咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是181-190 订阅
排序:
Hiding Scrambling Text Message in Speech Signal Based on Lightwight Hyperchaotic Map and Conditional Lsb Mechanisms
SSRN
收藏 引用
SSRN 2023年
作者: Al Sibahee, Mustafa A. Abduljaleel, Iman Qays Luo, Chengwen Zhang, Jin Huang, Yijing Abduljabbar, Zaid Ameen Ma, Junchao National Engineering Laboratory for Big Data System Computing Technology Shenzhen Technology University 518060 China Department of Computer Science College of Computer Science and Information Technology University of Basrah 61004 Iraq College of Computer Science and Software Engineering Shenzhen University 518060 China Department of Computer Science College of Education for Pure Sciences University of Basrah Basrah61004 Iraq Technical Computer Engineering Department Al-kunooze University College Basrah61001 Iraq Huazhong University of Science and Technology Shenzhen Institute Shenzhen518118 China College of Big Data and Internet Shenzhen Technology University Shenzhen518118 China
This study proposed a lightweight and secure audio steganography system for hiding text messages during transmission over the internet to address the computational cost exaggeration, and Insufficient levels of securit... 详细信息
来源: 评论
G2Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haoxin Xu, Xuemiao Xu, Cheng Zhang, Huaidong Qin, Jing Wang, Yi Heng, Pheng-Ann He, Shengfeng The School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science China The Centre for Smart Health The Hong Kong Polytechnic University Hong Kong The School of Future Technology South China University of Technology Guangzhou China The School of Computer Science and Network Security Dongguan University of Technology Dongguan China The Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong The School of Computing and Information Systems Singapore Management University Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Gnn-Mgrpool: Enhanced Graph Neural Networks with Multi-Granularity Pooling for Graph Classification
SSRN
收藏 引用
SSRN 2023年
作者: Sun, Haichao Wang, Guoyin Liu, Qun Guo, Yike Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China Department of Computer Science and Engineering The Hong Kong University of Science and Technology 999077 Hong Kong School of Computer Engineering and Science Shanghai University Shanghai200444 China
Graph neural networks (GNNs) have gained significant attention and have been applied in various domain tasks. Currently, numerous pooling approaches have been proposed to aggregate node features and obtain node embedd... 详细信息
来源: 评论
EEG based Parkinson Detection through Supervised Information Enhanced Contrastive Learning
EEG based Parkinson Detection through Supervised Information...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jian Song Xiang Li Wenjing Jiang Chunxiao Wang Zhigang Zhao Jialiang Lv Bin Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Geriatric Neurology Key Laboratory of Cardiovascular Proteomics of Shandong Province Qilu Hospital of Shandong University Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study presents a novel Supervised Information Enhanced Contrastive Learning Algorithm for Parkinson’s Disease Detection (SI-CLAPD) based on Electroencephalography (EEG). SI-CLAPD performs contrastive learning in...
来源: 评论
An improved deep convolutionary neural network for bone marrow cancer detection using image processing
收藏 引用
Informatics in Medicine Unlocked 2023年 38卷
作者: Ramasamy, Manjula Devi Dhanaraj, Rajesh Kumar Pani, Subhendu Kumar Das, Rashmi Prava Movassagh, Ali Akbar Gheisari, Mehdi Liu, Yang Porkar, P. Banu, Sabitha Department of Computer Science and Engineering KPR Institute of Engineering and Technology India School of Computing Science and Engineering Galgotias University India Krupajal Engineering College Biju Patnaik University of Technology Odisha India Department of Computer Science and Engineering CV Raman Global University Bhubaneswar India Department of Biomedical Engineering School of Medicine Tehran University of medical sciences Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies China Department of Cognitive Computing Institute of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Young researchers and elite club Islamic Azad University Parand Iran
Bone Marrow Cancer is a type of cancer that develops in the stem cells of the bone marrow that are responsible for blood formation. AML(Acute Myeloid Leukaemia) and MM(Multiple Myeloma) are both types of malignancy th... 详细信息
来源: 评论
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome
A residual attention-based privacy-preserving biometrics mod...
收藏 引用
IEEE International Conference on Trust, security and Privacy in computing and Communications (TrustCom)
作者: Cheng Tian Song Liu Jinbao Li Guangchen Wang Luyue Kong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Department of Medicine Shandong Medical College Jinan China
Transcriptome prediction from genetic variation data is an important task in the privacy-preserving and biometrics field, which can better protect genomic data and achieve biometric recognition through transcriptome. ... 详细信息
来源: 评论
Poisoning as a Post-Protection: Mitigating Membership Privacy Leakage From Gradient and Prediction of Federated Models
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Liu, Gaoyang Xu, Tianlong Yang, Yang Abdelmoniem, Ahmed M. Wang, Chen Liu, Jiangchuan Huazhong University of Science and Technology Hubei Key Laboratory of Internet of Intelligence School of Electronic Information and Communications Wuhan430074 China Simon Fraser University School of Computing Science BurnabyBCV5A 1S6 Canada Ministry of Education Key Laboratory of Intelligent Sensing System and Security China Hubei University School of Artificial Intelligence Wuhan430062 China Queen Mary University of London School of Electronic Engineering and Computer Science United Kingdom
Federated learning (FL) is a distributed learning paradigm that enables multiple clients to train a unified model without sharing their private data. However, recent works demonstrate that FL models are vulnerable to ... 详细信息
来源: 评论
Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Shao-Di Wang, Hui-Ming Li, Zhetao Leung, Victor C.M. The School of Information and Communication Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China The Key Laboratory of Hunnan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent Network School of Computer Science Xiangtan University Xiangtan411105 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering The University of British Columbia VancouverBCV6T 1Z4 Canada
For mission-critical massive machine-type communications (mMTC) applications, the messages are required to be delivered in real-time. However, due to the weak security protection capabilities of the low-cost and low-c... 详细信息
来源: 评论
Deepfake Detection: A Comprehensive Survey from the Reliability Perspective
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tianyi Liao, Xin Chow, Kam Pui Lin, Xiaodong Wang, Yinglong Department of Computer Science The University of Hong Kong Hong Kong College of Computer Science and Electronic Engineering Hunan University China School of Computer Science University of Guelph Canada Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China
The mushroomed Deepfake synthetic materials circulated on the internet have raised a profound social impact on politicians, celebrities, and individuals worldwide. In this survey, we provide a thorough review of the e... 详细信息
来源: 评论
A Low-Resolution Video Action Recognition Approach Based on Multi-Scale Reconstruction and Multi-Modal Fusion
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Zheng, Hui Zhao, Yesheng Zhang, Bo Shang, Guoqiang Al-Shamri, Mohammad Yahya H. Aldossary, Haya Anhui University School of Internet Hefei230031 China Chinese Academy of Sciences Hefei Institute of Technology Innovation and Engineering Hefei230094 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Kunming650221 China Chinese Academy of Sciences Aerospace Information Research Institute Beijing100094 China Non Commissioned Officer School of Space Engineering University Beijing101416 China King Khalid University School of Computer Science Abha36311 Saudi Arabia Imam Abdulrahman Bin Faisal University Department of Computer Science Jubail31961 Saudi Arabia
The challenge of low-resolution video action recognition task lies in recovering and extracting feature representations that can effectively capture action characteristics with limited semantic information. In this pa... 详细信息
来源: 评论