咨询与建议

限定检索结果

文献类型

  • 455 篇 期刊文献
  • 378 篇 会议
  • 4 册 图书

馆藏范围

  • 837 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 622 篇 工学
    • 469 篇 计算机科学与技术...
    • 390 篇 软件工程
    • 165 篇 信息与通信工程
    • 84 篇 电气工程
    • 82 篇 控制科学与工程
    • 68 篇 生物工程
    • 62 篇 电子科学与技术(可...
    • 45 篇 生物医学工程(可授...
    • 45 篇 网络空间安全
    • 42 篇 机械工程
    • 30 篇 光学工程
    • 24 篇 动力工程及工程热...
    • 22 篇 仪器科学与技术
    • 20 篇 安全科学与工程
    • 19 篇 化学工程与技术
  • 307 篇 理学
    • 176 篇 数学
    • 79 篇 生物学
    • 58 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 22 篇 化学
  • 162 篇 管理学
    • 99 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 52 篇 医学
    • 47 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 19 篇 公共卫生与预防医...
    • 17 篇 药学(可授医学、理...
  • 33 篇 法学
    • 22 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 11 篇 军事学
  • 9 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 26 篇 authentication
  • 25 篇 deep learning
  • 23 篇 cryptography
  • 15 篇 internet of thin...
  • 14 篇 feature extracti...
  • 13 篇 security
  • 13 篇 training
  • 12 篇 image segmentati...
  • 12 篇 machine learning
  • 11 篇 blockchain
  • 10 篇 object detection
  • 10 篇 federated learni...
  • 10 篇 accuracy
  • 10 篇 privacy
  • 9 篇 computational mo...
  • 9 篇 protocols
  • 9 篇 encryption
  • 9 篇 cloud computing
  • 8 篇 security of data
  • 8 篇 optimization

机构

  • 26 篇 security enginee...
  • 20 篇 key lab of infor...
  • 18 篇 department of el...
  • 14 篇 state key labora...
  • 10 篇 department of co...
  • 10 篇 cyber security d...
  • 9 篇 guangxi key lab ...
  • 8 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 lab-sticc umr cn...
  • 8 篇 department of co...
  • 8 篇 department of in...
  • 8 篇 computer science...
  • 8 篇 key laboratory o...
  • 7 篇 peng cheng labor...
  • 7 篇 key lab. of netw...
  • 7 篇 riphah school of...
  • 7 篇 key lab of netwo...
  • 6 篇 royal stoke univ...

作者

  • 17 篇 walid el-shafai
  • 12 篇 el-shafai walid
  • 10 篇 naglaa f.soliman
  • 9 篇 zheng qinghua
  • 9 篇 tan zuowen
  • 8 篇 el-samie fathi e...
  • 8 篇 yang jian
  • 8 篇 meng deyu
  • 8 篇 muhammad adnan k...
  • 8 篇 taher m.ghazal
  • 7 篇 zhang lei
  • 7 篇 liu lei
  • 7 篇 wang wei
  • 7 篇 hu yupu
  • 7 篇 abeer d.algarni
  • 7 篇 pais alwyn r.
  • 6 篇 li yang
  • 6 篇 quist-aphetsi ke...
  • 6 篇 xiaohong guan
  • 6 篇 sagheer abbas

