咨询与建议

限定检索结果

文献类型

  • 446 篇 期刊文献
  • 376 篇 会议
  • 4 册 图书

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 611 篇 工学
    • 460 篇 计算机科学与技术...
    • 382 篇 软件工程
    • 159 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 75 篇 电气工程
    • 68 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 45 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 光学工程
    • 24 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 安全科学与工程
  • 305 篇 理学
    • 176 篇 数学
    • 77 篇 生物学
    • 58 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 22 篇 化学
  • 158 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 49 篇 医学
    • 44 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
    • 17 篇 药学(可授医学、理...
  • 33 篇 法学
    • 22 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 11 篇 军事学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 26 篇 authentication
  • 24 篇 deep learning
  • 23 篇 cryptography
  • 15 篇 internet of thin...
  • 14 篇 feature extracti...
  • 13 篇 security
  • 13 篇 training
  • 12 篇 image segmentati...
  • 12 篇 machine learning
  • 11 篇 blockchain
  • 10 篇 object detection
  • 10 篇 accuracy
  • 10 篇 cloud computing
  • 10 篇 privacy
  • 9 篇 computational mo...
  • 9 篇 protocols
  • 9 篇 federated learni...
  • 9 篇 encryption
  • 8 篇 security of data
  • 8 篇 optimization

机构

  • 26 篇 security enginee...
  • 20 篇 key lab of infor...
  • 18 篇 department of el...
  • 14 篇 state key labora...
  • 10 篇 department of co...
  • 10 篇 cyber security d...
  • 9 篇 guangxi key lab ...
  • 8 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 lab-sticc umr cn...
  • 8 篇 department of co...
  • 8 篇 department of in...
  • 8 篇 computer science...
  • 8 篇 key laboratory o...
  • 7 篇 peng cheng labor...
  • 7 篇 key lab. of netw...
  • 7 篇 riphah school of...
  • 7 篇 key lab of netwo...
  • 6 篇 royal stoke univ...

作者

  • 17 篇 walid el-shafai
  • 12 篇 el-shafai walid
  • 10 篇 naglaa f.soliman
  • 9 篇 zheng qinghua
  • 9 篇 tan zuowen
  • 8 篇 el-samie fathi e...
  • 8 篇 yang jian
  • 8 篇 meng deyu
  • 8 篇 muhammad adnan k...
  • 8 篇 taher m.ghazal
  • 7 篇 zhang lei
  • 7 篇 wang wei
  • 7 篇 hu yupu
  • 7 篇 abeer d.algarni
  • 7 篇 pais alwyn r.
  • 6 篇 li yang
  • 6 篇 quist-aphetsi ke...
  • 6 篇 xiaohong guan
  • 6 篇 sagheer abbas
  • 6 篇 nana laurent

