咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 35 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 38 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 16 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 物理学
    • 1 篇 化学
  • 9 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 军事学

主题

  • 8 篇 semantics
  • 6 篇 privacy
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 social networkin...
  • 4 篇 security
  • 3 篇 transformers
  • 3 篇 servers
  • 3 篇 differential pri...
  • 3 篇 feature extracti...
  • 3 篇 transforms
  • 3 篇 federated learni...
  • 3 篇 artificial intel...
  • 3 篇 crowdsourcing
  • 3 篇 synchronization
  • 3 篇 encoding
  • 3 篇 sensors

机构

  • 8 篇 shandong enginee...
  • 8 篇 shandong provinc...
  • 8 篇 key laboratory o...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 5 篇 school of inform...
  • 5 篇 college of compu...
  • 4 篇 school of comput...
  • 4 篇 school of intell...
  • 4 篇 graduate school ...
  • 3 篇 university of pe...
  • 3 篇 college of elect...
  • 2 篇 computer science...
  • 2 篇 school of comput...
  • 2 篇 faculty of compu...
  • 2 篇 school of inform...
  • 2 篇 applied laborato...
  • 2 篇 college of engin...
  • 2 篇 school of comput...
  • 2 篇 eastern michigan...

作者

  • 8 篇 jing zhao
  • 5 篇 mohammad alauthm...
  • 5 篇 rongxing lu
  • 5 篇 fathi amsaad
  • 5 篇 yunguo guan
  • 5 篇 ammar almomani
  • 4 篇 yushui geng
  • 4 篇 ronghuan zhang
  • 4 篇 ming li
  • 4 篇 qingzhi zou
  • 3 篇 yantao yu
  • 3 篇 ellen z. zhang
  • 3 篇 abdul razaque
  • 3 篇 xishan ma
  • 3 篇 huanxiao zhou
  • 3 篇 munther abualkib...
  • 3 篇 almomani ammar
  • 3 篇 chen zhixiong
  • 3 篇 alauthman mohamm...
  • 2 篇 ahmad al-qerem

