咨询与建议

限定检索结果

文献类型

  • 446 篇 期刊文献
  • 376 篇 会议
  • 4 册 图书

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 611 篇 工学
    • 460 篇 计算机科学与技术...
    • 382 篇 软件工程
    • 159 篇 信息与通信工程
    • 77 篇 控制科学与工程
    • 75 篇 电气工程
    • 68 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 45 篇 生物医学工程(可授...
    • 42 篇 网络空间安全
    • 41 篇 机械工程
    • 29 篇 光学工程
    • 24 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 安全科学与工程
  • 305 篇 理学
    • 176 篇 数学
    • 77 篇 生物学
    • 58 篇 物理学
    • 52 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 22 篇 化学
  • 158 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 62 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 49 篇 医学
    • 44 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 公共卫生与预防医...
    • 17 篇 药学(可授医学、理...
  • 33 篇 法学
    • 22 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 11 篇 军事学
  • 8 篇 教育学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 26 篇 authentication
  • 24 篇 deep learning
  • 23 篇 cryptography
  • 15 篇 internet of thin...
  • 14 篇 feature extracti...
  • 13 篇 security
  • 13 篇 training
  • 12 篇 image segmentati...
  • 12 篇 machine learning
  • 11 篇 blockchain
  • 10 篇 object detection
  • 10 篇 accuracy
  • 10 篇 cloud computing
  • 10 篇 privacy
  • 9 篇 computational mo...
  • 9 篇 protocols
  • 9 篇 federated learni...
  • 9 篇 encryption
  • 8 篇 security of data
  • 8 篇 optimization

机构

  • 26 篇 security enginee...
  • 20 篇 key lab of infor...
  • 18 篇 department of el...
  • 14 篇 state key labora...
  • 10 篇 department of co...
  • 10 篇 cyber security d...
  • 9 篇 guangxi key lab ...
  • 8 篇 department of in...
  • 8 篇 department of co...
  • 8 篇 computer network...
  • 8 篇 lab-sticc umr cn...
  • 8 篇 department of co...
  • 8 篇 department of in...
  • 8 篇 computer science...
  • 8 篇 key laboratory o...
  • 7 篇 peng cheng labor...
  • 7 篇 key lab. of netw...
  • 7 篇 riphah school of...
  • 7 篇 key lab of netwo...
  • 6 篇 royal stoke univ...

作者

  • 17 篇 walid el-shafai
  • 12 篇 el-shafai walid
  • 10 篇 naglaa f.soliman
  • 9 篇 zheng qinghua
  • 9 篇 tan zuowen
  • 8 篇 el-samie fathi e...
  • 8 篇 yang jian
  • 8 篇 meng deyu
  • 8 篇 muhammad adnan k...
  • 8 篇 taher m.ghazal
  • 7 篇 zhang lei
  • 7 篇 wang wei
  • 7 篇 hu yupu
  • 7 篇 abeer d.algarni
  • 7 篇 pais alwyn r.
  • 6 篇 li yang
  • 6 篇 quist-aphetsi ke...
  • 6 篇 xiaohong guan
  • 6 篇 sagheer abbas
  • 6 篇 nana laurent

