咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 34 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 80 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 38 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 16 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 物理学
    • 1 篇 化学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 军事学

主题

  • 8 篇 semantics
  • 6 篇 privacy
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 social networkin...
  • 4 篇 security
  • 3 篇 transformers
  • 3 篇 servers
  • 3 篇 differential pri...
  • 3 篇 feature extracti...
  • 3 篇 transforms
  • 3 篇 federated learni...
  • 3 篇 artificial intel...
  • 3 篇 crowdsourcing
  • 3 篇 synchronization
  • 3 篇 encoding
  • 3 篇 sensors

机构

  • 8 篇 shandong enginee...
  • 8 篇 shandong provinc...
  • 8 篇 key laboratory o...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 5 篇 school of inform...
  • 5 篇 college of compu...
  • 4 篇 school of comput...
  • 4 篇 school of intell...
  • 4 篇 graduate school ...
  • 3 篇 university of pe...
  • 3 篇 college of elect...
  • 2 篇 computer science...
  • 2 篇 school of comput...
  • 2 篇 faculty of compu...
  • 2 篇 school of inform...
  • 2 篇 applied laborato...
  • 2 篇 college of engin...
  • 2 篇 school of comput...
  • 2 篇 eastern michigan...

作者

  • 8 篇 jing zhao
  • 5 篇 mohammad alauthm...
  • 5 篇 rongxing lu
  • 5 篇 fathi amsaad
  • 5 篇 yunguo guan
  • 5 篇 ammar almomani
  • 4 篇 yushui geng
  • 4 篇 ronghuan zhang
  • 4 篇 ming li
  • 4 篇 qingzhi zou
  • 3 篇 yantao yu
  • 3 篇 ellen z. zhang
  • 3 篇 abdul razaque
  • 3 篇 xishan ma
  • 3 篇 huanxiao zhou
  • 3 篇 munther abualkib...
  • 3 篇 almomani ammar
  • 3 篇 chen zhixiong
  • 3 篇 alauthman mohamm...
  • 2 篇 ahmad al-qerem

