咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 35 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 38 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 16 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 物理学
    • 1 篇 化学
  • 9 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 军事学

主题

  • 8 篇 semantics
  • 6 篇 privacy
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 social networkin...
  • 4 篇 security
  • 3 篇 transformers
  • 3 篇 servers
  • 3 篇 differential pri...
  • 3 篇 feature extracti...
  • 3 篇 transforms
  • 3 篇 federated learni...
  • 3 篇 artificial intel...
  • 3 篇 crowdsourcing
  • 3 篇 synchronization
  • 3 篇 encoding
  • 3 篇 sensors

机构

  • 8 篇 shandong enginee...
  • 8 篇 shandong provinc...
  • 8 篇 key laboratory o...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 5 篇 school of inform...
  • 5 篇 college of compu...
  • 4 篇 school of comput...
  • 4 篇 school of intell...
  • 4 篇 graduate school ...
  • 3 篇 university of pe...
  • 3 篇 college of elect...
  • 2 篇 computer science...
  • 2 篇 school of comput...
  • 2 篇 faculty of compu...
  • 2 篇 school of inform...
  • 2 篇 applied laborato...
  • 2 篇 college of engin...
  • 2 篇 school of comput...
  • 2 篇 eastern michigan...

作者

  • 8 篇 jing zhao
  • 5 篇 mohammad alauthm...
  • 5 篇 rongxing lu
  • 5 篇 fathi amsaad
  • 5 篇 yunguo guan
  • 5 篇 ammar almomani
  • 4 篇 yushui geng
  • 4 篇 ronghuan zhang
  • 4 篇 ming li
  • 4 篇 qingzhi zou
  • 3 篇 yantao yu
  • 3 篇 ellen z. zhang
  • 3 篇 abdul razaque
  • 3 篇 xishan ma
  • 3 篇 huanxiao zhou
  • 3 篇 munther abualkib...
  • 3 篇 almomani ammar
  • 3 篇 chen zhixiong
  • 3 篇 alauthman mohamm...
  • 2 篇 ahmad al-qerem

