咨询与建议

限定检索结果

文献类型

  • 830 篇 会议
  • 495 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 1,339 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 786 篇 工学
    • 573 篇 计算机科学与技术...
    • 466 篇 软件工程
    • 200 篇 信息与通信工程
    • 131 篇 控制科学与工程
    • 85 篇 电气工程
    • 84 篇 生物工程
    • 63 篇 电子科学与技术(可...
    • 63 篇 生物医学工程(可授...
    • 59 篇 机械工程
    • 54 篇 网络空间安全
    • 52 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 35 篇 仪器科学与技术
    • 32 篇 交通运输工程
    • 29 篇 光学工程
    • 29 篇 动力工程及工程热...
  • 336 篇 理学
    • 160 篇 数学
    • 89 篇 生物学
    • 84 篇 物理学
    • 53 篇 统计学(可授理学、...
    • 51 篇 系统科学
    • 36 篇 化学
  • 198 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 92 篇 图书情报与档案管...
    • 43 篇 工商管理
  • 54 篇 医学
    • 46 篇 临床医学
    • 39 篇 基础医学(可授医学...
    • 22 篇 公共卫生与预防医...
  • 39 篇 法学
    • 30 篇 社会学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 15 篇 农学
  • 8 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 51 篇 feature extracti...
  • 48 篇 accuracy
  • 47 篇 deep learning
  • 38 篇 machine learning
  • 32 篇 semantics
  • 29 篇 security
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 predictive model...
  • 26 篇 cryptography
  • 24 篇 internet of thin...
  • 24 篇 privacy
  • 24 篇 convolutional ne...
  • 23 篇 authentication
  • 20 篇 measurement
  • 19 篇 neural networks
  • 19 篇 data models
  • 18 篇 information tech...
  • 18 篇 information secu...
  • 18 篇 artificial intel...

机构

  • 53 篇 shandong provinc...
  • 48 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 36 篇 department of cy...
  • 27 篇 department of el...
  • 27 篇 faculty of infor...
  • 27 篇 zarqa university...
  • 27 篇 security enginee...
  • 26 篇 university of bu...
  • 22 篇 department of me...
  • 18 篇 university of bu...
  • 18 篇 college of engin...
  • 17 篇 division of rese...
  • 15 篇 center for cyber...
  • 14 篇 security enginee...
  • 14 篇 faculty of elect...
  • 14 篇 state key labora...
  • 13 篇 department of in...
  • 13 篇 center for cyber...
  • 12 篇 beijing key labo...

作者

  • 30 篇 walid el-shafai
  • 22 篇 taher m. ghazal
  • 21 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 19 篇 ghazal taher m.
  • 18 篇 jayant giri
  • 17 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 15 篇 jafar ababneh
  • 15 篇 ahmed amjed abba...
  • 15 篇 kai ye
  • 14 篇 ababneh jafar
  • 13 篇 khaled al-qawasm...
  • 13 篇 choo kim-kwang r...
  • 13 篇 rosilah hassan
  • 13 篇 giri jayant
  • 12 篇 hasan mohammad k...
  • 12 篇 duan lijuan
  • 11 篇 al-qawasmi khale...

语言

  • 1,270 篇 英文
  • 56 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Security and Engineering"
1339 条 记 录,以下是1-10 订阅
排序:
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
Level Up with ML Vulnerability Identification: Leveraging Domain Constraints in Feature Space for Robust Android Malware Detection
收藏 引用
ACM Transactions on Privacy and security 2025年 第2期28卷 1-32页
作者: Bostani, Hamid Zhao, Zhengyu Liu, Zhuoran Moonsamy, Veelasha Digital Security Group Institute for Computing and Information Sciences Radboud University Nijmegen Netherlands Faculty of Electronic and Information Engineering Xi'an Jiaotong University Xi'an China Horst Görtz Institute for It Security Ruhr University Bochum Bochum Germany
Machine Learning (ML) promises to enhance the efficacy of Android Malware Detection (AMD);however, ML models are vulnerable to realistic evasion attacks - crafting realizable Adversarial Examples (AEs) that satisfy An... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Review of dehazing techniques: challenges and future trends
收藏 引用
Multimedia Tools and Applications 2025年 第3期84卷 1103-1131页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. EL-Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
The phenomenon of atmospheric haze arises due to the scattering of light by minute particles suspended in the atmosphere. This optical effect gives rise to visual degradation in images and videos. The degradation is p... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
Improving Adversarial Robustness in Android Malware Detection by Reducing the Impact of Spurious Correlations  19th
Improving Adversarial Robustness in Android Malware Detecti...
收藏 引用
19th International Workshop on Data Privacy Management, DPM 2024, 8th International Workshop on Cryptocurrencies and Blockchain Technology, CBT 2024 and 10th Workshop on the security of Industrial Control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer security, ESORICS 2024
作者: Bostani, Hamid Zhao, Zhengyu Moonsamy, Veelasha Digital Security Group Institute for Computing and Information Sciences Radboud University Nijmegen Netherlands Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Horst Görtz Institute for IT Security Ruhr University Bochum Bochum Germany
Machine learning (ML) has demonstrated significant advancements in Android malware detection (AMD);however, the resilience of ML against realistic evasion attacks remains a major obstacle for AMD. One of the primary f... 详细信息
来源: 评论
"Paying the Rent" A Formal Methods Riposte to "Living Off the Land" Attacks  19th
"Paying the Rent" A Formal Methods Riposte to "Living Off th...
收藏 引用
19th International Conference on Critical information Infrastructures security, CRITIS 2024
作者: McEvoy, Thomas Richard Wolthusen, Stephen D. Faculty of Information Technology and Electrical Engineering NTNU I Gjøvik Trondheim Norway Information Security Group Department of Mathematics Royal Holloway University of London London United Kingdom
"Living off the land" attacks make use of legitimate, pre-existing code in combination with stolen credentials, rather than by adding malicious code infiltrate and launch attacks including on industrial... 详细信息
来源: 评论
Intelligent wearable vision systems for the visually impaired in Saudi Arabia
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8571-8591页
作者: Talaat, Fatma M. El-Shafai, Walid Soliman, Naglaa F. Algarni, Abeer D. El-Samie, Fathi E. Abd Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Faculty of Computer Science and Engineering New Mansoura University Gamasa35712 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Navigating the world with visual impairments presents unique challenges, often limiting independence and safety. This research introduces SafeStride, a novel algorithm designed to empower visually impaired individuals... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Research on crime risk prediction model based on machine learning  24
Research on crime risk prediction model based on machine lea...
收藏 引用
13th International Conference on Computing and Pattern Recognition, ICCPR 2024
作者: Hou, Xuehui Rexiti, Kudelaiti Aizezi, Yasen School of Resources and Environment University of Electronic Science and Technology of China Chengdu Sichuan China Faculty of Information Security and Engineering Xinjiang Police College Urumqi Xinjiang China
Crime prediction is an important method for public security departments to conduct crime early warning and investigation. According to the multidimensional characteristics of criminals, machine learning classification... 详细信息
来源: 评论