咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 115 篇 工学
    • 96 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 24 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 machine learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 department of in...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 200 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
211 条 记 录,以下是11-20 订阅
排序:
A Survey on Decentralized Identifiers and Verifiable Credentials
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Mazzocca, Carlo Acar, Abbas Uluagac, Selcuk Montanari, Rebecca Bellavista, Paolo Conti, Mauro University of Salerno Department of Information and Electrical Engineering and Applied Mathematics Fisciano84084 Italy Florida International University Cyber-Physical Systems Security Lab School of Computing and Information Science MiamiFL33174 United States University of Bologna Department of Computer Science and Engineering Bologna40136 Italy University of Padua Department of Mathematics Padua35131 Italy
Digital identity has always been one of the keystones for implementing secure and trustworthy communications among parties. The ever-evolving digital landscape has undergone numerous technological transformations that... 详细信息
来源: 评论
SEDNet: Synergistic Learning Network with Embedded Encoder and Dense Atrous Convolution for Vehicle Re-identification
收藏 引用
Alexandria Engineering Journal 2025年 128卷 297-305页
作者: Mingfu Xiong Tanghao Gui Zhihong Sun Saeed Anwar Aziz Alotaibi Khan Muhammad School of Computer Science and Artificial Intelligence Wuhan Textile University Wuhan 430200 China Department of Information Security Naval University of Engineering Wuhan 430030 China The University of Western Australia (UWA) Crawley 6009 Australia Department of Computer Science College of Computing and Information Technology Taif University Taif 21974 Saudi Arabia Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab) Department of Applied Artificial Intelligence College of Computing and Informatics Sungkyunkwan University Seoul 03063 South Korea
To address the issue of information redundancy (such as color and vehicle model) caused by excessive emphasis on local features in vehicle re-identification, this paper proposes a Synergistic Learning Network with Emb... 详细信息
来源: 评论
Background subtraction based on tensor Robust principal component analysis with side information
收藏 引用
Signal, Image and Video Processing 2025年 第8期19卷 1-11页
作者: Xu, Xin Chen, Lixia Wang, Xuewen School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and Computation Guilin University of Electronic Technology Guilin People’s Republic of China Center for Applied Mathematics of Guangxi (GUET) Guilin People’s Republic of China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
In the field of video image processing, moving target detection remains a hot topic. To address the limitations of existing methods in complex environments, This paper proposes a novel TRPCA model based on Tensor Sing...
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
GBFRS: Robust Fuzzy Rough Sets via Granular-ball computing
arXiv
收藏 引用
arXiv 2025年
作者: Xia, Shuyin Lian, Xiaoyu Sang, Binbin Wang, Guoyin Gao, Xinbo Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China College of Computer and Information Science the National Center for Applied Mathematics in Chongqing Chongqing Normal University Chongqing401331 China
Fuzzy rough set theory is effective for processing datasets with complex attributes, supported by a solid mathematical foundation and closely linked to kernel methods in machine learning. Attribute reduction algorithm... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qing Liu Qian Gao Jun Fan Zhiqiang Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China China Telecom Digital Intelligence Techonology Co Ltd Jinan China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
A Hybrid Deep Learning Paradigm for Robust Feature Extraction and Classification for Cataracts
Applied AI Letters
收藏 引用
applied AI Letters 2025年 第2期6卷
作者: Ramakrishnan, Akshay Bhuvaneswari Madavan, Mukunth Manikandan, R. Gandomi, Amir H. Department of Applied Mathematics and Statistics Johns Hopkins University Baltimore MD United States Mukunth Madhavan AI Security Engineer Banglore India School of Computing SASTRA Deemed University Thanjavur India Faculty of Engineering & Information Technology University of Technology Sydney Sydney Australia University Research and Innovation Center (EKIK) Óbuda University Budapest Hungary Department of Computer Science Khazar University Baku Azerbaijan
The study suggests using a hybrid convolutional neural networks-support vector machines architecture to extract reliable characteristics from medical images and classify them as an ensemble using four different models... 详细信息
来源: 评论
A Classifier to Detect Number of Machines Performing DoS Attack Against Arduino Oplà Device in IoT Environment  5
A Classifier to Detect Number of Machines Performing DoS Att...
收藏 引用
5th International Conference on Advanced Communication Technologies and Networking, CommNet 2022
作者: Al-Maani, Mahmoud Frisbie, Gayle Shippy, Frederick Tiseo, Mario Darwish, Omar Abualkibash, Munther Eastern Michigan University Information Security and Applied Computing YpsilantiMI United States
The use of Internet of Things (IoT) devices is on the rise as they enter our homes and businesses, from smart appliances to increased use in agriculture, health care, and manufacturing. These IoT devices rely on their... 详细信息
来源: 评论
Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
收藏 引用
Computers, Materials & Continua 2018年 第9期56卷 447-465页
作者: Daofeng Li Mingxing Luo Bowen Zhao Xiangdong Che School of Computer Electrical and informationGuang Xi UniversityNanning530004China Information Security and National Computing Grid Laboratory Southwest Jiaotong UniversityChengdu610031China Guangxi Colleges and Universities Key Laboratory of Multimedia Communications and Information Processing Guangxi UniversityNanning530004China School of Information Security&Applied Computing College of TechnologyEastern Michigan UniversityMichigan48197USA
The secure issues of APK are very important in Android *** order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mechanism(APK-SA... 详细信息
来源: 评论