咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 115 篇 工学
    • 96 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 24 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 machine learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 department of in...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 200 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
211 条 记 录,以下是41-50 订阅
排序:
Privacy-Preserving Electricity Theft Detection Based on Blockchain
收藏 引用
IEEE Transactions on Smart Grid 2023年 第5期14卷 4047-4059页
作者: Zhao, Zhiqiang Liu, Yining Zeng, Zhixin Chen, Zhixiong Zhou, Huiyu Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Fujian Key Laboratory of Financial Information Processing The Key Laboratory of Applied Mathematics of Fujian Province University Putian University Putian351100 China University of Leicester School of Computing and Mathematical Sciences LeicesterLE1 7RH United Kingdom
In most electricity theft detection schemes, consumers' power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is... 详细信息
来源: 评论
A Platform for Automated Solar Data Analysis Using Machine Learning  9
A Platform for Automated Solar Data Analysis Using Machine L...
收藏 引用
9th International Conference on Social Networks Analysis, Management and security, SNAMS 2022
作者: Younis, Ola Tashtoush, Yahya Alomari, Mohammad Darwish, Omar Department of Computer Science University of Liverpool Liverpool United Kingdom Computer Science Department Jordan University of Science and Technology Jordan Applied Science Research Center Applied Science Private University Jordan Information Security and Applied Computing Eastern Michigan University Ypsilanti United States
This paper presents a computer platform for the automated analysis of associations among different solar events and activities. This computer tool enables the advanced learning by implementing many associations' a... 详细信息
来源: 评论
Emerging Research in the security of Modern and Autonomous Vehicles
Emerging Research in the Security of Modern and Autonomous V...
收藏 引用
IEEE International Conference on Electro information Technology
作者: Samir Tout Munther Abualkibash Pooja Patil School of Information Security & Applied Computing Department of Computer Science Eastern Michigan University
The last decade has witnessed considerable advancements in automating modern "connected" and Autonomous Vehicles (AVs), which are becoming an integral part of the modern transportation systems. Such advancem... 详细信息
来源: 评论
Epileptic Spike Detection Based on Deep Learning  23
Epileptic Spike Detection Based on Deep Learning
收藏 引用
9th International Conference on computing and Artificial Intelligence, ICCAI 2023
作者: Duan, Lijuan Cui, Yuanqi Wang, Yao Wang, Zeyu Cao, Min Qiao, Yuanhua Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China College of Applied Science Beijing University of Technology University Beijing China
Epilepsy is a chronic disease with high prevalence and high disease burden. Electroencephalogram (EEG) is one of the most important tools for diagnosing epilepsy. Detection of epileptic spikes from EEG can effectively... 详细信息
来源: 评论
A new attack on three variants of the RSA cryptosystem  21st
A new attack on three variants of the RSA cryptosystem
收藏 引用
21st Australasian Conference on information security and Privacy, ACISP 2016
作者: Bunder, Martin Nitaj, Abderrahmane Susilo, Willy Tonien, Joseph School of Mathematics and Applied Statistics University of Wollongong Wollongong Australia Département de Mathématiques Université de Caen Caen France School of Computing and Information Technology Centre for Computer and Information Security Research University of Wollongong Wollongong Australia
In 1995, Kuwakado, Koyama and Tsuruoka presented a new RSA-type scheme based on singular cubic curves y2 = x3 + bx2 (mod N) where N = pq is an RSA modulus. Then, in 2002, Elkamchouchi, Elshenawy and Shaban introduced ... 详细信息
来源: 评论
A Robust Model for Translating Arabic Sign Language into Spoken Arabic Using Deep Learning
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 2037-2057页
作者: Khalid M.O.Nahar Ammar Almomani Nahlah Shatnawi Mohammad Alauthman Department of Computer Sciences Faculty of Information Technology and Computer SciencesYarmouk University-Irbid21163Jordan School of Computing Skyline University CollegeSharjahP.O.Box 1797United Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
This study presents a novel and innovative approach to auto-matically translating Arabic Sign Language(ATSL)into spoken *** proposed solution utilizes a deep learning-based classification approach and the transfer lea... 详细信息
来源: 评论
A Communication-efficient Conjunctive Query Scheme under Local Differential Privacy
A Communication-efficient Conjunctive Query Scheme under Loc...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Ellen Z. Guan, Yunguo Lu, Rongxing Zhang, Harry University of New Brunswick Faculty of Computer Science FrederictonE3B5A3 Canada Eastern Michigan University School of Information Security and Applied Computing YpsilantiMI48197 United States
Crowdsourcing has become a widely used method for data collection and analysis, yet its privacy remains a challenge. In this paper, we present a new efficient and privacy-preserving conjunctive query scheme for crowds... 详细信息
来源: 评论
HydraView: A Synchronized 360-View of Multiple Sensors for Autonomous Vehicles
HydraView: A Synchronized 360-View of Multiple Sensors for A...
收藏 引用
2020 International Conference on Connected and Autonomous Driving, MetroCAD 2020
作者: Yang, Luodai Jia, Qian Wang, Ruijun Cao, Jie Shi, Weisong Eastern Michigan University College of Engineering and Technology United States Wayne State University Dept.of Computer Science United States Eastern Michigan University School of Information Security and Applied Computing United States
Today's autonomous vehicles will deploy multiple sensors to achieve safe and reliable navigation and precise perception of the environment. Although multiple sensors can be advantageous in terms of providing a rob... 详细信息
来源: 评论
Comparative Analysis of Sequential and Parallel computing for Object Detection Using Deep Learning Model  24
Comparative Analysis of Sequential and Parallel Computing fo...
收藏 引用
24th International Arab Conference on information Technology, ACIT 2023
作者: Amsaad, Fathi Al-Eidi, Shorouq Darwish, Omar Computer Science and Engineering Wright State University Ohio United States Tafila Technical University Computer Science Department Tafila Jordan Information Security and Applied Computing Eastern Michigan University Michigan United States
Recently, parallel and distributed computing has become indispensable in various application domains, such as cloud computing and extensive data analysis, to meet the growing demands for efficiency and reliability. In... 详细信息
来源: 评论
Hierarchical certification of nonclassical network correlations
收藏 引用
Physical Review A 2024年 第2期110卷 022617页
作者: Ming-Xing Luo Xue Yang Alejandro Pozas-Kerstjens Information Security and National Computing Grid Laboratory CAS Center for Excellence in Quantum Information and Quantum Physics Hefei 230026 China Group of Applied Physics 8200 Schaffhausen Switzerland (
With the increased availability of quantum technological devices, it becomes more important to have tools to guarantee their correct nonclassical behavior. This is especially important for quantum networks, which cons... 详细信息
来源: 评论