咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 80 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 38 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 16 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 物理学
    • 1 篇 化学
  • 9 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 军事学

主题

  • 8 篇 semantics
  • 6 篇 privacy
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 social networkin...
  • 4 篇 security
  • 3 篇 transformers
  • 3 篇 servers
  • 3 篇 differential pri...
  • 3 篇 feature extracti...
  • 3 篇 transforms
  • 3 篇 federated learni...
  • 3 篇 crowdsourcing
  • 3 篇 synchronization
  • 3 篇 encoding
  • 3 篇 sensors
  • 3 篇 cryptography

机构

  • 8 篇 shandong enginee...
  • 8 篇 shandong provinc...
  • 8 篇 key laboratory o...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 5 篇 school of inform...
  • 5 篇 college of compu...
  • 4 篇 school of comput...
  • 4 篇 school of intell...
  • 4 篇 graduate school ...
  • 3 篇 university of pe...
  • 3 篇 college of elect...
  • 2 篇 computer science...
  • 2 篇 school of comput...
  • 2 篇 faculty of compu...
  • 2 篇 school of inform...
  • 2 篇 applied laborato...
  • 2 篇 college of engin...
  • 2 篇 school of comput...
  • 2 篇 eastern michigan...

作者

  • 8 篇 jing zhao
  • 5 篇 mohammad alauthm...
  • 5 篇 rongxing lu
  • 5 篇 fathi amsaad
  • 5 篇 yunguo guan
  • 5 篇 ammar almomani
  • 4 篇 yushui geng
  • 4 篇 ronghuan zhang
  • 4 篇 ming li
  • 4 篇 qingzhi zou
  • 3 篇 yantao yu
  • 3 篇 ellen z. zhang
  • 3 篇 abdul razaque
  • 3 篇 xishan ma
  • 3 篇 huanxiao zhou
  • 3 篇 munther abualkib...
  • 3 篇 almomani ammar
  • 3 篇 chen zhixiong
  • 3 篇 alauthman mohamm...
  • 2 篇 ahmad al-qerem

