咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 34 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 80 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 48 篇 工学
    • 38 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 11 篇 控制科学与工程
    • 9 篇 信息与通信工程
    • 5 篇 电气工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 4 篇 网络空间安全
    • 3 篇 生物医学工程(可授...
    • 2 篇 仪器科学与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 安全科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 轻工技术与工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 环境科学与工程(可...
  • 16 篇 理学
    • 10 篇 数学
    • 6 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 3 篇 系统科学
    • 2 篇 物理学
    • 1 篇 化学
  • 10 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 2 篇 医学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 军事学

主题

  • 8 篇 semantics
  • 6 篇 privacy
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 4 篇 data privacy
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 social networkin...
  • 4 篇 security
  • 3 篇 transformers
  • 3 篇 servers
  • 3 篇 differential pri...
  • 3 篇 feature extracti...
  • 3 篇 transforms
  • 3 篇 federated learni...
  • 3 篇 artificial intel...
  • 3 篇 crowdsourcing
  • 3 篇 synchronization
  • 3 篇 encoding
  • 3 篇 sensors

机构

  • 8 篇 shandong enginee...
  • 8 篇 shandong provinc...
  • 8 篇 key laboratory o...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 5 篇 school of inform...
  • 5 篇 college of compu...
  • 4 篇 school of comput...
  • 4 篇 school of intell...
  • 4 篇 graduate school ...
  • 3 篇 university of pe...
  • 3 篇 college of elect...
  • 2 篇 computer science...
  • 2 篇 school of comput...
  • 2 篇 faculty of compu...
  • 2 篇 school of inform...
  • 2 篇 applied laborato...
  • 2 篇 college of engin...
  • 2 篇 school of comput...
  • 2 篇 eastern michigan...

作者

  • 8 篇 jing zhao
  • 5 篇 mohammad alauthm...
  • 5 篇 rongxing lu
  • 5 篇 fathi amsaad
  • 5 篇 yunguo guan
  • 5 篇 ammar almomani
  • 4 篇 yushui geng
  • 4 篇 ronghuan zhang
  • 4 篇 ming li
  • 4 篇 qingzhi zou
  • 3 篇 yantao yu
  • 3 篇 ellen z. zhang
  • 3 篇 abdul razaque
  • 3 篇 xishan ma
  • 3 篇 huanxiao zhou
  • 3 篇 munther abualkib...
  • 3 篇 almomani ammar
  • 3 篇 chen zhixiong
  • 3 篇 alauthman mohamm...
  • 2 篇 ahmad al-qerem

