咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 35 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 81 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 47 篇 工学
    • 38 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 16 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 物理学
    • 1 篇 化学
  • 9 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 军事学

主题

  • 8 篇 semantics
  • 6 篇 privacy
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 social networkin...
  • 4 篇 security
  • 3 篇 transformers
  • 3 篇 servers
  • 3 篇 differential pri...
  • 3 篇 feature extracti...
  • 3 篇 transforms
  • 3 篇 federated learni...
  • 3 篇 artificial intel...
  • 3 篇 crowdsourcing
  • 3 篇 synchronization
  • 3 篇 encoding
  • 3 篇 sensors

机构

  • 8 篇 shandong enginee...
  • 8 篇 shandong provinc...
  • 8 篇 key laboratory o...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 5 篇 school of inform...
  • 5 篇 college of compu...
  • 4 篇 school of comput...
  • 4 篇 school of intell...
  • 4 篇 graduate school ...
  • 3 篇 university of pe...
  • 3 篇 college of elect...
  • 2 篇 computer science...
  • 2 篇 school of comput...
  • 2 篇 faculty of compu...
  • 2 篇 school of inform...
  • 2 篇 applied laborato...
  • 2 篇 college of engin...
  • 2 篇 school of comput...
  • 2 篇 eastern michigan...

作者

  • 8 篇 jing zhao
  • 5 篇 mohammad alauthm...
  • 5 篇 rongxing lu
  • 5 篇 fathi amsaad
  • 5 篇 yunguo guan
  • 5 篇 ammar almomani
  • 4 篇 yushui geng
  • 4 篇 ronghuan zhang
  • 4 篇 ming li
  • 4 篇 qingzhi zou
  • 3 篇 yantao yu
  • 3 篇 ellen z. zhang
  • 3 篇 abdul razaque
  • 3 篇 xishan ma
  • 3 篇 huanxiao zhou
  • 3 篇 munther abualkib...
  • 3 篇 almomani ammar
  • 3 篇 chen zhixiong
  • 3 篇 alauthman mohamm...
  • 2 篇 ahmad al-qerem

