咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 115 篇 工学
    • 96 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 24 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 machine learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 department of in...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 200 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
211 条 记 录,以下是121-130 订阅
排序:
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhao, Shuo Gu, Qiliang Zhang, Jianqiang Song, Gongpeng Lu, Qin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
收藏 引用
Science China(information Sciences) 2018年 第3期61卷 118-130页
作者: Wei LI Vincent RIJMEN Zhi TAO Qingju WANG Hua CHEN Yunwen LIU Chaoyun LI Ya LIU School of Computer Science and Technology Donghua University imec-COSIC KU Leuven Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Applied Mathematics and Computer Science Technical University of Denmark Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences College of Science National University of Defense Technology Department of Computer Science and Engineering University of Shanghai for Science and Technology
With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing many serious traffic problems, such as road safety, convenien... 详细信息
来源: 评论
On developing deep learning models with particle swarm optimization in the presence of poisoning attacks
On developing deep learning models with particle swarm optim...
收藏 引用
information Technology (ACIT)
作者: Majdi Maabreh Omar Darwish Ola Karajeh Yahya Tashtoush Department of Computer Information Systems The Hashemite University Zarqa Jordan Information Security and Applied Computing Department Eastern Michigan University MI USA Department of Computer Science Virginia Polytechnic Institute and State University VA USA Department of Computer Science Jordan University of Science and Technology Irbid Jordan
Deep learning (DL) has demonstrated several successes in a variety of fields, particularly in the era of big data. The process of training a deep learning model entails selecting the ideal learning parameters such as ... 详细信息
来源: 评论
Accessing Multilingual information Repositories  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Carol Peters Fredric C. Gey Julio Gonzalo Henning Müller Gareth J. F. Jones Michael Kluck Bernardo Magnini Maarten Rijke
The sixth campaign of the Cross Language Evaluation Forum (CLEF) for European languages was held from January to September 2005. CLEF is by now an established international evaluation initiative and 74 groups from all... 详细信息
来源: 评论
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Two Factor Authentication using Twofish Encryption and Visua...
收藏 引用
International Conference on Internet of Things: Systems, Management and security
作者: Duisen Gulsezim Seiitkaliyeva Zhansaya Abdul Razaque Yestayeva Ramina Fathi Amsaad Muder Almiani Raouf Ganda Ahmed Oun Computer Eng. And Security International Inf. Tech. Univ Almaty Kazakhstan Dept. of Computer Sci NYIT Nanjing China School of Information Security and Applied Computing Eastern Michigan University USA Computer Information Sys Al-Hussein Bin Talal University Jordan Yale School of Management Yale University USA EECS Department University of Toledo OH
Dependence of the individuals on the Internet for performing the several actions require secure data communication. Thus, the reliable data communication improves the confidentiality. As, enhanced security leads to re... 详细信息
来源: 评论
Optimizing Phishing URL Detection: A Comparative Analysis of Feature Counts and Training Times
Optimizing Phishing URL Detection: A Comparative Analysis of...
收藏 引用
Intelligent computing, Communication, Networking and Services (ICCNS), International Conference on
作者: Moayyad Alajlouni Yahya Tashtoush Saud Alhajaj Al. Dossari Omar Darwish Department of Computer Science Jordan University of Science and Technology Irbid Jordan Department of Electrical Engineering Prince Sattam bin Abdulaziz University Wadi Addwasir Saudi Arabia Information Security and Applied Computing Department Eastern Michigan University Ypsilanti MI USA
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic web sites to obtain sensitive information such as passwords and bank statements. On... 详细信息
来源: 评论
Detection of Phishing Websites using Machine Learning
Detection of Phishing Websites using Machine Learning
收藏 引用
IEEE Cloud Summit
作者: Abdul Razaque Mohamed Ben Haj Frej Dauren Sabyrov Aidana Shaikhyn Fathi Amsaad Ahmed Oun International IT University Almaty Kazakhstan University of Bridgeport Bridgeport CT USA Computer Engineering and Telecommunication International IT University Almaty Kazakhstan School of Information Security and Applied Computing (SISAC) Eastern Michigan University Ypsilanti MI USA University of Toledo Toledo OH US
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause mone... 详细信息
来源: 评论
The differential spectrum and boomerang spectrum of a class of locally-APN functions
arXiv
收藏 引用
arXiv 2022年
作者: Hu, Zhao Li, Nian Xu, Linjie Zeng, Xiangyong Tang, Xiaohu The Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan430062 China The WuHan Marine Communication Research Institute Wuhan430000 China The Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu610031 China
In this paper, we study the boomerang spectrum of the power mapping F(x) = xk(q−1) over Fq2, where q = pm, p is a prime, m is a positive integer and gcd(k, q + 1) = 1. We first determine the differential spectrum of F... 详细信息
来源: 评论
A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics
A Classifier to Detect Stream Applications Based on Network ...
收藏 引用
information Technology (ACIT)
作者: Omar Darwish Sarah Herzallah Majdi Maabreh Shouroq Al-Eidi Mahmoud Al-Maani Yahya Tashtoush Information Security and Applied Computing Eastern Michigan University Ypsilanti Michigan Electrical and Computer Engineering Eastern Michigan University Ypsilanti Michigan Department of Information Technology The Hashemite University Zarqa Jordan Computer Science Department Tafila Technical University Tafila Jordan Department of Computer Science Jordan University of Science and Technology Irbid Jordan
One of the most crucial considerations, when considering security vulnerabilities, is network traffic. There is still potential for more research on the inter-arrival time side, even though some studies concentrate on... 详细信息
来源: 评论
$\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
收藏 引用
IEEE Transactions on information Forensics and security 2018年 第9期13卷 2151-2166页
作者: Xuebin Ren Chia-Mu Yu Weiren Yu Shusen Yang Xinyu Yang Julie A. McCann Philip S. Yu School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Taiwan Information Security Center Taipei Taiwan Department of Computer Science and Engineering National Chung Hsing University Taichung Taiwan Department of Computing Imperial College London London U.K. School of Engineering and Applied Science Aston University Birmingham U.K. Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China Department of Computer Science University of Illinois at Chicago Chicago IL USA
High-dimensional crowdsourced data collected from numerous users produces rich knowledge about our society; however, it also brings unprecedented privacy threats to the participants. Local differential privacy (LDP), ... 详细信息
来源: 评论