咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 工学
    • 1 篇 力学(可授工学、理...
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 计算机科学与技术...
    • 1 篇 生物医学工程(可授...

主题

  • 1 篇 hash functions s...
  • 1 篇 deep learning(dl...
  • 1 篇 homomorphic encr...
  • 1 篇 neural network
  • 1 篇 poisoning attack...
  • 1 篇 evasion attacks

机构

  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 university of je...
  • 1 篇 department of co...

作者

  • 1 篇 ibrahim abaker t...
  • 1 篇 n.z.jhanjhi
  • 1 篇 muhammad tayyab
  • 1 篇 abdulaleem ali a...
  • 1 篇 mohsen marjani
  • 1 篇 abdulwahab ali a...

语言

  • 1 篇 英文
检索条件"主题词=hash functions SHA512"
1 条 记 录,以下是1-10 订阅
排序:
Cryptographic Based Secure Model on Dataset for Deep Learning Algorithms
收藏 引用
Computers, Materials & Continua 2021年 第10期69卷 1183-1200页
作者: Muhammad Tayyab Mohsen Marjani N.Z.Jhanjhi Ibrahim Abaker Targio hashim Abdulwahab Ali Almazroi Abdulaleem Ali Almazroi School of Computer Science and Engineering(SCE) Taylor’s University Lake-Side CampusSubang Jaya47500Malaysia Department of Computer Science College of Computing and InformaticsUniversity of SharjahSharjah27272UAE University of Jeddah College of Computing and Information Technology at KhulaisDepartment of Information TechnologyJeddahSaudi Arabia Department of Computer Science Rafha Community CollegeNorthern Border UniversityArar91431Saudi Arabia
Deep learning(DL)algorithms have been widely used in various security applications to enhance the performances of decision-based *** data added by an attacker can cause several security and privacy problems in the ope... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论