语言

  • 76 篇 英文
  • 4 篇 其他
检索条件"机构=School of Information Security&Applied Computing"
80 条 记 录,以下是1-10 订阅
排序:
The Emergent Role of Artificial Intelligence as Tool in Conducting Academic Research  16
The Emergent Role of Artificial Intelligence as Tool in Cond...
收藏 引用
16th International Conference on Society and information Technologies, ICSIT 2025
作者: Ferdousi, Bilquis School of Information Security and Applied Computing College of Engineering and Technology Eastern Michigan University YpsilantiMI United States
Academic and non-academic research institutes are the two key global sectors that are accomplishing the research agenda. This paper focuses on the implications of using AI tools in academic research. Academic institut... 详细信息
来源: 评论
Detecting Phishing Websites Based on Machine Learning Techniques  1st
Detecting Phishing Websites Based on Machine Learning Techni...
收藏 引用
1st International Conference on Advances in computing Research, ACR’23
作者: Veach, Alexander Abualkibash, Munther School of Information Security and Applied Computing Eastern Michigan University YpsilantiMI48197 United States
Phishing is one of the most common threats to cybersecurity in the modern world. It is to this regard many look to emergent technologies such as artificial intelligence and machine learning as preventative measures. B... 详细信息
来源: 评论
information-Centric IoT-Based Smart Farming with Dynamic Data Optimization
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3865-3880页
作者: Souvik Pal Hannah VijayKumar D.Akila N.Z.Jhanjhi Omar A.Darwish Fathi Amsaad Department of Computer Science and Engineering Sister Nivedita UniversityKolkataIndia Post Doctoral Researcher Sambalpur UniversitySambalpurIndia Department of Computer Science Anna Adarsh College for WomenChennaiIndia Department of Information Technology Vels Institute of ScienceTechnology and Advanced StudiesChennaiIndia School of Computer Science and Engineering SCETaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubang Jaya47500SelangorMalaysia Department of Information Security and Applied Computing Eastern Michigan UniversityUSA School of Information Security and Applied Computing Eastern Michigan UniversityUSA
Smart farming has become a strategic approach of sustainable agriculture management and monitoring with the infrastructure to exploit modern technologies,including big data,the cloud,and the Internet of Things(IoT).Ma... 详细信息
来源: 评论
Applying Digital Technology in Writing Intensive Class in Cyber security and information Technology Programs Identifying Technical and Psychological Issues  26
Applying Digital Technology in Writing Intensive Class in Cy...
收藏 引用
26th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2022
作者: Ferdousi, Bilquis School of Information Security and Applied Computing Eastern Michigan University YpsilantiMI48197 United States
This paper studies how to improve students’ technical and academic writing skills by applying digital technology, and identifying the effect of technical and psychological factors. The specific purposes of the study ... 详细信息
来源: 评论
A Communication-efficient Conjunctive Query Scheme under Local Differential Privacy
A Communication-efficient Conjunctive Query Scheme under Loc...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Ellen Z. Guan, Yunguo Lu, Rongxing Zhang, Harry University of New Brunswick Faculty of Computer Science FrederictonE3B5A3 Canada Eastern Michigan University School of Information Security and Applied Computing YpsilantiMI48197 United States
Crowdsourcing has become a widely used method for data collection and analysis, yet its privacy remains a challenge. In this paper, we present a new efficient and privacy-preserving conjunctive query scheme for crowds... 详细信息
来源: 评论
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5607-5623页
作者: Abdallah Elhigazi Abdallah Mosab Hamdan Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih Faculty of Engineering Future UniversityKhartoum 10553Sudan Faculty of Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400Malaysia Information Assurance and Security Research School of ComputingUniversiti Teknologi MalaysiaJohor81310Malaysia School of Psychology and Computer Science University of Central LancashirePreston PR12HEUK Deaptement of Management Information Systems College of Administrative ScienceApplied Science UniversityAl Eker623Bahrain Deaptement of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh11461Saudi Arabia
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw... 详细信息
来源: 评论
Privacy-Preserving Electricity Theft Detection Based on Blockchain
收藏 引用
IEEE Transactions on Smart Grid 2023年 第5期14卷 4047-4059页
作者: Zhao, Zhiqiang Liu, Yining Zeng, Zhixin Chen, Zhixiong Zhou, Huiyu Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Fujian Key Laboratory of Financial Information Processing The Key Laboratory of Applied Mathematics of Fujian Province University Putian University Putian351100 China University of Leicester School of Computing and Mathematical Sciences LeicesterLE1 7RH United Kingdom
In most electricity theft detection schemes, consumers' power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is... 详细信息
来源: 评论
Efficient Privacy-Preserving Edge-based Dynamic Aggregation Query Over Crowdsensed Data
Efficient Privacy-Preserving Edge-based Dynamic Aggregation ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Yu, Yantao Guan, Yunguo Xue, Xiaoping Lu, Rongxing Tongji University College of Electronic and Information Engineering Shanghai201804 China Eastern Michigan University School of Information Security and Applied Computing YpsilantiMI48197 United States University of New Brunswick Faculty of Computer Science FrederictionNBE3B 5A3 Canada
Aggregation query, which is one of the most crucial data analysis tools applied to vehicular crowdsensed data, is expected to extract valuable insights and support smart decision-making. Meanwhile, the edge servers ar... 详细信息
来源: 评论
A Robust Model for Translating Arabic Sign Language into Spoken Arabic Using Deep Learning
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 2037-2057页
作者: Khalid M.O.Nahar Ammar Almomani Nahlah Shatnawi Mohammad Alauthman Department of Computer Sciences Faculty of Information Technology and Computer SciencesYarmouk University-Irbid21163Jordan School of Computing Skyline University CollegeSharjahP.O.Box 1797United Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
This study presents a novel and innovative approach to auto-matically translating Arabic Sign Language(ATSL)into spoken *** proposed solution utilizes a deep learning-based classification approach and the transfer lea... 详细信息
来源: 评论
A Review of Lightweight security and Privacy for Resource-Constrained IoT Devices
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论