语言

  • 77 篇 英文
  • 4 篇 其他
检索条件"机构=School of Information Security&Applied Computing"
81 条 记 录,以下是1-10 订阅
排序:
The Emergent Role of Artificial Intelligence as Tool in Conducting Academic Research  16
The Emergent Role of Artificial Intelligence as Tool in Cond...
收藏 引用
16th International Conference on Society and information Technologies, ICSIT 2025
作者: Ferdousi, Bilquis School of Information Security and Applied Computing College of Engineering and Technology Eastern Michigan University YpsilantiMI United States
Academic and non-academic research institutes are the two key global sectors that are accomplishing the research agenda. This paper focuses on the implications of using AI tools in academic research. Academic institut... 详细信息
来源: 评论
Hybridization of deep learning models with crested porcupine optimizer algorithm-based cybersecurity detection on industrial IoT for smart city environments
收藏 引用
Alexandria Engineering Journal 2025年 127卷 239-250页
作者: Alzakari, Sarah A. Aljebreen, Mohammed Asiri, Mashael M. MANSOURI, Wahida Alahmari, Sultan Alqahtani, Mohammed Sorour, Shaymaa Bedewi, Wafi Department of Computer Sciences College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science Community College King Saud University P.O. Box 28095 Riyadh11437 Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science and Information Technology Faculty of Sciences and arts Turaif Northern Border University Arar91431 Saudi Arabia Cybersecurity Institute Riyadh Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Management Information Systems School of Business King Faisal University Al-Ahsa31982 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Smart cities have attracted extensive coverage from multidisciplinary studies, and many artificial intelligence (AI) solutions have been designed. Conversely, cybersecurity has constantly been a crucial issue and is b... 详细信息
来源: 评论
Dataset Evaluation Framework for Secure Electric Vehicle Systems
Dataset Evaluation Framework for Secure Electric Vehicle Sys...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Alauthman Ghadeer Albesani Ashraf Mashaleh Ammar Almomani Amjad Aldweesh Department of Information Security University of Petra Jordan King Abdullah II School of Information Technology Jordan University Jordan Al-Balqa Applied University Al-Salt Jordan Department of Computer Information Science Higher Colleges of Technology Al-Balqa UAE Applied University Jordan College of computing and IT Shaqra University Shaqra Saudi Arabia
Intrusion Detection Systems (IDS) play a critical role in safeguarding connected vehicular systems and Electric Vehicle Supply Equipment (EVSE) infrastructures against evolving cyber threats. The effectiveness of thes... 详细信息
来源: 评论
Background subtraction based on tensor Robust principal component analysis with side information
收藏 引用
Signal, Image and Video Processing 2025年 第8期19卷 1-11页
作者: Xu, Xin Chen, Lixia Wang, Xuewen School of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and Computation Guilin University of Electronic Technology Guilin People’s Republic of China Center for Applied Mathematics of Guangxi (GUET) Guilin People’s Republic of China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
In the field of video image processing, moving target detection remains a hot topic. To address the limitations of existing methods in complex environments, This paper proposes a novel TRPCA model based on Tensor Sing...
来源: 评论
A Survey on Decentralized Identifiers and Verifiable Credentials
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Mazzocca, Carlo Acar, Abbas Uluagac, Selcuk Montanari, Rebecca Bellavista, Paolo Conti, Mauro University of Salerno Department of Information and Electrical Engineering and Applied Mathematics Fisciano84084 Italy Florida International University Cyber-Physical Systems Security Lab School of Computing and Information Science MiamiFL33174 United States University of Bologna Department of Computer Science and Engineering Bologna40136 Italy University of Padua Department of Mathematics Padua35131 Italy
Digital identity has always been one of the keystones for implementing secure and trustworthy communications among parties. The ever-evolving digital landscape has undergone numerous technological transformations that... 详细信息
来源: 评论
SEDNet: Synergistic Learning Network with Embedded Encoder and Dense Atrous Convolution for Vehicle Re-identification
收藏 引用
Alexandria Engineering Journal 2025年 128卷 297-305页
作者: Mingfu Xiong Tanghao Gui Zhihong Sun Saeed Anwar Aziz Alotaibi Khan Muhammad School of Computer Science and Artificial Intelligence Wuhan Textile University Wuhan 430200 China Department of Information Security Naval University of Engineering Wuhan 430030 China The University of Western Australia (UWA) Crawley 6009 Australia Department of Computer Science College of Computing and Information Technology Taif University Taif 21974 Saudi Arabia Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab) Department of Applied Artificial Intelligence College of Computing and Informatics Sungkyunkwan University Seoul 03063 South Korea
To address the issue of information redundancy (such as color and vehicle model) caused by excessive emphasis on local features in vehicle re-identification, this paper proposes a Synergistic Learning Network with Emb... 详细信息
来源: 评论
On the -differential spectra of two classes of power functions over finite fields
收藏 引用
Applicable Algebra in Engineering, Communication and computing 2025年 1-30页
作者: Liu, Qian Huang, Zhiwei Chen, Zhixiong Jiang, Rong Zhang, Liupiao Key Laboratory of Information Security of Network Systems College of Computer and Data Science Fuzhou University Fuzhou China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics Kunming China Fujian Key Laboratory of Financial Information Processing Putian University Putian China School of Computer Science and Technology Dongguan University of Technology Dongguan China
Recently, a new concept called multiplicative differential was introduced by Ellingsen et al. [7]. As an extension of the differential uniformity, it is theoretically appealing to determine the properties of c-differe...
来源: 评论
Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
收藏 引用
Computers, Materials & Continua 2018年 第9期56卷 447-465页
作者: Daofeng Li Mingxing Luo Bowen Zhao Xiangdong Che School of Computer Electrical and informationGuang Xi UniversityNanning530004China Information Security and National Computing Grid Laboratory Southwest Jiaotong UniversityChengdu610031China Guangxi Colleges and Universities Key Laboratory of Multimedia Communications and Information Processing Guangxi UniversityNanning530004China School of Information Security&Applied Computing College of TechnologyEastern Michigan UniversityMichigan48197USA
The secure issues of APK are very important in Android *** order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mechanism(APK-SA... 详细信息
来源: 评论
A Hybrid Deep Learning Paradigm for Robust Feature Extraction and Classification for Cataracts
Applied AI Letters
收藏 引用
applied AI Letters 2025年 第2期6卷
作者: Ramakrishnan, Akshay Bhuvaneswari Madavan, Mukunth Manikandan, R. Gandomi, Amir H. Department of Applied Mathematics and Statistics Johns Hopkins University Baltimore MD United States Mukunth Madhavan AI Security Engineer Banglore India School of Computing SASTRA Deemed University Thanjavur India Faculty of Engineering & Information Technology University of Technology Sydney Sydney Australia University Research and Innovation Center (EKIK) Óbuda University Budapest Hungary Department of Computer Science Khazar University Baku Azerbaijan
The study suggests using a hybrid convolutional neural networks-support vector machines architecture to extract reliable characteristics from medical images and classify them as an ensemble using four different models... 详细信息
来源: 评论
Detecting Phishing Websites Based on Machine Learning Techniques  1st
Detecting Phishing Websites Based on Machine Learning Techni...
收藏 引用
1st International Conference on Advances in computing Research, ACR’23
作者: Veach, Alexander Abualkibash, Munther School of Information Security and Applied Computing Eastern Michigan University YpsilantiMI48197 United States
Phishing is one of the most common threats to cybersecurity in the modern world. It is to this regard many look to emergent technologies such as artificial intelligence and machine learning as preventative measures. B... 详细信息
来源: 评论