语言

  • 739 篇 英文
  • 67 篇 其他
  • 21 篇 中文
检索条件"机构=Network & Information Security Lab. Department of Computer Science and Technology"
826 条 记 录,以下是11-20 订阅
排序:
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Task Offloading and Resource Allocation Based on Reinforcement Learning and Load Balancing in Vehicular networking
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 2217-2230页
作者: Tian, Shujuan Xiang, Shuhuan Zhou, Ziqi Dai, Haipeng Yu, Enze Deng, Qingyong Xiangtan University Key Laboratory of Hunan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent network School of Computer Science and School of Cyberspace Security Xiangtan411105 China Nanjing University School of Computer Science and Technology Nanjing211189 China Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin541004 China
Due to limited on-board resources and the mobility characteristics of vehicles in a multi-access edge computing (MEC)-based vehicular network, efficient task offloading and resource allocation schemes are essential fo... 详细信息
来源: 评论
Phishing Classification Based on Text Content of an Email Body Using Transformers
Phishing Classification Based on Text Content of an Email Bo...
收藏 引用
International Conference on information security, Privacy, and Digital Forensics, 2022
作者: Somesha, M. Pais, Alwyn R. Department of Computer Science and Engineering Information Security Research Lab National Institute of Technology Karnataka Surathkal575025 India
Phishing attacks steal sensitive credentials using different techniques, tools, and some sophisticated methods. The techniques include content injection, information re-routing, social engineering, server hacking, soc... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
2023 IEEE International Conference on Metaverse Computing, networking and Applications, MetaCom 2023
作者: Morales, Daniel Agudo, Isaac Lopez, Javier Itis Software Universidad de Málaga Network Information and Computer Security Lab Department of Computer Science Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
GPGPU-based randomized visual secret sharing (GRVSS) for grayscale and colour images
收藏 引用
International Journal of computers and Applications 2022年 第6期44卷 552-560页
作者: Holla, Raviraja Mhala, Nikhil C. Pais, Alwyn R. Information Security Research Lab Department of Computer Science and Engg National Institute of Technology Karnataka Surathkal India
Visual Secret Sharing (VSS) is a technique used for sharing secret images between users. The existing VSS schemes reconstruct the original secret image as a halftone image with only a 50% contrast. The Randomized Visu... 详细信息
来源: 评论
Neural network-Based State Estimation for Nonlinear Systems With Denial-of-Service Attack Under Try-Once-Discard Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第10期11卷 2182-2184页
作者: Xueli Wang Shangwei Zhao Ming Yang Xin Wang Xiaoming Wu the Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan 250014 Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250014China Department of Automation Shanghai Jiao Tong UniversityShanghai 200240China
Dear Editor,This letter deals with state estimation issues of discrete-time nonlinear systems subject to denial-of-service(DoS)attacks under the try-once-discard(TOD)*** specifically,to reduce the communication burden... 详细信息
来源: 评论
A deep learning fusion model for accurate classification of brain tumours in Magnetic Resonance images
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 790-804页
作者: Nechirvan Asaad Zebari Chira Nadheef Mohammed Dilovan Asaad Zebari Mazin Abed Mohammed Diyar Qader Zeebaree Haydar Abdulameer Marhoon Karrar Hameed Abdulkareem Seifedine Kadry Wattana Viriyasitavat Jan Nedoma Radek Martinek Department of Information Technology Lebanese French UniversityErbilIraq Department of Computer Science University of ZakhoZakhoKurdistan RegionIraq Department of Computer Science College of ScienceNawroz UniversityDuhokKurdistan RegionIraq Department of Artificial Intelligence College of Computer Science and Information TechnologyUniversity of AnbarRamadiIraq Department of Telecommunications VSB‐Technical University of OstravaOstravaCzech Republic Department of Cybernetics and Biomedical Engineering VSB‐Technical University of OstravaOstravaCzech Republic Department of Computer Network and Information Security Technical College of Informatics-AkreDuhok Polytechnic UniversityDuhokIraq Information and Communication Technology Research Group Scientific Research CenterAl‐Ayen UniversityThi‐QarIraq College of Computer Sciences and Information Technology University of KerbalaKarbalaIraq College of Agriculture Al‐Muthanna UniversitySamawahIraq Department of Applied Data Science Noroff University CollegeKristiansandNorway Faculty of Commerce and Accountancy Chulalongkorn Business SchoolChulalongkorn UniversityBangkokThailand
Detecting brain tumours is complex due to the natural variation in their location, shape, and intensity in images. While having accurate detection and segmentation of brain tumours would be beneficial, current methods... 详细信息
来源: 评论
Enhancing Skin Cancer Diagnosis with Deep Learning:A Hybrid CNN-RNN Approach
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1497-1519页
作者: Syeda Shamaila Zareen Guangmin Sun Mahwish Kundi Syed Furqan Qadri Salman Qadri Faculty of Information Technology Beijing University of TechnologyBeijing100124China Computer Science International Engineering Collage Maynooth UniversityKildareW23 F2H6Irland Research Center for Data Hub and Security Zhejiang LabHangzhou311121China Computer Science Department MNS University of AgricultureMultan59220Pakistan
Skin cancer diagnosis is difficult due to lesion presentation variability. Conventionalmethods struggle to manuallyextract features and capture lesions spatial and temporal variations. This study introduces a deep lea... 详细信息
来源: 评论
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques
收藏 引用
Journal of Cyber security and Mobility 2022年 第3期11卷 279-320页
作者: Somesha, M. Pais, Alwyn R. Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology karnataka Karnataka Surathkal575025 India
Email phishing is a cyber-attack, bringing substantial financial damage to corporate and commercial organizations. A phishing email is a special type of spamming, used to trick the user to disclose personal informatio... 详细信息
来源: 评论