咨询与建议

限定检索结果

文献类型

  • 168 篇 期刊文献
  • 127 篇 会议
  • 1 册 图书

馆藏范围

  • 296 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 197 篇 工学
    • 145 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 54 篇 信息与通信工程
    • 41 篇 电气工程
    • 34 篇 控制科学与工程
    • 24 篇 电子科学与技术(可...
    • 20 篇 生物医学工程(可授...
    • 19 篇 生物工程
    • 17 篇 安全科学与工程
    • 10 篇 机械工程
    • 10 篇 光学工程
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 5 篇 土木工程
  • 87 篇 理学
    • 54 篇 数学
    • 23 篇 生物学
    • 18 篇 统计学(可授理学、...
    • 13 篇 物理学
    • 13 篇 系统科学
    • 5 篇 化学
  • 58 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 26 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 19 篇 医学
    • 16 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 11 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 15 篇 法学
    • 10 篇 法学
    • 6 篇 社会学
  • 4 篇 教育学
  • 3 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 12 篇 deep learning
  • 11 篇 blockchain
  • 10 篇 authentication
  • 9 篇 machine learning
  • 9 篇 security
  • 9 篇 training
  • 8 篇 internet of thin...
  • 8 篇 artificial intel...
  • 8 篇 privacy
  • 6 篇 semantics
  • 5 篇 feature extracti...
  • 5 篇 blockchains
  • 4 篇 access control
  • 4 篇 data privacy
  • 4 篇 optimization
  • 4 篇 smart contract
  • 4 篇 encryption
  • 4 篇 data models
  • 4 篇 forensics
  • 3 篇 intrusion detect...

机构

  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 cyber security d...
  • 8 篇 computer enginee...
  • 7 篇 department of co...
  • 7 篇 school of cyber ...
  • 6 篇 department of co...
  • 6 篇 national yunlin ...
  • 6 篇 sejong universit...
  • 5 篇 the university o...
  • 5 篇 protocol enginee...
  • 5 篇 school of comput...
  • 5 篇 sejong universit...
  • 5 篇 university of el...
  • 5 篇 school of comput...
  • 5 篇 peng cheng labor...
  • 5 篇 beijing key labo...
  • 5 篇 school of comput...
  • 4 篇 ghana technology...
  • 4 篇 information secu...

作者

  • 16 篇 das ashok kumar
  • 14 篇 mahmood khalid
  • 12 篇 jong-hyouk lee
  • 11 篇 lee jong-hyouk
  • 9 篇 fan chun-i
  • 9 篇 gong chen
  • 8 篇 kim tai-hoon
  • 8 篇 hyoung-kyu song
  • 7 篇 bhattacharyya de...
  • 7 篇 cao xiaochun
  • 6 篇 young-gab kim
  • 6 篇 yang jian
  • 6 篇 shamshad salman
  • 6 篇 xu qianqian
  • 5 篇 jihye kim
  • 5 篇 yang zhiyong
  • 5 篇 jaehyoung park
  • 5 篇 huang qingming
  • 5 篇 park jaehyoung
  • 5 篇 saleem muhammad ...