语言

  • 77 篇 英文
  • 4 篇 其他
检索条件"机构=School of Information Security&Applied Computing"
81 条 记 录,以下是51-60 订阅
排序:
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Two Factor Authentication using Twofish Encryption and Visua...
收藏 引用
International Conference on Internet of Things: Systems, Management and security
作者: Duisen Gulsezim Seiitkaliyeva Zhansaya Abdul Razaque Yestayeva Ramina Fathi Amsaad Muder Almiani Raouf Ganda Ahmed Oun Computer Eng. And Security International Inf. Tech. Univ Almaty Kazakhstan Dept. of Computer Sci NYIT Nanjing China School of Information Security and Applied Computing Eastern Michigan University USA Computer Information Sys Al-Hussein Bin Talal University Jordan Yale School of Management Yale University USA EECS Department University of Toledo OH
Dependence of the individuals on the Internet for performing the several actions require secure data communication. Thus, the reliable data communication improves the confidentiality. As, enhanced security leads to re... 详细信息
来源: 评论
Accessing Multilingual information Repositories  1
收藏 引用
丛书名: Lecture Notes in Computer Science
1000年
作者: Carol Peters Fredric C. Gey Julio Gonzalo Henning Müller Gareth J. F. Jones Michael Kluck Bernardo Magnini Maarten Rijke
The sixth campaign of the Cross Language Evaluation Forum (CLEF) for European languages was held from January to September 2005. CLEF is by now an established international evaluation initiative and 74 groups from all... 详细信息
来源: 评论
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
收藏 引用
Science China(information Sciences) 2018年 第3期61卷 118-130页
作者: Wei LI Vincent RIJMEN Zhi TAO Qingju WANG Hua CHEN Yunwen LIU Chaoyun LI Ya LIU School of Computer Science and Technology Donghua University imec-COSIC KU Leuven Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Applied Mathematics and Computer Science Technical University of Denmark Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences College of Science National University of Defense Technology Department of Computer Science and Engineering University of Shanghai for Science and Technology
With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing many serious traffic problems, such as road safety, convenien... 详细信息
来源: 评论
$\textsf{LoPub}$ : High-Dimensional Crowdsourced Data Publication With Local Differential Privacy
收藏 引用
IEEE Transactions on information Forensics and security 2018年 第9期13卷 2151-2166页
作者: Xuebin Ren Chia-Mu Yu Weiren Yu Shusen Yang Xinyu Yang Julie A. McCann Philip S. Yu School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Taiwan Information Security Center Taipei Taiwan Department of Computer Science and Engineering National Chung Hsing University Taichung Taiwan Department of Computing Imperial College London London U.K. School of Engineering and Applied Science Aston University Birmingham U.K. Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China Department of Computer Science University of Illinois at Chicago Chicago IL USA
High-dimensional crowdsourced data collected from numerous users produces rich knowledge about our society; however, it also brings unprecedented privacy threats to the participants. Local differential privacy (LDP), ... 详细信息
来源: 评论
Detection of Phishing Websites using Machine Learning
Detection of Phishing Websites using Machine Learning
收藏 引用
IEEE Cloud Summit
作者: Abdul Razaque Mohamed Ben Haj Frej Dauren Sabyrov Aidana Shaikhyn Fathi Amsaad Ahmed Oun International IT University Almaty Kazakhstan University of Bridgeport Bridgeport CT USA Computer Engineering and Telecommunication International IT University Almaty Kazakhstan School of Information Security and Applied Computing (SISAC) Eastern Michigan University Ypsilanti MI USA University of Toledo Toledo OH US
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause mone... 详细信息
来源: 评论
Privacy-Preserving Electricity Theft Detection based on Blockchain
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Zhiqiang Liu, Yining Zeng, Zhixin Chen, Zhixiong Zhou, Huiyu School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China The Fujian Key Laboratory of Financial Information Processing The Key Laboratory of Applied Mathematics Fujian Province University Putian University Fujian Putian351100 China The School of Computing and Mathematical Sciences University of Leicester LeicesterLE1 7RH United Kingdom
In most electricity theft detection schemes, consumers’ power consumption data is directly input into the detection center. Although it is valid in detecting the theft of consumers, the privacy of all consumers is at... 详细信息
来源: 评论
Deep Generative Network for Image Inpainting with Gradient Semantics and Spatial-Smooth Attention
SSRN
收藏 引用
SSRN 2023年
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510006 China
As a powerful means of tampering in image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, particularly in boundary... 详细信息
来源: 评论
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models
CNNs in Crop Care: A Comparative Analysis of Tomato Disease ...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Ali M Ali Shadi Nashwan Ahmad Al-Qerem Amjad Aldweesh Mohammad Alauthman Zenab Elgamal Ammar Almomani Communications and Computer Engineering Department Faculty of Engineering AlAhliyya Amman University Amman Jordan Cybersecurity Department Faculty of Information Technology Middle East University (MEU) Amman Jordan Computer Science Department Faculty of Information Technology Zarqa University Zarqa Jordan College of Computing and IT Shaqra University Shaqra Saudi Arabia Department of Information Security Faculty of Information Technology University of Petra Amman Jordan School of Computing Skyline University College University City of Sharjah Sharjah United Arab Emirates School of Computing Skyline University College Sharjah UAE I.T. department AlHuson University College AlBalqa Applied University Irbid Jordan
Timely and accurate detection of plant diseases is critical for sustainable crop production. This paper presents a comparative analysis of convolutional neural network (CNN) models for automated tomato leaf disease de... 详细信息
来源: 评论
Empowering Small and Medium Enterprises with Data Analytics for Enhanced Competitiveness
Empowering Small and Medium Enterprises with Data Analytics ...
收藏 引用
IEEE International Conference on Control System, computing and Engineering (ICCSCE)
作者: Aissa Mosbah Musab A. M. Ali Nooritawati Md Tahir College of Commerce and Business Administration Dhofar University Salalah Oman College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Sultanate of Oman Department of Computer Engineering and Information Security International Information Technology University Almaty Kazakhstan School of Electrical Engineering College of Engineering Universiti Teknologi MARA Malaysia Institute for Big Data Analytics and Artificial Intelligence (IBDAAI) Universiti Teknologi MARA Malaysia
In today’s competitive landscape, Small and Medium-sized Enterprises (SMEs) are increasingly embracing business data analytics to gain valuable insights and make informed decisions. However, the true essence of big d...
来源: 评论
Cyberbullying Detection Using Deep Learning: A Comparative Study
Cyberbullying Detection Using Deep Learning: A Comparative S...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Mouhammd Alkasassbeh Ammar Almomani Amjad Aldweesh Ahmad Al-Qerem Mohammad Alauthman Khalid Nahar Beenu Mago Computer Science Department Princess Sumaya University for Technology Amman Jordan School of Computing Skyline University College Sharjah UAE I.T. department AlHuson University College AlBalqa Applied University Irbid Jordan College of Computing and IT Shaqra University Shaqra Saudi Arabia Computer Science Department Faculty of Information Technology Zarqa University Zarqa Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Computer Science Department Faculty of I.T Yarmouk University Irbid Jordan School of Computing Skyline University College University City of Sharjah Sharjah United Arab Emirates
Cyberbullying has become a serious issue with the rise in social media usage, especially among adolescents. Victims of cyberbullying often suffer from psychological distress, anxiety, depression and even suicidal tend... 详细信息
来源: 评论