咨询与建议

限定检索结果

文献类型

  • 142 篇 期刊文献

馆藏范围

  • 142 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 63 篇 医学
    • 35 篇 临床医学
    • 8 篇 中西医结合
    • 7 篇 护理学(可授医学、...
    • 6 篇 中药学(可授医学、...
    • 5 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
    • 4 篇 医学技术(可授医学...
  • 62 篇 工学
    • 23 篇 计算机科学与技术...
    • 14 篇 材料科学与工程(可...
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 7 篇 仪器科学与技术
    • 7 篇 信息与通信工程
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 生物医学工程(可授...
    • 6 篇 软件工程
    • 5 篇 力学(可授工学、理...
    • 5 篇 化学工程与技术
    • 5 篇 石油与天然气工程
    • 3 篇 建筑学
  • 22 篇 理学
    • 7 篇 化学
    • 6 篇 数学
    • 4 篇 物理学
    • 3 篇 生物学
    • 3 篇 生态学
  • 9 篇 农学
    • 4 篇 农业资源与环境
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
  • 4 篇 教育学
    • 4 篇 教育学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 法学
  • 3 篇 文学
  • 2 篇 历史学
  • 2 篇 军事学

主题

  • 4 篇 生活质量
  • 3 篇 雾计算
  • 3 篇 《本草图经》
  • 3 篇 本草考证
  • 3 篇 fog computing
  • 3 篇 异构蜂窝网络
  • 3 篇 物理层安全
  • 3 篇 护理
  • 3 篇 药图
  • 2 篇 磁共振成像
  • 2 篇 伪装攻击
  • 2 篇 可信计算
  • 2 篇 乙肝肝硬化
  • 2 篇 测量
  • 2 篇 贮藏特性
  • 2 篇 参味宁郁片
  • 2 篇 convolutional ne...
  • 2 篇 hoc网络
  • 2 篇 组密钥管理
  • 2 篇 胃癌

机构

  • 10 篇 北京工业大学
  • 6 篇 可信计算北京市重...
  • 6 篇 湖北省防雷中心
  • 5 篇 engineering rese...
  • 4 篇 南昌大学第一附属...
  • 3 篇 安徽中医药大学
  • 3 篇 安徽医科大学第二...
  • 3 篇 桂林电子科技大学
  • 3 篇 清华大学
  • 3 篇 faculty of compu...
  • 3 篇 江西中医药大学附...
  • 2 篇 北京中医药大学
  • 2 篇 长江大学
  • 2 篇 武汉大学中南医院
  • 2 篇 北京大学
  • 2 篇 新疆维吾尔自治区...
  • 2 篇 中国科学院安徽光...
  • 2 篇 school of engine...
  • 2 篇 宁波大学医学院附...
  • 2 篇 school of engine...

作者

  • 19 篇 涂山山
  • 16 篇 王珊珊
  • 10 篇 shanshan tu
  • 7 篇 muhammad waqas
  • 5 篇 刘珊珊
  • 4 篇 sadaqat ur rehma...
  • 4 篇 孟远
  • 4 篇 肖创柏
  • 3 篇 储姗姗
  • 3 篇 涂杰楠
  • 3 篇 贺鹏
  • 3 篇 许珊珊
  • 3 篇 童立强
  • 3 篇 林强强
  • 3 篇 涂平
  • 3 篇 彭华胜
  • 3 篇 尹旻臻
  • 3 篇 郭兆成
  • 3 篇 于金亮
  • 3 篇 郑晓雯

