咨询与建议

限定检索结果

文献类型

  • 592 篇 会议
  • 370 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 970 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 574 篇 工学
    • 444 篇 计算机科学与技术...
    • 364 篇 软件工程
    • 143 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 68 篇 电气工程
    • 62 篇 生物工程
    • 47 篇 网络空间安全
    • 46 篇 机械工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 生物医学工程(可授...
    • 36 篇 安全科学与工程
    • 27 篇 仪器科学与技术
    • 23 篇 交通运输工程
    • 21 篇 动力工程及工程热...
    • 20 篇 化学工程与技术
    • 19 篇 光学工程
  • 229 篇 理学
    • 108 篇 数学
    • 68 篇 生物学
    • 60 篇 物理学
    • 42 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 19 篇 化学
  • 167 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 53 篇 医学
    • 45 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 37 篇 法学
    • 25 篇 社会学
  • 15 篇 经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 54 篇 deep learning
  • 54 篇 feature extracti...
  • 54 篇 accuracy
  • 40 篇 machine learning
  • 33 篇 semantics
  • 27 篇 computational mo...
  • 27 篇 training
  • 26 篇 security
  • 25 篇 federated learni...
  • 22 篇 predictive model...
  • 21 篇 internet of thin...
  • 21 篇 convolutional ne...
  • 20 篇 visualization
  • 20 篇 artificial intel...
  • 20 篇 measurement
  • 17 篇 reliability
  • 16 篇 information tech...
  • 16 篇 data mining
  • 16 篇 cybersecurity
  • 16 篇 data models

机构

  • 77 篇 key laboratory o...
  • 67 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 27 篇 department of el...
  • 26 篇 security enginee...
  • 18 篇 center for cyber...
  • 17 篇 department of cy...
  • 16 篇 faculty of data ...
  • 15 篇 shandong provinc...
  • 14 篇 security enginee...
  • 14 篇 zarqa university...
  • 14 篇 department of in...
  • 14 篇 center for cyber...
  • 13 篇 department of in...
  • 13 篇 shandong fundame...
  • 12 篇 center for cyber...
  • 11 篇 shandong enginee...
  • 11 篇 faculty of infor...
  • 10 篇 department of in...
  • 10 篇 department of co...

作者

  • 29 篇 walid el-shafai
  • 24 篇 taher m. ghazal
  • 24 篇 ghazal taher m.
  • 20 篇 mohammad kamrul ...
  • 20 篇 naglaa f.soliman
  • 18 篇 mohammad alauthm...
  • 17 篇 hasan mohammad k...
  • 16 篇 fathi e.abd el-s...
  • 16 篇 el-shafai walid
  • 16 篇 amjed abbas ahme...
  • 16 篇 ahmed amjed abba...
  • 16 篇 alauthman mohamm...
  • 15 篇 munir ahmad
  • 13 篇 taher m.ghazal
  • 12 篇 jing zhao
  • 12 篇 zhenyu yang
  • 11 篇 ammar almomani
  • 10 篇 sagheer abbas
  • 10 篇 ahmad munir
  • 10 篇 muhammad adnan k...

