咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 35 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 38 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 16 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 物理学
    • 1 篇 化学
  • 9 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 军事学

主题

  • 8 篇 semantics
  • 6 篇 privacy
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 social networkin...
  • 4 篇 security
  • 3 篇 transformers
  • 3 篇 servers
  • 3 篇 differential pri...
  • 3 篇 feature extracti...
  • 3 篇 transforms
  • 3 篇 federated learni...
  • 3 篇 artificial intel...
  • 3 篇 crowdsourcing
  • 3 篇 synchronization
  • 3 篇 encoding
  • 3 篇 sensors

机构

  • 8 篇 shandong enginee...
  • 8 篇 shandong provinc...
  • 8 篇 key laboratory o...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 5 篇 school of inform...
  • 5 篇 college of compu...
  • 4 篇 school of comput...
  • 4 篇 school of intell...
  • 4 篇 graduate school ...
  • 3 篇 university of pe...
  • 3 篇 college of elect...
  • 2 篇 computer science...
  • 2 篇 school of comput...
  • 2 篇 faculty of compu...
  • 2 篇 school of inform...
  • 2 篇 applied laborato...
  • 2 篇 college of engin...
  • 2 篇 school of comput...
  • 2 篇 eastern michigan...

作者

  • 8 篇 jing zhao
  • 5 篇 mohammad alauthm...
  • 5 篇 rongxing lu
  • 5 篇 fathi amsaad
  • 5 篇 yunguo guan
  • 5 篇 ammar almomani
  • 4 篇 yushui geng
  • 4 篇 ronghuan zhang
  • 4 篇 ming li
  • 4 篇 qingzhi zou
  • 3 篇 yantao yu
  • 3 篇 ellen z. zhang
  • 3 篇 abdul razaque
  • 3 篇 xishan ma
  • 3 篇 huanxiao zhou
  • 3 篇 munther abualkib...
  • 3 篇 almomani ammar
  • 3 篇 chen zhixiong
  • 3 篇 alauthman mohamm...
  • 2 篇 ahmad al-qerem