语言

  • 75 篇 英文
  • 5 篇 其他
检索条件"机构=School of Information Security&Applied Computing"
80 条 记 录,以下是61-70 订阅
排序:
HydraView: A Synchronized 360◦-View of Multiple Sensors for Autonomous Vehicles
HydraView: A Synchronized 360◦-View of Multiple Sensors for...
收藏 引用
International Conference on Connected and Autonomous Driving
作者: Luodai Yang Qian Jia Ruijun Wang Jie Cao Weisong Shi College of Engineering and Technology Eastern Michigan University College of Arts and Science Eastern Michigan University Dept.of Computer Science Wayne State University School of Information Security and Applied Computing Eastern Michigan University
Today's autonomous vehicles will deploy multiple sensors to achieve safe and reliable navigation and precise perception of the environment. Although multiple sensors can be advantageous in terms of providing a rob... 详细信息
来源: 评论
MACHINE LEARNING IN NETWORK security USING KNIME ANALYTICS
arXiv
收藏 引用
arXiv 2019年
作者: Abualkibash, Munther School of Information Security and Applied Computing College of Technology Eastern Michigan University YpsilantiMI United States
Machine learning has more and more effect on our every day’s life. This field keeps growing and expanding into new areas. Machine learning is based on the implementation of artificial intelligence that gives systems ... 详细信息
来源: 评论
Detection of Phishing Websites using Machine Learning
Detection of Phishing Websites using Machine Learning
收藏 引用
IEEE Cloud Summit
作者: Abdul Razaque Mohamed Ben Haj Frej Dauren Sabyrov Aidana Shaikhyn Fathi Amsaad Ahmed Oun International IT University Almaty Kazakhstan University of Bridgeport Bridgeport CT USA Computer Engineering and Telecommunication International IT University Almaty Kazakhstan School of Information Security and Applied Computing (SISAC) Eastern Michigan University Ypsilanti MI USA University of Toledo Toledo OH US
Phishing sends malicious links or attachments through emails that can perform various functions, including capturing the victim's login credentials or account information. These emails harm the victims, cause mone... 详细信息
来源: 评论
Pair Data Division Algorithm For Handling Data Classification
Pair Data Division Algorithm For Handling Data Classificatio...
收藏 引用
International Conference on Social Networks Analysis, Management and security (SNAMS)
作者: Abdul Razaque A. Kanapina M. Sailaubek D. Tsoy Z. Turganov Muder Almiani Fathi Amsaad Mohammad Adnan Almahamed IITU Kazakhstan Al-Hussein Bin Talal University Jordan School of Information Security and Applied Computing Eastern Michigan University USA
Data heterogeneity creates the complexity for understanding the different domains. Most of domains require sophisticated algorithm to understand the complexity. To handle the data heterogeneity problem, several method... 详细信息
来源: 评论
Analysis of variance of graph-clique mining for scalable proof of work  14th
Analysis of variance of graph-clique mining for scalable pro...
收藏 引用
14th International Conference on information security and Cryptology, Inscrypt 2018
作者: Anada, Hiroaki Matsushima, Tomohiro Su, Chunhua Meng, Weizhi Kawamoto, Junpei Bag, Samiran Sakurai, Kouichi Department of Information Security University of Nagasaki Nagasaki Japan Department of Informatics Graduate School and Faculty of Information Science and Electrical Engineering Kyushu University Fukuoka Japan Division of Computer Science University of Aizu Aizuwakamatsu Japan Department of Applied Mathematics and Computer Science Technical University of Denmark Kongens Lyngby Denmark School of Computing Science Newcastle University Newcastle upon Tyne United Kingdom
Recently, Bitcoin is becoming one of the most popular decentralized cryptographic currency technologies, and Bitcoin mining is a process of adding transaction records to Bitcoin’s public ledger of past transactions o... 详细信息
来源: 评论
An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Buldas, Ahto Draheim, Dirk Gault, Mike Laanoja, Risto Nagumo, Takehiko Saarepera, Märt Shah, Syed Attique Simm, Joosep Steiner, Jamie Tammet, Tanel Truu, Ahto Centre for Digital Forensics and Cyber Security Tallinn University of Technology Akadeemia tee 15a Tallinn12618 Estonia Information Systems Group Tallinn University of Technology Akadeemia tee 15a Tallinn12618 Estonia Guardtime Avenue d’Ouchy 4 Lausanne1006 Switzerland Guardtime A. H. Tammsaare tee 60 Tallinn11316 Estonia Mitsubishi UFJ Research and Consulting 5-11-2 Toranomon Minato City Tokyo105-8501 Japan Graduate School of Management Kyoto University Yoshida Honmachi Sakyo-ku Kyoto-shi Kyoto606-8501 Japan Martest Research Pärnu mnt 160a Tallinn11317 Estonia School of Computing and Digital Technology Birmingham City University Millennium Point BirminghamB4 7XG United Kingdom Applied Artificial Intelligence Group Tallinn University of Technology Akadeemia tee 15a Tallinn12618 Estonia
Since its introduction with Bitcoin in 2009, blockchain technology has received tremendous attention by academia, industry, politics and media alike, in particular, through extended blockchain-based visions such as sm... 详细信息
来源: 评论
A Survey of Traffic Sign Recognition Systems Based on Convolutional Neural Networks
A Survey of Traffic Sign Recognition Systems Based on Convol...
收藏 引用
IEEE International Conference on Electro information Technology
作者: Syed Hussain Munther Abualkibash Samir Tout School of Information Security and Applied Computing Eastern Michigan University
In this paper, we briefly discuss the applications of Convolutional Neural Networks (CNNs) model to traffic sign recognition (TSR) systems. Traditionally, the TSRs have used different techniques to detect and classify... 详细信息
来源: 评论
Emerging Research in the security of Modern and Autonomous Vehicles
Emerging Research in the Security of Modern and Autonomous V...
收藏 引用
IEEE International Conference on Electro information Technology
作者: Samir Tout Munther Abualkibash Pooja Patil School of Information Security & Applied Computing Department of Computer Science Eastern Michigan University
The last decade has witnessed considerable advancements in automating modern "connected" and Autonomous Vehicles (AVs), which are becoming an integral part of the modern transportation systems. Such advancem... 详细信息
来源: 评论
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Two Factor Authentication using Twofish Encryption and Visua...
收藏 引用
International Conference on Internet of Things: Systems, Management and security
作者: Duisen Gulsezim Seiitkaliyeva Zhansaya Abdul Razaque Yestayeva Ramina Fathi Amsaad Muder Almiani Raouf Ganda Ahmed Oun Computer Eng. And Security International Inf. Tech. Univ Almaty Kazakhstan Dept. of Computer Sci NYIT Nanjing China School of Information Security and Applied Computing Eastern Michigan University USA Computer Information Sys Al-Hussein Bin Talal University Jordan Yale School of Management Yale University USA EECS Department University of Toledo OH
Dependence of the individuals on the Internet for performing the several actions require secure data communication. Thus, the reliable data communication improves the confidentiality. As, enhanced security leads to re... 详细信息
来源: 评论
Earthquake Damage Detection Using Before and After Earthquake Satellite Images
Earthquake Damage Detection Using Before and After Earthquak...
收藏 引用
IEEE International Conference on Electro information Technology
作者: Kasim A. Korkmaz Munther Abualkibash Eastern Michigan University School of Visual and Built Environments Ypsilanti MI Eastem Michigan University School of Information Security and Applied Computing Ypsilanti MI
After experiencing many earthquakes all around the world, earthquake damage assessment has attracted a great deal of attention from both researchers and practitioners. Complexity and uncertainty in many practical prob... 详细信息
来源: 评论