语言

  • 122 篇 中文
  • 20 篇 英文
检索条件"作者=TU Shanshan"
142 条 记 录,以下是1-10 订阅
排序:
Towards Blockchain-Based Secure BGP Routing,Challenges and Future Research Directions
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2035-2062页
作者: Qiong Yang Li Ma shanshan tu Sami Ullah MuhammadWaqas Hisham Alasmary Faculty of Information Technology Beijing University of TechnologyBeijing100124China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science Shaheed Benazir Bhutto UniversitySheringal18050Pakistan School of Computing and Mathematical Science Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUK School of Engineering Edith Cowan UniversityPerth6027Australia Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Towards Efficient and Secure Access Control System for Mobile Cloud Computing
收藏 引用
China Communications 2015年 第12期12卷 43-52页
作者: tu shanshan HUANG Yongfeng Department of Electronic Engineering Tsinghua University
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud *** middle layer is composed of cloudlets which are deployed by cloud service... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Effective and Secure Access Control System Scheme in the Cloud
收藏 引用
Chinese Journal of Electronics 2015年 第3期24卷 524-528页
作者: NIU Shaozhang tu shanshan Huang Yongfeng Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications Department of Electronic Engineering Tsinghua University
Cloud computing services have got rapid development in the field of the lightweight terminal, especially wireless communications. The comprehensive access control system framework is proposed for the cloud. A kind of ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Power Allocation Strategy for Secret Key Generation Method in Wireless Communications
收藏 引用
Computers, Materials & Continua 2021年 第8期68卷 2179-2188页
作者: Bin Zhang Muhammad Waqas shanshan tu Syed Mudassir Hussain Sadaqat Ur Rehman School of Electronics and Information Engineering Hunan University of Science and EngineeringYongzhou425199China Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering Ghulam Ishaq Khan(GIK)Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Electronics Engineering FICTBalochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Computer Science Namal InstituteMianwali42200Pakistan
Secret key generation(SKG)is an emerging technology to secure wireless communication from ***,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Enhanced Nature Inspired-Support Vector Machine for Glaucoma Detection
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 1151-1172页
作者: Jahanzaib Latif shanshan tu Chuangbai Xiao Anas Bilal Sadaqat Ur Rehman Zohaib Ahmad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of Technology100124BeijingChina College of Information Science Technology Hainan Normal UniversityHainan ProvinceHaikou571158China Department of Computer Science University of SalfordManchesterUK Faculty of Information Technology Beijing University of Technology Chaoyang District BeijingChina
Glaucoma is a progressive eye disease that can lead to blindness if left *** detection is crucial to prevent vision loss,but current manual scanning methods are expensive,time-consuming,and require specialized *** stu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Physical Layer Authentication Using Ensemble Learning Technique in Wireless Communications
收藏 引用
Computers, Materials & Continua 2022年 第12期73卷 4489-4499页
作者: Muhammad Waqas Shehr Bano Fatima Hassan shanshan tu Ghulam Abbas Ziaul Haq Abbas Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan School of Engineering Edith Cowan UniversityJoondalup Perth6027WA Australia Faculty of Electrical Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan
Cyber-physical wireless systems have surfaced as an important data communication and networking research *** is an emerging discipline that allows effective monitoring and efficient real-time communication between the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fine-grained Ship Image Recognition Based on BCNN with Inception and AM-Softmax
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 1527-1539页
作者: Zhilin Zhang Ting Zhang Zhaoying Liu Peijie Zhang shanshan tu Yujian Li Muhammad Waqas Faculty of Information Technology Beijing University of TechnologyBeijing 100124China School of Artificial Intelligence Guilin University of Electronic TechnologyGuilin541004China School of Engineering Edith Cowan UniversityPerth WA 6027Australia
The fine-grained ship image recognition task aims to identify various classes of ***,small inter-class,large intra-class differences between ships,and lacking of training samples are the reasons that make the task ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
Computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang shanshan tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient Impersonation Attack Detection Method in Fog Computing
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 267-281页
作者: Jialin Wan Muhammad Waqas shanshan tu Syed Mudassir Hussain Ahsan Shah Sadaqat Ur Rehman Muhammad Hanif Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering Ghulam Ishaq Khan Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Electronics Engineering FICTBalochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Computer Science Namal InstituteMianwali42200Pakistan
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s *** the fog layer is located between cloud and end-users,it can provide more convenience and timely services to **... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Authentication of Vehicles and Road Side Units in Intelligent Transportation System
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 359-371页
作者: Muhammad Waqas shanshan tu Sadaqat Ur Rehman Zahid Halim Sajid Anwar Ghulam Abbas Ziaul Haq Abbas Obaid Ur Rehman Beijing Key Laboratory of Trusted Computing Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science&Engineering Ghulam Ishaq Khan Institute of Engineering Sciences&TechnologyTopi23460Pakistan Beijing Electro-Meahnical Engineering Institute Beijing100074China Faculty of Electrical Engineering Ghulam Ishaq Khan Institute of Engineering Sciences&TechnologyTopi23460Pakistan Department of Electrical Engineering Sarhad University of Science and Information TechnologyPeshawar25000Pakistan
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论