咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 115 篇 工学
    • 96 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 24 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 machine learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 department of in...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 200 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
211 条 记 录,以下是1-10 订阅
排序:
The Emergent Role of Artificial Intelligence as Tool in Conducting Academic Research  16
The Emergent Role of Artificial Intelligence as Tool in Cond...
收藏 引用
16th International Conference on Society and information Technologies, ICSIT 2025
作者: Ferdousi, Bilquis School of Information Security and Applied Computing College of Engineering and Technology Eastern Michigan University YpsilantiMI United States
Academic and non-academic research institutes are the two key global sectors that are accomplishing the research agenda. This paper focuses on the implications of using AI tools in academic research. Academic institut... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Guardian-AI: A novel deep learning based deepfake detection model in images
收藏 引用
Alexandria Engineering Journal 2025年 126卷 507-514页
作者: Alsolai, Hadeel Mahmood, Khalid Alshuhail, Asma Ben Miled, Achraf Alqahtani, Mohammed Alshareef, Abdulrhman Alallah, Fouad Shoie Alghamdi, Bandar M. Department of Information Systems College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University PO Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems Applied College at Mahayil King Khalid University Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal University Saudi Arabia Department of Computer Science College of Science Northern Border University Arar73213 Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
The rapid advancement of deepfake technology has introduced significant challenges and opportunities across various domains. This article proposes a robust deepfake detection pipeline utilising a combination of attent... 详细信息
来源: 评论
A novel U-net model for brain tumor segmentation from MRI images
收藏 引用
Alexandria Engineering Journal 2025年 126卷 220-230页
作者: Obayya, Marwa Alshuhail, Asma Mahmood, Khalid Alanazi, Meshari H. Alqahtani, Mohammed Aljehane, Nojood O. Almansour, Hamad Al-Hagery, Mohammed Abdullah Department of Biomedical Engineering College of Engineering Princess Nourah bint Abdulrahman University PO Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal university Saudi Arabia Department of Information Systems Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science College of Sciences Northern Border University Arar Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Computer Science Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia Applied Collage Najran University Najran Saudi Arabia Department of Computer Science College of Computer Qassim University Saudi Arabia
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated... 详细信息
来源: 评论
Hybridization of deep learning models with crested porcupine optimizer algorithm-based cybersecurity detection on industrial IoT for smart city environments
收藏 引用
Alexandria Engineering Journal 2025年 127卷 239-250页
作者: Alzakari, Sarah A. Aljebreen, Mohammed Asiri, Mashael M. MANSOURI, Wahida Alahmari, Sultan Alqahtani, Mohammed Sorour, Shaymaa Bedewi, Wafi Department of Computer Sciences College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science Community College King Saud University P.O. Box 28095 Riyadh11437 Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science and Information Technology Faculty of Sciences and arts Turaif Northern Border University Arar91431 Saudi Arabia Cybersecurity Institute Riyadh Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Management Information Systems School of Business King Faisal University Al-Ahsa31982 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Smart cities have attracted extensive coverage from multidisciplinary studies, and many artificial intelligence (AI) solutions have been designed. Conversely, cybersecurity has constantly been a crucial issue and is b... 详细信息
来源: 评论
Deep Learning-Driven Throughput Maximization in Covert Communication for UAV-RIS Cognitive Systems
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4140-4155页
作者: Nhan Vo, Van Quoc Long, Nguyen Dang, Viet-Hung Dac Ho, Tu Tran, Hung Chatzinotas, Symeon Tran, Dinh-Hieu Sanguanpong, Surasak So-In, Chakchai Duy Tan University Faculty of Information Technology Da Nang550000 Viet Nam Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Norwegian University of Science and Technology Faculty of Information Technology and Electrical Engineering Department of Information Security and Communication Technology Trondheim7034 Norway National Economics University DATCOM Lab Faculty of Data Science and Artificial Intelligence College of Technology Hanoi12116 Viet Nam University of Luxembourg Interdisciplinary Centre for Security Reliability and Trust Esch-sur-Alzette4365 Luxembourg Kasetsart University Faculty of Engineering Department of Computer Engineering Bangkok10900 Thailand Khon Kaen University Applied Network Technology College of Computing Khon Kaen40002 Thailand
This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays two roles: relaying and fri... 详细信息
来源: 评论
A New Dual-Population Evolutionary Algorithm Leveraging Objective-Constraint Relationships for Constrained Multi-Objective Optimization
SSRN
收藏 引用
SSRN 2025年
作者: Ye, Jialu Tan, Chaogui Xia, Yizhang Hou, Zhanglu Liu, Yuan Zou, Juan Hunan Engineering Research Center of intelligent System Optimization and Security Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Hunan National Applied Mathematics Center China Xiangtan University China
Population co-evolution strategies are widely used to handle constrained multi-objective optimization problems (CMOPs). However, existing coevolutionary algorithms oversimplify population collaboration and are rigid i... 详细信息
来源: 评论
Dataset Evaluation Framework for Secure Electric Vehicle Systems
Dataset Evaluation Framework for Secure Electric Vehicle Sys...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Alauthman Ghadeer Albesani Ashraf Mashaleh Ammar Almomani Amjad Aldweesh Department of Information Security University of Petra Jordan King Abdullah II School of Information Technology Jordan University Jordan Al-Balqa Applied University Al-Salt Jordan Department of Computer Information Science Higher Colleges of Technology Al-Balqa UAE Applied University Jordan College of computing and IT Shaqra University Shaqra Saudi Arabia
Intrusion Detection Systems (IDS) play a critical role in safeguarding connected vehicular systems and Electric Vehicle Supply Equipment (EVSE) infrastructures against evolving cyber threats. The effectiveness of thes... 详细信息
来源: 评论
Intrusion Detection in the Internet of Vehicles Using Transformer Models
Intrusion Detection in the Internet of Vehicles Using Transf...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Alauthman Ashraf Mashaleh Nauman Aslam Amjad Aldweesh Ammar Almomani Department of Information Security University of Petra Jordan Al-Balqa Applied University Al-Salt Jordan Department of Computer and Information Sciences Northumbria University U.K. College of computing and IT Shaqra University Shaqra Saudi Arabia Department of Computer Information Science Higher Colleges of Technology UAE Al-Balqa Applied University Jordan
The proliferation of Internet of Vehicles (IoV) systems has introduced critical cybersecurity vulnerabilities in connected vehicle infrastructures. This paper presents a novel application of Transformer architecture f... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论