语言

  • 77 篇 英文
  • 4 篇 其他
检索条件"机构=School of Information Security&Applied Computing"
81 条 记 录,以下是11-20 订阅
排序:
Applying Digital Technology in Writing Intensive Class in Cyber security and information Technology Programs Identifying Technical and Psychological Issues  26
Applying Digital Technology in Writing Intensive Class in Cy...
收藏 引用
26th World Multi-Conference on Systemics, Cybernetics and Informatics, WMSCI 2022
作者: Ferdousi, Bilquis School of Information Security and Applied Computing Eastern Michigan University YpsilantiMI48197 United States
This paper studies how to improve students’ technical and academic writing skills by applying digital technology, and identifying the effect of technical and psychological factors. The specific purposes of the study ... 详细信息
来源: 评论
Detecting AI-Generated Text in Educational Content: Leveraging Machine Learning and Explainable AI for Academic Integrity
arXiv
收藏 引用
arXiv 2025年
作者: Najjar, Ayat A. Ashqar, Huthaifa I. Darwish, Omar A. Hammad, Eman Faculty of Modern Science Arab American University 13 Zababdeh P.O Box 240 Jenin Palestine Civil Engineering Department Arab American University 13 Zababdeh P.O Box 240 Jenin Palestine Artificial Intelligence Program Fu Foundation School of Engineering and Applied Science Columbia University 500 W 120th St New YorkNY10027 United States Information Security and Applied Computing Eastern Michigan University 900 Oakwood St YpsilantiMI48197 United States iSTAR Lab Engineering Technology & Industrial Distribution Texas A&M University 400 Bizzell St College StationTX77840 United States
This study seeks to enhance academic integrity by providing tools to detect AI-generated content in student work using advanced technologies. The findings promote transparency and accountability, helping educators mai... 详细信息
来源: 评论
information-Centric IoT-Based Smart Farming with Dynamic Data Optimization
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3865-3880页
作者: Souvik Pal Hannah VijayKumar D.Akila N.Z.Jhanjhi Omar A.Darwish Fathi Amsaad Department of Computer Science and Engineering Sister Nivedita UniversityKolkataIndia Post Doctoral Researcher Sambalpur UniversitySambalpurIndia Department of Computer Science Anna Adarsh College for WomenChennaiIndia Department of Information Technology Vels Institute of ScienceTechnology and Advanced StudiesChennaiIndia School of Computer Science and Engineering SCETaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubang Jaya47500SelangorMalaysia Department of Information Security and Applied Computing Eastern Michigan UniversityUSA School of Information Security and Applied Computing Eastern Michigan UniversityUSA
Smart farming has become a strategic approach of sustainable agriculture management and monitoring with the infrastructure to exploit modern technologies,including big data,the cloud,and the Internet of Things(IoT).Ma... 详细信息
来源: 评论
A Survey of Traffic Sign Recognition Systems Based on Convolutional Neural Networks
A Survey of Traffic Sign Recognition Systems Based on Convol...
收藏 引用
IEEE International Conference on Electro information Technology
作者: Syed Hussain Munther Abualkibash Samir Tout School of Information Security and Applied Computing Eastern Michigan University
In this paper, we briefly discuss the applications of Convolutional Neural Networks (CNNs) model to traffic sign recognition (TSR) systems. Traditionally, the TSRs have used different techniques to detect and classify... 详细信息
来源: 评论
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5607-5623页
作者: Abdallah Elhigazi Abdallah Mosab Hamdan Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih Faculty of Engineering Future UniversityKhartoum 10553Sudan Faculty of Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400Malaysia Information Assurance and Security Research School of ComputingUniversiti Teknologi MalaysiaJohor81310Malaysia School of Psychology and Computer Science University of Central LancashirePreston PR12HEUK Deaptement of Management Information Systems College of Administrative ScienceApplied Science UniversityAl Eker623Bahrain Deaptement of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh11461Saudi Arabia
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw... 详细信息
来源: 评论
Privacy-Preserving Electricity Theft Detection Based on Blockchain
收藏 引用
IEEE Transactions on Smart Grid 2023年 第5期14卷 4047-4059页
作者: Zhao, Zhiqiang Liu, Yining Zeng, Zhixin Chen, Zhixiong Zhou, Huiyu Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Fujian Key Laboratory of Financial Information Processing The Key Laboratory of Applied Mathematics of Fujian Province University Putian University Putian351100 China University of Leicester School of Computing and Mathematical Sciences LeicesterLE1 7RH United Kingdom
In most electricity theft detection schemes, consumers' power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is... 详细信息
来源: 评论
A new attack on three variants of the RSA cryptosystem  21st
A new attack on three variants of the RSA cryptosystem
收藏 引用
21st Australasian Conference on information security and Privacy, ACISP 2016
作者: Bunder, Martin Nitaj, Abderrahmane Susilo, Willy Tonien, Joseph School of Mathematics and Applied Statistics University of Wollongong Wollongong Australia Département de Mathématiques Université de Caen Caen France School of Computing and Information Technology Centre for Computer and Information Security Research University of Wollongong Wollongong Australia
In 1995, Kuwakado, Koyama and Tsuruoka presented a new RSA-type scheme based on singular cubic curves y2 = x3 + bx2 (mod N) where N = pq is an RSA modulus. Then, in 2002, Elkamchouchi, Elshenawy and Shaban introduced ... 详细信息
来源: 评论
Game Theory-Based IoT Efficient Power Control in Cognitive UAV
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 1561-1578页
作者: Fadhil Mukhlif Norafida Ithnin Omar B.Abdulghafoor Faiz Alotaibi Nourah Saad Alotaibi Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi MalaysiaJohorMalaysia Electronic and Telecommunication Department College of EngineeringThe American University of KurdistanIraq Faculty of Computer Science and Information Technology Universiti Putra MalaysiaSelangorMalaysia Computer Department Faculty of Applied CollegeImam Abdulrahman Bin Faisal UniversityDammamSaudi Arabia
With the help of network densification,network coverage as well as the throughput can be improved via ultra-dense networks(UDNs).In tandem,Unmanned Aerial Vehicle(UAV)communications have recently garnered much attenti... 详细信息
来源: 评论
Emerging Research in the security of Modern and Autonomous Vehicles
Emerging Research in the Security of Modern and Autonomous V...
收藏 引用
IEEE International Conference on Electro information Technology
作者: Samir Tout Munther Abualkibash Pooja Patil School of Information Security & Applied Computing Department of Computer Science Eastern Michigan University
The last decade has witnessed considerable advancements in automating modern "connected" and Autonomous Vehicles (AVs), which are becoming an integral part of the modern transportation systems. Such advancem... 详细信息
来源: 评论
A Communication-efficient Conjunctive Query Scheme under Local Differential Privacy
A Communication-efficient Conjunctive Query Scheme under Loc...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Ellen Z. Guan, Yunguo Lu, Rongxing Zhang, Harry University of New Brunswick Faculty of Computer Science FrederictonE3B5A3 Canada Eastern Michigan University School of Information Security and Applied Computing YpsilantiMI48197 United States
Crowdsourcing has become a widely used method for data collection and analysis, yet its privacy remains a challenge. In this paper, we present a new efficient and privacy-preserving conjunctive query scheme for crowds... 详细信息
来源: 评论