语言

  • 720 篇 英文
  • 97 篇 其他
  • 21 篇 中文
检索条件"机构=Network & Information Security Lab. Department of Computer Science and Technology"
837 条 记 录,以下是111-120 订阅
排序:
ToFA: Towards Fault Analysis of GIFT and GIFT-like Ciphers Leveraging Truncated Impossible Differentials
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2025年 第3期2025卷 614-643页
作者: Kundu, Anup Kumar Ghosh, Shibam Aikata, Aikata Saha, Dhiman Indian Statistical Institute Kolkata700108 India Department of Computer Science University Of Haifa Haifa Israel Inria Paris France Institute of Information Security Graz University of Technology Austria de.ci.phe.red Lab Department of Computer Science & Engineering Indian Institute of Technology Chhattisgarh Bhilai491002 India
In this work, we introduce ToFA, the first fault attack (FA) strategy that attempts to leverage the classically well-known idea of impossible differential cryptanalysis to mount practically verifiable attacks on bit-o... 详细信息
来源: 评论
On Covert Communication Performance with Outdated CSI in Wireless Greedy Relay Systems
On Covert Communication Performance with Outdated CSI in Wir...
收藏 引用
作者: Bai, Jiaqing He, Ji Chen, Yanping Shen, Yulong Jiang, Xiaohong Future University Hakodate School of System Information Science Hakodate041-8655 Japan School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China Department of Computer Science and Technology Xi'An University of Posts and Telecommunications Xi'an710121 China
Communication performance relies largely on the availab.lity of channel state information (CSI). This paper investigates the impact of outdated CSI on the achievable covert communication performance in a two-hop wirel... 详细信息
来源: 评论
A Secure Multiparty Quantum Homomorphic Encryption Scheme
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2835-2848页
作者: Jing-Wen Zhang Xiu-Bo Chen Gang Xu Heng-Ji Li Ya-Lan Wang Li-Hua Miao Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan610025China Quantum Technology Lab&Applied Mechanics Group University of MilanMilan20133Italy Department of Computer Science Faculty of Engineering and Physical SciencesUniversity of SurreyGuildfordSurreyGU27XHUnited Kingdom Huawei Technologies Co.Ltd Shenzhen518129China
The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private *** this paper,a novel secure multiparty quantum homomorphic encryption scheme is proposed,wh... 详细信息
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Peijie Xian Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen Univ. Shenzhen China Shaanxi Key Lab. of Information Comm. Network and Security Xi’an Univ. of Posts & Telecomm. Xi’an China School of Information Technology Carleton Univ. Ottawa Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论
Impact of Cloud Computing on Agricultural Advancement using Data Mining Algorithms  2
Impact of Cloud Computing on Agricultural Advancement using ...
收藏 引用
2nd International Conference on Automation, Computing and Renewable Systems, ICACRS 2023
作者: Saravanan, S.K. Nisha, F. Robin Rohit, V. Lenin, J. Selvam, P.D. Rajmohan, M. Department of BigData and Network Security Saveetha School of Engineering SIMATS Tamil Nadu Chennai India School of Engineering and Technology Computer Science & Engineering CMR University Karnataka Bengaluru India Computer Science & Engineering School of Computer Science & Engineering and Information Science Presidency University Karnataka Bengaluru India Department: Computer Science & Engineering Alliance College of Engineering and Design Alliance University Karnataka Bengaluru India Department of Electronics and Communication Engineering Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College Tamil Nadu Chennai India Department of Electronics and Communication Engineering Hindustan Institute of Technology and Science Tamil Nadu Chennai India
Incorporating Internet of Things (IoT) algorithms, Ensemble Learning, and Explainable AI (XAI) into the Reinforcement Learning framework provides a comprehensive solution. The framework's dynamic paradigm for prec... 详细信息
来源: 评论
Federated Online/Offline Remote Data Inspection for Distributed Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Ali, Mohammad Liu, Ximeng The Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran The Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
In edge computing environments, app vendors can cache their data to be shared with their users in many geographically distributed edge servers. However, the cached data is particularly vulnerable to several intentiona... 详细信息
来源: 评论
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective
arXiv
收藏 引用
arXiv 2023年
作者: Seyedi, Zahra Rahmati, Farhad Ali, Mohammad Liu, Ximeng Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Iran Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou350108 China
Edge storage presents a viable data storage alternative for application vendors (AV), offering benefits such as reduced bandwidth overhead and latency compared to cloud storage. However, data cached in edge computing ... 详细信息
来源: 评论
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Communications Based on DRL  100
UAV-RIS-Aided Energy-Efficient and QoS-Aware Emergency Commu...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Hu, Jiawei Ju, Ying Wang, Haoyu Liu, Lei Pei, Qingqi Shee, Y.G. Zhu, Xiaojie Wu, Celimuge University of California Department of Electrical Engineering and Computer Science IrvineCA92697 United States Xidian University Guangzhou Institute of Technology Guangzhou510555 China Xi'an University of Posts Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Universiti Tunku Abdul Rahman Department of Electrical and Electronic Engineering Kajang43000 Malaysia King Abdullah University of Science and Technology Department of Computer Electrical and Mathematical Sciences and Engineering Thuwal239556900 Saudi Arabia The University of Electro-Communications Graduate School of Informatics and Engineering Tokyo182-8585 Japan
Ensuring reliable communication can be incredibly challenging in emergencies due to the breakdown of conventional infrastructure. However, a promising solution is on the horizon: the integration of reconfigurable inte... 详细信息
来源: 评论
An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images
收藏 引用
Journal of Cyber security and Mobility 2021年 第3期10卷 487-510页
作者: Holla, M. Raviraja Pais, Alwyn R. Suma, D. Department of Information and Communication Technology Manipal Institute of Technology Manipal Academy of Higher Education (MAHE) Manipal Karnataka India Information Security Research Lab. Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal India Department of Computer Science and Engineering Manipal Institute of Technology Manipal Academy of Higher Education (MAHE) Manipal Karnataka India
The logistic map is a class of chaotic maps. It is still in use in image cryptography. The logistic map cryptosystem has two stages, namely permutation, and diffusion. These two stages being computationally intensive,... 详细信息
来源: 评论
Alzheimer Disease Detection Empowered with Transfer Learning
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 5005-5019页
作者: Taher M.Ghazal Sagheer Abbas Sundus Munir M.A.Khan Munir Ahmad Ghassan F.Issa Syeda Binish Zahra Muhammad Adnan Khan Mohammad Kamrul Hasan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)43600 BangiSelangorMalaysia School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnam13557Korea
Alzheimer’s disease is a severe neuron disease that damages brain cells which leads to permanent loss of memory also called *** people die due to this disease every year because this is not curable but early detectio... 详细信息
来源: 评论