咨询与建议

限定检索结果

文献类型

  • 1,834 篇 会议
  • 1,194 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 3,070 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,983 篇 工学
    • 1,549 篇 计算机科学与技术...
    • 1,242 篇 软件工程
    • 568 篇 信息与通信工程
    • 285 篇 控制科学与工程
    • 223 篇 电气工程
    • 195 篇 生物工程
    • 175 篇 电子科学与技术(可...
    • 164 篇 网络空间安全
    • 125 篇 生物医学工程(可授...
    • 111 篇 安全科学与工程
    • 110 篇 机械工程
    • 80 篇 仪器科学与技术
    • 75 篇 光学工程
    • 73 篇 动力工程及工程热...
    • 61 篇 交通运输工程
  • 801 篇 理学
    • 449 篇 数学
    • 211 篇 生物学
    • 159 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 522 篇 管理学
    • 331 篇 管理科学与工程(可...
    • 209 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 138 篇 法学
    • 87 篇 社会学
  • 135 篇 医学
    • 111 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 59 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 58 篇 经济学
    • 57 篇 应用经济学
  • 29 篇 军事学
  • 28 篇 农学
  • 21 篇 文学
  • 19 篇 教育学
  • 10 篇 艺术学

主题

  • 102 篇 information secu...
  • 100 篇 authentication
  • 89 篇 security
  • 88 篇 internet of thin...
  • 88 篇 cryptography
  • 76 篇 machine learning
  • 73 篇 deep learning
  • 66 篇 accuracy
  • 65 篇 protocols
  • 58 篇 feature extracti...
  • 58 篇 privacy
  • 55 篇 training
  • 49 篇 computational mo...
  • 48 篇 artificial intel...
  • 47 篇 blockchain
  • 42 篇 computer securit...
  • 41 篇 computer science
  • 41 篇 encryption
  • 40 篇 predictive model...
  • 39 篇 servers

机构

  • 75 篇 school of cyber ...
  • 65 篇 institute of inf...
  • 54 篇 state key labora...
  • 45 篇 department of co...
  • 43 篇 department of co...
  • 40 篇 school of inform...
  • 36 篇 department of co...
  • 31 篇 department of in...
  • 30 篇 department of co...
  • 27 篇 department of el...
  • 27 篇 security enginee...
  • 26 篇 school of inform...
  • 19 篇 department of co...
  • 19 篇 university of ch...
  • 19 篇 center for secur...
  • 17 篇 school of comput...
  • 16 篇 department of cy...
  • 16 篇 department of el...
  • 15 篇 key laboratory o...
  • 15 篇 guangxi key lab ...

作者

  • 40 篇 choo kim-kwang r...
  • 34 篇 das ashok kumar
  • 30 篇 walid el-shafai
  • 24 篇 kim-kwang raymon...
  • 20 篇 naglaa f.soliman
  • 20 篇 taher m. ghazal
  • 19 篇 susilo willy
  • 18 篇 mohammad kamrul ...
  • 17 篇 ashok kumar das
  • 17 篇 mahmood khalid
  • 17 篇 chen kai
  • 17 篇 kai chen
  • 16 篇 guo yuanxiong
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 cao xiaochun
  • 16 篇 ghazal taher m.
  • 15 篇 gong yanmin
  • 15 篇 amjed abbas ahme...
  • 14 篇 hasan mohammad k...