语言

  • 809 篇 英文
  • 154 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Faculty of Information Technology and Computer Security"
970 条 记 录,以下是71-80 订阅
排序:
Malware Threats Targeting Cryptocurrency: A Comparative Study  2
Malware Threats Targeting Cryptocurrency: A Comparative Stud...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Alauthman, Mohammad Al-Qerem, Ahmad Alkasassbeh, Mouhammd Aslam, Nauman Aldweesh, Amjad University Of Petra Department Of Information Security Amman Jordan Zarqa University Faculty Of Information Technology Computer Science Department Zarqa Jordan Princess Summaya University For Technology Computer Science Department Amman Jordan Northumbria University Department Of Computer And Information Sciences Newcastle upon Tyne United Kingdom College Of Computing And It Shaqra University Shaqra Saudi Arabia
As cryptocurrencies have grown in prevalence and value, associated malware threats have rapidly emerged, exploiting vulnerabilities in wallets, markets, and decentralization mechanisms. This paper provides a comparati... 详细信息
来源: 评论
Collecting and analyzing key-value data under shuffled differential privacy
收藏 引用
Frontiers of computer Science 2023年 第2期17卷 241-243页
作者: Ning WANG Wei ZHENG Zhigang WANG Zhiqiang WEI Yu GU Peng TANG Ge YU Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Lab of Cryptologic Technology and Information Security Ministry of EducationShandong UniversityQingdao 266200China School of Cyber Science and Technology Shandong UniversityQingdao 266200China
1 Introduction Key-value data,as NoSQL data widely used in recent years,has been frequently collected and used for analysis in major websites and mobile *** frequency distribution estimation on the key domain,as well ... 详细信息
来源: 评论
Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks
收藏 引用
Alexandria Engineering Journal 2025年 128卷 127-143页
作者: Islam, Shayla Topazal, S.M. Hasan, Mohammad Kamrul Kolandaisamy, Raenu AL Abbas, Huda Saleh Vo, Nguyen Thakkar, Rahul Khan, Muhammad Attique Gupta, Deepak AlHammadi, Dina Abdulaziz Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia Center for Cyber Security Faculty of Information Science and Technology the National University of Malaysia Selangor Bangi43600 Malaysia Department of computer science College of Computer Science and Engineering Taibah University Madina Saudi Arabia Victorian Institute of Technology Melbourne Australia Center of AI College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia Maharaja Agrasen Institute of Technology Delhi India Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O.Box 84428 Riyadh11671 Saudi Arabia
The emergence of 5 G and 6 G networks promises significant advancements in the Internet of Medical Things (IoMT) by enabling real-time medical data transmission and continuous connectivity for mobile healthcare device... 详细信息
来源: 评论
Traffic Congestion Prediction Using Machine Learning: Amman City Case Study
Traffic Congestion Prediction Using Machine Learning: Amman ...
收藏 引用
2024 International Conference on Medical Imaging, Electronic Imaging, information Technologies, and Sensors, MIEITS 2024
作者: Arabiat, Areen Hassan, Mohammad Al Momani, Omar Department of Communication and Computer Engineering Faculty of Engineering Al Ahliyya Amman University Amman19111 Jordan Department of Networks security Faculty of Information Technology The World Islamic Sciences and Educations University WISE Amman Jordan
Traffic congestion leads to wasted time, pollution, and increased fuel usage. Traffic congestion prediction has become a developing research topic in recent years, particularly in the field of machine learning (ML). T... 详细信息
来源: 评论
Enhancing Convergence Efficiency in Federated Learning Models  25
Enhancing Convergence Efficiency in Federated Learning Model...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Samara, Ghassan Elhilo, Ala'Mazen Aljaidi, Mohammad Alamleh, Amneh Al-Mousa, Mohammad Rasmi Batyha, Radwan Alazaidah, Raed Bani-Bakr, Alaa Elrashidi, Ali Zarqa University Faculty of It Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Department of Cybersecurity Zarqa Jordan Applied Science Private University Faculty of Information Technology Amman Jordan Zarqa University Faculty of It Department of Cyber Security Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
This study evaluates federated learning models' performance compared to centralized models using the MNIST and CIFAR-10 datasets. Four models were tested: two Federated Learning models and two centralized models. ... 详细信息
来源: 评论
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 421-432页
作者: Xiaodong Qu Chengcheng Guan Gang Xie Zhiyi Tian Keshav Sood Chaoli Sun Lei Cui the Shanxi Key Laboratory of Advanced Control and Equipment Intelligence Taiyuan University of Science and TechnologyTaiyuan 030024China the Faculty of Engineering and Information Technology University of Technology SydneyUltimo 2007Australia the Centre for Cyber Security Research and Innovation Deakin UniversityMelbourne 3125Australia the School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China
Accurate load forecasting is critical for electricity production,transmission,and *** learning(DL)model has replaced other classical models as the most popular prediction ***,the deep prediction model requires users t... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
2024 International Conference on Decision Aid Sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Fadhil, Saif Aamer Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad10011 Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论
Linear Random Early Detection for Congestion Control at the Router Buffer
收藏 引用
Informatica (Slovenia) 2022年 第5期46卷 105-114页
作者: Abu-Shareha, Ahmad Adel Al-Kasasbeh, Basil Shambour, Qusai Y. Abualhaj, Mosleh M. Alsharaiah, Mohmmad Abdalla Al-Khatib, Sumaya N. Department of Computer Science Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan Riyadh Saudi Arabia Department of Software Engineering Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan Department of Networks and Information Security Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan Department of Data Science and Artificial Intelligence Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan
Active Queue Management (AQM) methods control the router's buffer to maintain high network performance and control congestion at the router buffer. Random Early Detection (RED) method is the most well-known and th... 详细信息
来源: 评论
Post-Quantum Group Key Management in IoTs  25
Post-Quantum Group Key Management in IoTs
收藏 引用
25th International Multi Topic Conference, INMIC 2023
作者: Samiullah, Fouzia Gan, Ming-Lee Akleylek, Sedat Aun, Yichiet Universiti Tunku Abdul Rahman Faculty of Information and Communication Technology Perak Kampar31900 Malaysia University of Tartu Security and Theoretical Computer Science Estonia
In our interconnected society, effective group communication is crucial for facilitating the efficient and secure interchange of data between multiple endpoints, particularly within the complex landscapes of the IoTs ... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论