语言

  • 75 篇 英文
  • 5 篇 其他
检索条件"机构=School of Information Security&Applied Computing"
80 条 记 录,以下是31-40 订阅
排序:
A Glove CNN-Bilstm Sentiment Classification  18
A Glove CNN-Bilstm Sentiment Classification
收藏 引用
18th International Computer Conference on Wavelet Active Media Technology and information Processing, ICCWAMTIP 2021
作者: Atandoh, Peter Feng, Zhang Adu-Gyamfi, Daniel Leka, Habte Lejebo Atandoh, Paul Hakeem University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu610054 China University of Technology and Applied Sciences School of Computing Information Sciences Department of Cyber Security and Computer Engineering CK Tedam Navrongo Ghana Western Michigan University Department of Statistics KalamazooMI49008-5278 United States
Reviewing products online has become an increasingly popular way for consumers to voice their opinions and feelings about a product or service. Analyzing this Big data of online reviews would help to discern and extra... 详细信息
来源: 评论
Cyberbullying Detection Using Deep Learning: A Comparative Study
Cyberbullying Detection Using Deep Learning: A Comparative S...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Mouhammd Alkasassbeh Ammar Almomani Amjad Aldweesh Ahmad Al-Qerem Mohammad Alauthman Khalid Nahar Beenu Mago Computer Science Department Princess Sumaya University for Technology Amman Jordan School of Computing Skyline University College Sharjah UAE I.T. department AlHuson University College AlBalqa Applied University Irbid Jordan College of Computing and IT Shaqra University Shaqra Saudi Arabia Computer Science Department Faculty of Information Technology Zarqa University Zarqa Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Computer Science Department Faculty of I.T Yarmouk University Irbid Jordan School of Computing Skyline University College University City of Sharjah Sharjah United Arab Emirates
Cyberbullying has become a serious issue with the rise in social media usage, especially among adolescents. Victims of cyberbullying often suffer from psychological distress, anxiety, depression and even suicidal tend... 详细信息
来源: 评论
Next Generation Image Watermarking via Combined DWT-SVD Technique
Next Generation Image Watermarking via Combined DWT-SVD Tech...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Qais Al-Na'amneh Ammar Almomani Ahmad Nasayreh Khalid M.O. Nahar Hasan Gharaibeh Rabia Emhamed Al Mamlook Mohammad Alauthman Department of Cyber Security Applied Science Private University Amman Jordan School of Computing Skyline University College Sharjah United Arab Emirates I. T. department AlHuson University College AlBalqa Applied University Irbid Jordan Department of Computer Sciences Yarmouk University Irbid Jordan Faculty of Information Technology Computer Sciences Yarmouk University Irbid Jordan Dep. of Business Administration Trine University Indiana USA Dep.of Mechanical and Industrial Engineering University of Zawia Tripoli Libya Department of Information Security Faculty of Information Technology University of Petra Amman Jordan
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte... 详细信息
来源: 评论
A transfer learning-based computer-aided lung cancer detection system in smart healthcare
A transfer learning-based computer-aided lung cancer detecti...
收藏 引用
8th IET Smart Cities Symposium (SCS 2024)
作者: Rezaul Haque Shyama Sultana Al Rafy Md Babul Islam Masum Alam Arafat Pronaya Bhattacharya Pushan Kumar Dutta Applied Bahari Data Research House Dhaka Bangladesh Department of Management Information System International American University California USA Department of Cyber Security Touro University New York USA Department of Smart Computing Kyungdong University Gangwon-do Republic of Korea Amity School of Engineering and Technology Amity University Kolkata India
Rapid urbanization has resulted in the emergence of smart cities, incorporating technology across various sectors, such as healthcare, to improve the quality of life and increase life expectancy. Lung cancer, a leadin...
来源: 评论
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences
arXiv
收藏 引用
arXiv 2024年
作者: Yuan, Qin Li, Chunlei Zeng, Xiangyong Helleseth, Tor He, Debiao Faculty of Mathematics and Statistics Hubei Key Laboratory of Applied Mathematics Hubei University Hubei Wuhan430062 China Department of Informatics University of Bergen BergenN-5020 Norway Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430072 China
Nonlinear complexity is an important measure for assessing the randomness of sequences. In this paper we investigate how circular shifts affect the nonlinear complexities of finite-length binary sequences and then rev... 详细信息
来源: 评论
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention
收藏 引用
Journal of Visual Communication and Image Representation 2024年 98卷
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei Ye, Long School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
As a powerful forgery operation in the image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, especially in boundar... 详细信息
来源: 评论
Privacy-Preserving Electricity Theft Detection based on Blockchain
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Zhiqiang Liu, Yining Zeng, Zhixin Chen, Zhixiong Zhou, Huiyu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China The Fujian Key Laboratory of Financial Information Processing The Key Laboratory of Applied Mathematics Fujian Province University Putian University Fujian Putian351100 China The School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom
In most electricity theft detection schemes, consumers’ power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is at... 详细信息
来源: 评论
Hybridization of deep learning models with crested porcupine optimizer algorithm-based cybersecurity detection on industrial IoT for smart city environments
收藏 引用
Alexandria Engineering Journal 2025年 127卷 239-250页
作者: Alzakari, Sarah A. Aljebreen, Mohammed Asiri, Mashael M. MANSOURI, Wahida Alahmari, Sultan Alqahtani, Mohammed Sorour, Shaymaa Bedewi, Wafi Department of Computer Sciences College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science Community College King Saud University P.O. Box 28095 Riyadh11437 Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science and Information Technology Faculty of Sciences and arts Turaif Northern Border University Arar91431 Saudi Arabia Cybersecurity Institute Riyadh Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Management Information Systems School of Business King Faisal University Al-Ahsa31982 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
Smart cities have attracted extensive coverage from multidisciplinary studies, and many artificial intelligence (AI) solutions have been designed. Conversely, cybersecurity has constantly been a crucial issue and is b... 详细信息
来源: 评论
Deep Generative Network for Image Inpainting with Gradient Semantics and Spatial-Smooth Attention
SSRN
收藏 引用
SSRN 2023年
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510006 China
As a powerful means of tampering in image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, particularly in boundary... 详细信息
来源: 评论
Empowering Small and Medium Enterprises with Data Analytics for Enhanced Competitiveness
Empowering Small and Medium Enterprises with Data Analytics ...
收藏 引用
IEEE International Conference on Control System, computing and Engineering (ICCSCE)
作者: Aissa Mosbah Musab A. M. Ali Nooritawati Md Tahir College of Commerce and Business Administration Dhofar University Salalah Oman College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Sultanate of Oman Department of Computer Engineering and Information Security International Information Technology University Almaty Kazakhstan School of Electrical Engineering College of Engineering Universiti Teknologi MARA Malaysia Institute for Big Data Analytics and Artificial Intelligence (IBDAAI) Universiti Teknologi MARA Malaysia
In today’s competitive landscape, Small and Medium-sized Enterprises (SMEs) are increasingly embracing business data analytics to gain valuable insights and make informed decisions. However, the true essence of big d...
来源: 评论