咨询与建议

限定检索结果

文献类型

  • 446 篇 期刊文献
  • 376 篇 会议
  • 4 册 图书

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 611 篇 工学
    • 460 篇 计算机科学与技术...
    • 382 篇 软件工程
    • 159 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 75 篇 电气工程
    • 68 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 45 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 光学工程
    • 24 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 安全科学与工程
  • 305 篇 理学
    • 176 篇 数学
    • 77 篇 生物学
    • 58 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 22 篇 化学
  • 158 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 49 篇 医学
    • 44 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
    • 17 篇 药学(可授医学、理...
  • 33 篇 法学
    • 22 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 11 篇 军事学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 26 篇 authentication
  • 24 篇 deep learning
  • 24 篇 cryptography
  • 15 篇 internet of thin...
  • 14 篇 feature extracti...
  • 13 篇 security
  • 13 篇 training
  • 12 篇 image segmentati...
  • 12 篇 machine learning
  • 11 篇 blockchain
  • 10 篇 object detection
  • 10 篇 accuracy
  • 10 篇 cloud computing
  • 10 篇 privacy
  • 9 篇 computational mo...
  • 9 篇 protocols
  • 9 篇 federated learni...
  • 9 篇 encryption
  • 8 篇 security of data
  • 8 篇 optimization

机构

  • 26 篇 security enginee...
  • 20 篇 key lab of infor...
  • 18 篇 department of el...
  • 14 篇 state key labora...
  • 10 篇 department of co...
  • 10 篇 cyber security d...
  • 9 篇 guangxi key lab ...
  • 8 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 lab-sticc umr cn...
  • 8 篇 department of co...
  • 8 篇 department of in...
  • 8 篇 computer science...
  • 8 篇 key laboratory o...
  • 7 篇 peng cheng labor...
  • 7 篇 key lab. of netw...
  • 7 篇 riphah school of...
  • 7 篇 key lab of netwo...
  • 6 篇 royal stoke univ...

作者

  • 16 篇 walid el-shafai
  • 12 篇 el-shafai walid
  • 10 篇 naglaa f.soliman
  • 9 篇 zheng qinghua
  • 9 篇 tan zuowen
  • 8 篇 el-samie fathi e...
  • 8 篇 yang jian
  • 8 篇 meng deyu
  • 8 篇 muhammad adnan k...
  • 8 篇 taher m.ghazal
  • 7 篇 zhang lei
  • 7 篇 wang wei
  • 7 篇 hu yupu
  • 7 篇 abeer d.algarni
  • 7 篇 pais alwyn r.
  • 6 篇 li yang
  • 6 篇 quist-aphetsi ke...
  • 6 篇 xiaohong guan
  • 6 篇 sagheer abbas
  • 6 篇 nana laurent

语言

  • 739 篇 英文
  • 67 篇 其他
  • 21 篇 中文
检索条件"机构=Network & Information Security Lab. Department of Computer Science and Technology"
826 条 记 录,以下是1-10 订阅
排序:
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Controllab.e False Data Injection Attack  5th
Controllable False Data Injection Attack
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Kokkonda, Jayasree Jahnavi, M. Department of Information Technology G. Narayanamma Institute of Technology and Science Hyderabad India Department of Computer Network and Information Security Narayanamma Institute of Technology and Science Hyderabad India
Yet the Internet of Things continues to grow significantly. A cyber-physical system faces a variety of security challenges due to the network connections made by the various kinds of devices and large systems that mak... 详细信息
来源: 评论
network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders(E-HAE)
收藏 引用
computer Systems science & Engineering 2023年 第9期46卷 3261-3284页
作者: Lelisa Adeba Jilcha Deuk-Hun Kim Julian Jang-Jaccard Jin Kwak ISAA Lab. Department of AI Convergence NetworkAjou UniversitySuwon16499Korea ISAA Lab. Institute for Information and CommunicationAjou UniversitySuwon16499Korea Department of Computer Science and Information Technology Massey UniversityAuckland0745New Zealand Department of Cyber Security Ajou UniversitySuwon16499Korea
Contemporary attackers,mainly motivated by financial gain,consistently devise sophisticated penetration techniques to access important information or *** growing use of Internet of Things(IoT)technology in the contemp... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Endogenous security of FQn networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area networks (HAN) and Neighborhood Area networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
Enhancing TrUStAPIS Methodology in the Web of Things with LLM-Generated IoT Trust Semantics  26th
Enhancing TrUStAPIS Methodology in the Web of Things with LL...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Ferraris, Davide Kotis, Konstantinos Kalloniatis, Christos Network Information and Computer Security Lab University of Malaga Malaga Spain Department of Cultural Technology and Communication University of the Aegean Mytilene Greece
In the Internet of Things (IoT) there are ecosystems where their physical’smart’ entities virtually interact with each other. Often, this interaction occurs among unknown entities, making trust an essential requirem... 详细信息
来源: 评论
A study on the Application of Multilevel Secure Hash Function in Blockchain  2
A study on the Application of Multilevel Secure Hash Functio...
收藏 引用
2022 2nd Conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Jin, Shi-Mei Wang, Yi-Han Li, Yongzhen Yanbian University Information Technology Education Yanji133000 China Yanbian University Network Communication and Information Security Lab. Dept. of Computer Science and Technology Yanji133000 China
With the rapid development and upgrade of the social network and IT, information security has become increasingly significant. Hash function has become a research key-point in the field of information security. To mee... 详细信息
来源: 评论
New results on quantum boomerang attacks
收藏 引用
Quantum information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论