语言

  • 77 篇 英文
  • 4 篇 其他
检索条件"机构=School of Information Security&Applied Computing"
81 条 记 录,以下是41-50 订阅
排序:
An Efficient Range Sum Query Scheme Under Local Differential Privacy
An Efficient Range Sum Query Scheme Under Local Differential...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ellen Z. Zhang Yunguo Guan Yantao Yu Rongxing Lu Harry Zhang Faculty of Computer Science University of New Brunswick Fredericton Canada School of Information Security and Applied Computing Eastern Michigan University Ypsilanti MI USA College of Electronic and Information Engineering Tongji University Shanghai China
Crowdsourcing has received considerable attention in recent years; however, privacy in crowdsourcing remains a challenge. In this paper, we present a privacy-preserving range sum query scheme under Local Differential ... 详细信息
来源: 评论
Efficient Privacy-Preserving Multi-Location Task Allocation in Fog-Assisted Vehicular Crowdsourcing
Efficient Privacy-Preserving Multi-Location Task Allocation ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Yantao Yu Yunguo Guan Xiaoping Xue Jingxiao Ma Ellen Z. Zhang Rongxing Lu College of Electronic and Information Engineering Tongji University Shanghai China Faculty of Computer Science University of New Brunswick Frederiction NB Canada School of Information Security and Applied Computing Eastern Michigan University Ypsilanti MI USA
Multi-location task allocation is one of the most crucial issues in vehicular crowdsourcing (VCS). To ensure service quality, the VCS service provider prefers to assign multi-location tasks to the workers whose future... 详细信息
来源: 评论
Efficient Privacy-Preserving Edge-based Dynamic Aggregation Query Over Crowdsensed Data
Efficient Privacy-Preserving Edge-based Dynamic Aggregation ...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yantao Yu Yunguo Guan Xiaoping Xue Rongxing Lu College of Electronic and Information Engineering Tongji University Shanghai China School of Information Security and Applied Computing Eastern Michigan University Ypsilanti MI USA Faculty of Computer Science University of New Brunswick Frederiction NB Canada
Aggregation query, which is one of the most crucial data analysis tools applied to vehicular crowdsensed data, is expected to extract valuable insights and support smart decision-making. Meanwhile, the edge servers ar... 详细信息
来源: 评论
Experimenting with faults, lattices and the DSA
Experimenting with faults, lattices and the DSA
收藏 引用
8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005
作者: Naccache, David Nguye˜n, Phong Q. Tunstall, Michael Whelan, Claire Gemplus Card International Applied Research and Security Centre 34 rue Guynemer Issy-les-Moulineaux F-92447 France University of London Information Security Group Royal Holloway Egham Surrey TW20 0EX United Kingdom CNRS/École Normale Supérieure Département d'Informatique 45 rue d'Ulm F-75230 Paris Cedex 05 France Gemplus Card International Applied Research and Security Centre Avenue des Jujubiers La Ciotat F-13705 France School of Computing Dublin City University Ballymun Dublin 9 Ireland
We present an attack on DSA smart-cards which combines physical fault injection and lattice reduction techniques. This seems to be the first (publicly reported) physical experiment allowing to concretely pull-out DSA ... 详细信息
来源: 评论
LGDB-Net: Dual-Branch Path for Building Extraction from Remote Sensing Image  30
LGDB-Net: Dual-Branch Path for Building Extraction from Remo...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Zhang, Ronghuan Zhao, Jing Li, Ming Zou, Qingzhi Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Shandong University of Traditional Chinese Medicine School of Intelligence and Information Engineering Jinan China
Extracting buildings from remote sensing images using deep learning techniques is a widely applied and crucial task. Convolutional Neural Networks (CNNs) adopt hierarchical feature representation, showcasing powerful ... 详细信息
来源: 评论
Image cyberbullying detection and recognition using transfer deep machine learning
收藏 引用
International Journal of Cognitive computing in Engineering 2024年 第1期5卷 14-26页
作者: Almomani, Ammar Nahar, Khalid Alauthman, Mohammad Al-Betar, Mohammed Azmi Yaseen, Qussai Gupta, Brij B. School of Computing Skyline University College University City of Sharjah P.O. Box 1797 Sharjah United Arab Emirates I.T. department Al-Huson University College AlBalqa Applied University Irbid Jordan Computer Science Department Faculty of I.T. Yarmouk University Irbid Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Ajman University Ajman United Arab Emirates Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep lea... 详细信息
来源: 评论
Privacy preserving passive DNS
arXiv
收藏 引用
arXiv 2020年
作者: Papadopoulos, Pavlos Pitropakis, Nikolaos Buchanan, William J. Lo, Owen Katsikas, Sokratis School of Computing Edinburgh Napier University Edinburgh United Kingdom Department of Information Security and Communication Technology Norwegian University of Science and Technology Norway Faculty of Pure and Applied Sciences Open University of Cyprus Cyprus
The Domain Name System (DNS) was created to resolve the IP addresses of the web servers to easily remembered names. When it was initially created, security was not a major concern;nowadays, this lack of inherent secur... 详细信息
来源: 评论
HydraView: A Synchronized 360◦-View of Multiple Sensors for Autonomous Vehicles
HydraView: A Synchronized 360◦-View of Multiple Sensors for...
收藏 引用
International Conference on Connected and Autonomous Driving
作者: Luodai Yang Qian Jia Ruijun Wang Jie Cao Weisong Shi College of Engineering and Technology Eastern Michigan University College of Arts and Science Eastern Michigan University Dept.of Computer Science Wayne State University School of Information Security and Applied Computing Eastern Michigan University
Today's autonomous vehicles will deploy multiple sensors to achieve safe and reliable navigation and precise perception of the environment. Although multiple sensors can be advantageous in terms of providing a rob... 详细信息
来源: 评论
Cutting-Edge Predictive Methods for Enhancing Short-Term Load Prediction
Cutting-Edge Predictive Methods for Enhancing Short-Term Loa...
收藏 引用
2024 International Conference on Electrical and Computer Engineering Researches, ICECER 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Abbas, Tahir Ateeq, Karamath College of Arts & Science Applied Science University P.O.Box 5055 Manama Bahrain Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of TIMES Institute Department of Computer Science Multan Pakistan School of Computing Skyline University College University City Sharjah Sharjah United Arab Emirates
Efficient management and cost-related factors in the power sector call for accurate short-term load forecasting as it enables better planning with the electric grid and achieving stability within it. This paper looks ... 详细信息
来源: 评论
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data
收藏 引用
IEEE Transactions on Dependable and Secure computing 2023年 第4期21卷 2750-2765页
作者: Yunguo Guan Rongxing Lu Songnian Zhang Yandong Zheng Jun Shao Guiyi Wei School of Information Security and Applied Computing Eastern Michigan University Ypsilanti MI USA Faculty of Computer Science University of New Brunswick Fredericton NB Canada State Key Laboratory of Integrated Services Networks Xidian University Xi’an China Zhejiang Gongshang University Hangzhou China
Community search over graphs, which is believed as a powerful tool for locating subgraphs of closely related vertices, has received considerable attention in recent years, and $k$ -truss is such a popular community s... 详细信息
来源: 评论