语言

  • 243 篇 英文
  • 49 篇 其他
  • 4 篇 中文
检索条件"机构=Department of Computer and Information Security & Convergence Engineering for Intelligent"
296 条 记 录,以下是41-50 订阅
排序:
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 评论
Robust Counting in Overcrowded Scenes Using Batch-Free Normalized Deep ConvNet
收藏 引用
computer Systems Science & engineering 2023年 第9期46卷 2741-2754页
作者: Sana Zahir Rafi Ullah Khan Mohib Ullah Muhammad Ishaq Naqqash Dilshad Amin Ullah Mi Young Lee Institute of Computer Sciences and Information Technology(ICS/IT) The University of AgriculturePeshawar25130Khyber PakhtunkhwaPakistan Department of Convergence Engineering for Intelligent Drone Sejong UniversitySeoul05006Korea Collaborative Robotics and Intelligent Systems(CoRIS)Institute Oregon State UniversityORUSA Department of Software Sejong UniversitySeoul05006Korea
The analysis of overcrowded areas is essential for flow monitoring,assembly control,and *** counting’s primary goal is to calculate the population in a given region,which requires real-time analysis of congested scen... 详细信息
来源: 评论
RAG-based Cyber Threat Tracing Graph Modeling Method
RAG-based Cyber Threat Tracing Graph Modeling Method
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Jong-Hee Jeon Jahoon Koo Young-Gab Kim Dept. of Computer and Information Security Security Engineering Lab. Sejong University Seoul Republic of Korea Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Security Engineering Lab. Sejong University Seoul Republic of Korea
Cyber-attacks have become increasingly complex and sophisticated, occurring frequently through various paths. Numerous attack techniques, such as ransomware, advanced persistent threat (APT) attacks, and viruses facil... 详细信息
来源: 评论
RAG-based Cyber Threat Tracing Graph Modeling Method  23
RAG-based Cyber Threat Tracing Graph Modeling Method
收藏 引用
23rd IEEE International Conference on Trust, security and Privacy in Computing and Communications, TrustCom 2024
作者: Jeon, Jong-Hee Koo, Jahoon Kim, Young-Gab Sejong University Seoul Security Engineering Lab. Dept. of Computer and Information Security Korea Republic of Sejong University Seoul Security Engineering Lab. Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Korea Republic of
Cyber-attacks have become increasingly complex and sophisticated, occurring frequently through various paths. Numerous attack techniques, such as ransomware, advanced persistent threat (APT) attacks, and viruses facil... 详细信息
来源: 评论
Simulation of an ARP Spoofing Attack on the E2 Interface in Open RAN
Simulation of an ARP Spoofing Attack on the E2 Interface in ...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Jihye Kim Jaehyoung Park Jong-Hyouk Lee Dept. of Computer and Information Security Sejong University Seoul Republic of Korea Dept. of Computer and Information Security & Convergence Engineering for Intelligent Drone Sejong University Seoul Republic of Korea
In anticipation of the 5G-Advanced and 6G era, this paper explores Open RAN as an innovative solution to enhance the existing Radio Access Network (RAN) capabilities, particularly in managing the surge in mobile traff... 详细信息
来源: 评论
Smart Contract Kill Switch for security in a Private Blockchain-based Software Transaction System
Smart Contract Kill Switch for Security in a Private Blockch...
收藏 引用
IEEE International Workshop on information Forensics and security (WIFS)
作者: Soonhong Kwon Wooyoung Son Jong-Hyouk Lee Department of Computer and Information Security & Convergence Engineering for Intelligent Sejong University Seoul Republic of Korea Protocol Engineering Lab Sejong University Seoul Republic of Korea
The Data Act’s ‘Mandatory Smart Contract Kill Switch’, officially enforced by the EU fromJanuary 11, 2024, is sparking significant debate across Europe and within the cryptocurrency community. The primaryconcern is... 详细信息
来源: 评论
A Self-Adaptive Access Control Framework Based on User Attributes Among Heterogeneous Internet of Things Platforms
A Self-Adaptive Access Control Framework Based on User Attri...
收藏 引用
International ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering (ECTI-NCON)
作者: Jihoon Park Jahoon Koo Young-Gab Kim Dept. of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Republic of Korea Dept. of Computer and Information Security Sejong University Seoul Republic of Korea
Internet of Things (IoT) platforms are being actively designed to provide various services to users. However, most IoT platforms are developed in independent environments, causing difficulties in their interoperabilit...
来源: 评论
Weighted Gauss-Seidel Precoder for Downlink Massive MIMO Systems
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 1729-1745页
作者: Jun-Yong Jang Won-Seok Lee Jae-Hyun Ro Young-Hawn You Hyoung-Kyu Song Department of Information and Communication Engineering Convergence Engineering for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer Engineering Sejong UniversitySeoul05006Korea
In this paper,a novel precoding scheme based on the Gauss-Seidel(GS)method is proposed for downlink massive multiple-input multiple-output(MIMO)*** GS method iteratively approximates the matrix inversion and reduces t... 详细信息
来源: 评论
Improved Hybrid Precoding Technique with Low-Resolution for MIMO-OFDM System
收藏 引用
computers, Materials & Continua 2021年 第8期68卷 2205-2220页
作者: Seulgi Lee Ji-Sung Jung Young-Hwan You Hyoung-Kyu Song Department of Information and Communication Engineering and Convergence for Intelligent DroneSejong UniversitySeoul05006Korea Department of Computer Engineering Sejong UniversitySeoul05006Korea
This paper proposes an improved hybrid beamforming system based on multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM)*** proposed beamforming system improves energy efficiency compare... 详细信息
来源: 评论
HY-PC:Enabling Consistent Positioning and Communication Using Visible Light
收藏 引用
China Communications 2023年 第4期20卷 180-194页
作者: Xiangyu Liu Yaoheng Chen Lei Guo Song Song School of Information Science and Engineering Shenyang Ligong UniversityShenyang 110158China Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Hangzhou Institute of Advanced Technology Hangzhou 310056China Institute of Intelligent Communications and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China
Visible light(VL)plays an important role in achieving high-precision positioning and low bit error radio(BER)data ***,most VL-based systems can not achieve positioning and communication,*** are two problems:1)the hybr... 详细信息
来源: 评论