咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 64 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 115 篇 工学
    • 96 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 24 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 machine learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 department of in...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 200 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
211 条 记 录,以下是71-80 订阅
排序:
Classification of epilepsy period based on combination feature extraction methods and spiking swarm intelligent optimization algorithm
Classification of epilepsy period based on combination featu...
收藏 引用
作者: Duan, Lijuan Lian, Zhaoyang Chen, Juncheng Qiao, Yuanhua Miao, Jun Li, Mingai Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing University of Technology Beijing China Applied Sciences Beijing University of Technology Beijing China School of Computer Science Beijing Information Science and Technology University Beijing China
Epilepsy seriously damages the physical and mental health of patients. Detection of epileptic EEG signals in different periods can help doctors diagnose the disease. The change of frequency components during epilepsy ... 详细信息
来源: 评论
Classifying Arabian Gulf Tweets to Detect People's Trends: A case study
Classifying Arabian Gulf Tweets to Detect People's Trends: A...
收藏 引用
International Conference on Social Networks Analysis, Management and security (SNAMS)
作者: Khaled Balhaf Omar Darwish Emad Rawashdeh Mohammad Abu Awad Dirar Darweesh Yahya Tashtoush Saif Rawashdeh Department of Computer Science Jordan University of Science and Technology Irbid Jordan Information Security and Applied Computing Eastern Michigan University Ypsilanti USA
Recently, media and business companies are utilizing social media to reach a large set of users to maximize the amount of gained profit. Actually, these companies are looking for the best ways to satisfy their user... 详细信息
来源: 评论
A Trusted Authentication Scheme for IoT-based Smart Grid Applications
A Trusted Authentication Scheme for IoT-based Smart Grid App...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Fathi Amsaad Selçuk Köse School of Information Security and Applied Computing Eastern Michigan University Ypsilanti Michigan Electrical and Computer Engineering University of Rochester Rochester New York
Advanced metering infrastructure (AMI) network, which is an example of the benefits of IoT technology in the power grid system, offers two-way communication between various power smart grid nodes (i.e., smart meters, ...
来源: 评论
A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics  23
A Classifier to Detect Stream Applications Based on Network ...
收藏 引用
23rd International Arab Conference on information Technology, ACIT 2022
作者: Darwish, Omar Herzallah, Sarah Maabreh, Majdi Al-Eidi, Shouroq Al-Maani, Mahmoud Tashtoush, Yahya Eastern Michigan University Information Security and Applied Computing YpsilantiMI United States Eastern Michigan University Electrical and Computer Engineering YpsilantiMI United States The Hashemite University Department of Information Technology Zarqa Jordan Tafila Technical University Computer Science Department Tafila Jordan Jordan University of Science and Technology Department of Computer Science Irbid Jordan
One of the most crucial considerations, when considering security vulnerabilities, is network traffic. There is still potential for more research on the inter-arrival time side, even though some studies concentrate on... 详细信息
来源: 评论
Practical synchronization on complex dynamical networks via optimal pinning control
收藏 引用
Physical Review E 2015年 第1期92卷 010903(R)-010903(R)页
作者: Kezan Li Weigang Sun Michael Small Xinchu Fu School of Mathematics and Computing Science Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin 541004 People's Republic of China Institute of Applied Mathematics and Engineering Computations Hangzhou Dianzi University Hangzhou 310018 People's Republic of China School of Mathematics and Statistics The University of Western Australia Crawley Western Australia 6009 Australia Department of Mathematics Shanghai University Shanghai 200444 People's Republic of China
We consider practical synchronization on complex dynamical networks under linear feedback control designed by optimal control theory. The control goal is to minimize global synchronization error and control strength o... 详细信息
来源: 评论
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
Earthquake Damage Detection Using Before and After Earthquake Satellite Images
Earthquake Damage Detection Using Before and After Earthquak...
收藏 引用
IEEE International Conference on Electro information Technology
作者: Kasim A. Korkmaz Munther Abualkibash Eastern Michigan University School of Visual and Built Environments Ypsilanti MI Eastem Michigan University School of Information Security and Applied Computing Ypsilanti MI
After experiencing many earthquakes all around the world, earthquake damage assessment has attracted a great deal of attention from both researchers and practitioners. Complexity and uncertainty in many practical prob... 详细信息
来源: 评论
A building block for awareness in technical systems: Online novelty detection and reaction with an application in intrusion detection
A building block for awareness in technical systems: Online ...
收藏 引用
International Conference on Awareness Science and Technology (iCAST)
作者: Christian Gruhl Bernhard Sick Arno Wacker Sven Tomforde Jörg Hähner Universitat Kassel Kassel Hessen DE Applied Information Security University of Kassel Organic-Computing Augsburg University Universitat Augsburg Augsburg Bayern DE
In this article we propose a new building block to realize awareness in technical systems, a two-stage algorithm for online novelty detection and reaction in a probabilistic framework. It uses a combination of paramet... 详细信息
来源: 评论
A Communication-efficient Conjunctive Query Scheme under Local Differential Privacy
A Communication-efficient Conjunctive Query Scheme under Loc...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Ellen Z. Zhang Yunguo Guan Rongxing Lu Harry Zhang Faculty of Computer Science University of New Brunswick Fredericton Canada School of Information Security and Applied Computing Eastern Michigan University Ypsilanti MI USA
Crowdsourcing has become a widely used method for data collection and analysis, yet its privacy remains a challenge. In this paper, we present a new efficient and privacy-preserving conjunctive query scheme for crowds... 详细信息
来源: 评论
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models  2
CNNs in Crop Care: A Comparative Analysis of Tomato Disease ...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Ali, Ali M Nashwan, Shadi Al-Qerem, Ahmad Aldweesh, Amjad Alauthman, Mohammad Elgamal, Zenab Almomani, Ammar AlAhliyya Amman University Faculty Of Engineering Communications And Computer Engineering Department Amman19328 Jordan Faculty Of Information Technology Cybersecurity Department Amman11831 Jordan Zarqa University Faculty Of Information Technology Computer Science Department Zarqa13110 Jordan College Of Computing And It Shaqra University Shaqra Saudi Arabia University Of Petra Faculty Of Information Technology Department Of Information Security Amman Jordan School Of Computing Skyline University College University City Of Sharjah Sharjah United Arab Emirates School Of Computing Skyline University College Sharjah United Arab Emirates AlHuson University College AlBalqa Applied University I.T. Department Irbid Jordan
Timely and accurate detection of plant diseases is critical for sustainable crop production. This paper presents a comparative analysis of convolutional neural network (CNN) models for automated tomato leaf disease de... 详细信息
来源: 评论