语言

  • 2,905 篇 英文
  • 123 篇 其他
  • 40 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Department of Information Security and Computer Engineering"
3070 条 记 录,以下是1-10 订阅
排序:
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and Telecommunications College of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Department of Computer Science and Engineering University College of Engineering Department of Computer Engineering National Institute of Technology Kurukshetra
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Global Spatial-Temporal information Encoder-Decoder Based Action Segmentation in Untrimmed Video
收藏 引用
Tsinghua Science and Technology 2025年 第1期30卷 290-302页
作者: Yichao Liu Yiyang Sun Zhide Chen Chen Feng Kexin Zhu Department of Computer and Cyberspace Security Fujian Normal UniversityFuzhou 350007China Department of Information Engineering Sun Yat-sen UniversityKaohsiung 80424China
Action segmentation has made significant progress,but segmenting and recognizing actions from untrimmed long videos remains a challenging *** state-of-the-art methods focus on designing models based on temporal ***,th... 详细信息
来源: 评论
ARP Spoofing Mitigation for the E2 Interface in Open RAN: An xApp Approach  25th
ARP Spoofing Mitigation for the E2 Interface in Open RAN:...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Kim, Jihye Park, Jaehyoung Lee, Jong-Hyouk Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of
In the 5G-Advanced and 6G era, the Open Radio Access Network (Open RAN) will support hardware and software interoperability between different vendors. The O-RAN Alliance, which leads the Open RAN initiative, has relea... 详细信息
来源: 评论
security Function for 5G-Advanced and 6G: Malicious UE Detection in Network Slicing  25th
Security Function for 5G-Advanced and 6G: Malicious UE Det...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Park, Jaehyoung Kim, Jihye Lee, Jong-Hyouk Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul05006 Korea Republic of Department of Computer and Information Security Sejong University Seoul05006 Korea Republic of
Starting with Software Defined Networking (SDN) and Network Functions Virtualization (NFV) technologies, network slicing is emerging as a critical technology in 5G-Advanced and 6G mobile communications to allocate log... 详细信息
来源: 评论
Enhancing Federated Feature Selection through Synthetic Data and Zero Trust Integration
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2126-2140页
作者: Madathil, Nisha Thorakkattu Alrabaee, Saed Belkacem, Abdelkader Nasreddine United Arab Emirates University College of IT Department of Information Systems and Security United Arab Emirates United Arab Emirates University College of IT Information Systems and Security department United Arab Emirates UAE University Computer and Network Engineering Department Al Ain United Arab Emirates
Federated Learning (FL) allows healthcare organizations to train models using diverse datasets while maintaining patient confidentiality collaboratively. While promising, FL faces challenges in optimizing model accura... 详细信息
来源: 评论
Privacy Enhanced P2P Power Trading Using DID-Based Identity Verification in a Microgrid  25th
Privacy Enhanced P2P Power Trading Using DID-Based Identity ...
收藏 引用
25th International Conference on information security Applications, WISA 2024
作者: Lee, Taeyang Department of Computer and Information Security and Convergence Engineering for Intelligent Drone Sejong University Seoul Korea Republic of
Smart meters play a crucial role in accurately measuring power usage and distribution data in microgrids. However, fine-grained data collection raises significant privacy concerns. To address this, it is essential to ... 详细信息
来源: 评论
Review of dehazing techniques: challenges and future trends
收藏 引用
Multimedia Tools and Applications 2025年 第3期84卷 1103-1131页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. EL-Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
The phenomenon of atmospheric haze arises due to the scattering of light by minute particles suspended in the atmosphere. This optical effect gives rise to visual degradation in images and videos. The degradation is p... 详细信息
来源: 评论
Analysis of Tomato Leaf Diseases Detection Models  8th
Analysis of Tomato Leaf Diseases Detection Models
收藏 引用
8th International Conference on Intelligent Technologies, ICIT 2023
作者: Satyarthi, Devshri Arya, K.V. Rathore, Santosh Singh Mishra, Richa Multimedia and Information Security Research Group Department of Computer Science and Engineering ABV-IIITM 474015 Gwalior India
Plant leaf disease distresses the growth of the plant. Therefore, early detection and classification of plant leaf disease is vital for healthy crops such as tomatoes. This early detection of tomato leaf disease in pl... 详细信息
来源: 评论
Unveiling the Pruning Risks on Privacy Vulnerabilities of Deep Neural Networks
Unveiling the Pruning Risks on Privacy Vulnerabilities of De...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Kuang, Wenxin Liang, Qizhuang Sun, Peng Fu, Wei Hu, Qiao Hu, Yupeng College of Computer Science and Electronic Engineering Hunan University Changsha China Department of Information Security Naval University of Engineering Wuhan China
Large-scale deep neural networks (DNNs), such as large language models, have gained immense popularity due to their outstanding performance across various tasks. However, their application in resource-constrained scen... 详细信息
来源: 评论