语言

  • 739 篇 英文
  • 67 篇 其他
  • 21 篇 中文
检索条件"机构=Network & Information Security Lab. Department of Computer Science and Technology"
826 条 记 录,以下是81-90 订阅
排序:
Evading IoT Intrusion Detection Systems with GAN
Evading IoT Intrusion Detection Systems with GAN
收藏 引用
Asia Joint Conference on information security (Asia JCIS)
作者: Mariama Mbow Rodrigo Roman Takeshi Takahashi Kouichi Sakurai Department of Informatics Kyushu University Japan Network Information and Computer Security (NICS) Lab University of Malaga Spain National Institute of Information and Communications Technology Tokyo Japan
network intrusion detection systems are essential tools used in cybersecurity to detect malicious traffic. They are used in the Internet of Things (IoT) to monitor the network traffic and identify infected IoT devices... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
A Comparative Study for Predicting Burned Areas of a Forest Fire Using Soft Computing Techniques  2nd
A Comparative Study for Predicting Burned Areas of a Forest ...
收藏 引用
2nd International Conference on Data science, Machine Learning and Applications, ICDSMLA 2020
作者: Al-Shourbaji, Ibrahim Alhameed, Mohammed Katrawi, Anwer Jeribi, Fathe Alim, Sophia Department of Computer and Network Engineering Computer Science and Information Technology College Jazan University Jazan82822-6649 Saudi Arabia Department of Computer Science Computer Science and Information Technology College Jazan University Jazan82822-6649 Saudi Arabia Faculty Member Academic Development Deanship Jazan University Jazan82822-6649 Saudi Arabia Department of Information Technology and Security Computer Science and Information Technology College Jazan University Jazan82822-6649 Saudi Arabia Independent Researcher Bradford United Kingdom
Forest fires is an important environmental disasters that have many consequences in our life. As a result, early forecasting and rapid action of fires are needed to control such a phenomenon and saving lives. In this ... 详细信息
来源: 评论
Lattice-Based Cryptography and NTRU: Quantum-Resistant Encryption Algorithms  4
Lattice-Based Cryptography and NTRU: Quantum-Resistant Encry...
收藏 引用
4th International Conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Nisha, F. Lenin, J. Saravanan, S.K. Rohit, V. Robin Selvam, P.D. Rajmohan, M. Cmr University School of Engineering and Technology Computer Science & Engineering Karnataka Bengaluru India Alliance University Alliance College of Engineering and Design Department of Computer Science & Engineering Karnataka Bengaluru India Simats Saveetha School of Engineering Department of BigData and Network Security Tamil Nadu Chennai India Presidency University Computer Science & Engineering School of Computer Science & Engineering and Information Science Karnataka Bengaluru India Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Hindustan Institute of Technology and Science Department of Electronics and Communication Engineering Tamil Nadu Chennai India
The quantum-resistant qualities of various encryption methods, such as N-th degree Truncated polynomial Ring Units (NTRU) Encrypt, NTRU Sign, Ring-Lizard, and Kyber protocols are becoming more important in light of th... 详细信息
来源: 评论
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System  10
Trajectory Privacy Protection with Pricing Awareness on Ride...
收藏 引用
10th IEEE International Conference on Cyber security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalab.e Cloud, CSCloud-EdgeCom 2023
作者: Jia, Sihui Long, Saiqin Zheng, Zhirun Deng, Qingyong Wang, Ping Tian, Shujuan Xiangtan University School of Computer Science and School of Cyberspace Science Hunan International Scientific and Technological Cooperation Base of Intelligent network Xiangtan China Jinan University School of Information Science and Technology Guangzhou China Xiangtan University School of Mathematics and Compulational Science Xiangtan China Guangxi Normal University Guangxi Key Lab of Multi-source Information Mining and Security Guilin China
With the widespread use of the Ride-on Demand (RoD) system, many privacy issues have been exposed, and there is growing concern about whether private information will be leaked. For this problem, our previous work add... 详细信息
来源: 评论
Integration of MPC into Besu through an extended private transaction model
Integration of MPC into Besu through an extended private tra...
收藏 引用
Metaverse Computing, networking and Applications (MetaCom), IEEE International Conference on
作者: Daniel Morales Isaac Agudo Javier Lopez Department of Computer Science Network Information and Computer Security Lab ITIS Software Universidad de Málaga Málaga Spain
In the last few years we have seen many different approaches to incorporate privacy features to blockchains. In the area of cryptocurrencies that would normally mean protecting the identity of the owner of some funds,...
来源: 评论
Proposed Different Signal Processing Tools for Efficient Optical Wireless Communications
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3293-3318页
作者: Hend Ibrahim Abeer D.Algarni Mahmoud Abdalla Walid El-Shafai Fathi E.Abd El-Samie Naglaa F.Soliman Department of Electronics and Communications Engineering Faculty of EngineeringZagazig UniversityZagazig44519Egypt Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenoufia32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh 11586Saudi Arabia
Optical Wireless Communication(OWC)is a new trend in communication systems to achieve large bandwidth,high bit rate,high security,fast deployment,and low *** basic idea of the OWC is to transmit data on unguided media... 详细信息
来源: 评论
Convolutional Neural network Based Intelligent Handwritten Document Recognition
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 4563-4581页
作者: Sagheer Abbas Yousef Alhwaiti Areej Fatima Muhammad A.Khan Muhammad Adnan Khan Taher M.Ghazal Asma Kanwal Munir Ahmad Nouh Sabri Elmitwally School of Computer Science National College of Business administration and EconomicsLahore54000Pakistan College of Computer and Information Sciences Jouf UniversitySakaka72341Saudi Arabia Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of SoftwareGachon UniversitySeongnam13557Korea Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Bangi 43600SelangorMalaysia School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE Department of Computer Science GC UniversityLahorePakistan Department of Computer Science Faculty of Computers and Artificial IntelligenceCairo University12613Egypt
This paper presents a handwritten document recognition system based on the convolutional neural network *** today’s world,handwritten document recognition is rapidly attaining the attention of researchers due to its ... 详细信息
来源: 评论
An Ensemble of CapsNet and KSVM Using Feature Fusion: Application to COVID-19 Detection  3
An Ensemble of CapsNet and KSVM Using Feature Fusion: Applic...
收藏 引用
3rd International Conference on Pattern Recognition and Machine Learning, PRML 2022
作者: Aggrey, Esther Stacy E. B. Zhen, Qin Kodjiku, Seth Larweh Aidoo, Evans Fiasam, Linda Delali Mensah, Acheampong Edward University of Electronic Science & Technology of China School of Information & Software Engineering Chengdu China University of Electronic Science & Technology of China School of Information & Software Engineering Network and Data Security Key Lab of Sichuan Province Chengdu China Zhejiang Gongshang University School of Computer & Information Engineering Hangzhou China
COVID-19 virus is a major worldwide pandemic that is growing at a fast pace throughout the world. The usual approach for diagnosing COVID-19 is the use of a real-time polymerase chain reaction (RT-PCR) based nucleic a... 详细信息
来源: 评论
Wireless modulation classification based on Radon transform and convolutional neural networks
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 6263-6272页
作者: Ghanem, Hanan S. Al-Makhlasawy, Rasha M. El-Shafai, Walid Elsabrouty, Maha Hamed, Hesham F. A. Salama, Gerges M. El-Samie, Fathi E. Abd Department of Electrical Engineering Faculty of Engineering Minia University Minia61111 Egypt Department of Computers and Systems Electronics Research Institute Cairo Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Electronics and Communications Engineering Egypt-Japan University of Science and Technology Alexandria Egypt Faculty of Engineering Egyptian-Russian University Cairo Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Convolutional Neural networks (CNNs) are efficient tools for pattern recognition applications. They have found applications in wireless communication systems such as modulation classification from constellation d... 详细信息
来源: 评论