jamoliddin Uralova, Iroda Tashkent University of Information Technologies Department of Convergence of digital technologies Computer Engineering Faculty Tashkent Uzbekistan Department of Computer science and technology Intelligent systems and computer technologies Faculty Samarkand State University Samarkand Uzbekistan
This article is devoted to the determination of the fractal size of the damaged part of the human brain on the basis of images obtained from MRI (magnetic resonance imaging). There are various mathematical methods for... 详细信息
来源: 评论
Tjong:A transformer‐based Mahjong AI via hierarchical decision‐making and fan backward
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 982-995页
作者: Xiali Li Bo Liu Zhi Wei Zhaoqi Wang Licheng Wu School of Information and Engineering Minzu University of ChinaBeijingChina Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance of MOE Minzu University of ChinaBeijingChina Department of Computer Science New Jersey Institute of TechnologyNewarkNew JerseyUSA
Mahjong,a complex game with hidden information and sparse rewards,poses significant *** Mahjong AIs require substantial hardware resources and extensive datasets to enhance AI *** authors propose a transformer‐based ... 详细信息
来源: 评论
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论
Adaptive Relay Selection Scheme for Minimization of the Transmission Time
收藏 引用
computers, Materials & Continua 2021年 第10期69卷 1361-1373页
作者: Yu-Jin Na Ji-Sung Jung Young-Hwan You Hyoung-Kyu Song Department of Information and Communication Engineering and Convergence for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer Engineering and Convergence for Intelligent DroneSejong UniversitySeoul05006Korea
As the installation of small cells increases,the use of relay also *** relay operates as a base station as well as just an *** the roles and types of relays become more diverse,appropriate relay selection technology i... 详细信息
来源: 评论
Dynamic data summarization for hierarchical spatial clustering
arXiv
收藏 引用
arXiv 2024年
作者: Abduaziz, Kayumov Kim, Min Sik Shin, Ji Sun Department of Computer and Information Security and Convergence Engineering for Intelligent Drones Sejong University Korea Republic of Petabi Inc. Department of Computer and Information Security Sejong University Korea Republic of
Hierarchical Density-Based Spatial Clustering of Applications with Noise (HDBSCAN) finds meaningful patterns in spatial data by considering density and spatial proximity. As the clustering algorithm is inherently desi... 详细信息
来源: 评论
SEIF: A Semantic-enabled IoT Service Framework for Realizing Interoperable Data and Knowledge Retrieval
收藏 引用
IEIE Transactions on Smart Processing and Computing 2023年 第1期12卷 9-22页
作者: Lee, Jieun Gilani, Komal Khatoon, Nargis Jeong, SeungMyeong Song, JaeSeung Department of Computer Security and Convergence Engineering for Intelligent Drones Sejong University Seoul Korea Republic of EGM Sophia Antipolis Valbonne06560 France Autonomous IoT Research Center Korea Electronics Technologies Institute Gyeonggi-do Korea Republic of
The Internet of Things (IoT) has enabled interconnection of embedded computing devices comprised of their own data models in existing infrastructure. Currently, many IoT platforms provide data modeling and information... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Faizan Ayub, Muhammad Li, Xiong Mahmood, Khalid Shamshad, Salman Kumar Das, Ashok Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart grids (SGs) rely on home area networks (HANs) and neighborhood area networks (NANs) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these a... 详细信息
来源: 评论
Transfer Learning-Based Robust Insider Threat Detection
Transfer Learning-Based Robust Insider Threat Detection
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Yujun Kim Deok-Han Kim Young-Gab Kim Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Republic of Korea
A malicious insider’s threats who has access to the organization’s systems and is familiar with security policies are difficult to detect and can cause significant financial damage. A reconstruction-based anomaly de... 详细信息
来源: 评论
A Method for Quantitative Object De-Identification Analysis of Anonymized Video
A Method for Quantitative Object De-Identification Analysis ...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Deok-Han Kim Yujun Kim Young-Gab Kim Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Republic of Korea
The rise in video content has amplified the risk of information leakage, prompting the development of various anonymization techniques. These techniques include traditional methods such as pixelation, blurring, and ma... 详细信息
来源: 评论