咨询与建议

限定检索结果

文献类型

  • 6,498 篇 期刊文献
  • 277 篇 会议

馆藏范围

  • 6,775 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,905 篇 工学
    • 4,368 篇 计算机科学与技术...
    • 1,567 篇 电气工程
    • 1,553 篇 电子科学与技术(可...
    • 1,505 篇 控制科学与工程
    • 1,377 篇 信息与通信工程
    • 1,308 篇 软件工程
    • 1,236 篇 材料科学与工程(可...
    • 1,019 篇 网络空间安全
    • 774 篇 机械工程
    • 509 篇 仪器科学与技术
    • 497 篇 生物医学工程(可授...
    • 451 篇 力学(可授工学、理...
    • 112 篇 动力工程及工程热...
    • 110 篇 环境科学与工程(可...
    • 107 篇 化学工程与技术
  • 3,106 篇 理学
    • 1,832 篇 数学
    • 746 篇 物理学
    • 444 篇 生物学
    • 301 篇 天文学
    • 249 篇 系统科学
    • 178 篇 化学
    • 150 篇 统计学(可授理学、...
    • 113 篇 地球物理学
  • 975 篇 管理学
    • 745 篇 管理科学与工程(可...
    • 187 篇 图书情报与档案管...
  • 617 篇 医学
    • 522 篇 临床医学
    • 158 篇 基础医学(可授医学...
  • 218 篇 军事学
    • 204 篇 军队指挥学
  • 176 篇 农学
  • 172 篇 经济学
    • 166 篇 应用经济学
  • 164 篇 法学
  • 139 篇 教育学
  • 122 篇 文学
    • 100 篇 外国语言文学
  • 100 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 350 篇 deep learning
  • 270 篇 security
  • 199 篇 machine learning
  • 193 篇 blockchain
  • 157 篇 internet of thin...
  • 150 篇 cloud computing
  • 99 篇 artificial intel...
  • 92 篇 iot
  • 88 篇 privacy
  • 88 篇 cryptography
  • 79 篇 computing
  • 63 篇 network
  • 54 篇 optimization
  • 51 篇 convolutional ne...
  • 50 篇 intrusion detect...
  • 48 篇 authentication
  • 45 篇 metaheuristics
  • 44 篇 clustering
  • 41 篇 model
  • 39 篇 healthcare

机构

  • 73 篇 department of co...
  • 50 篇 department of co...
  • 40 篇 department of in...
  • 38 篇 ieee
  • 38 篇 department of co...
  • 32 篇 information tech...
  • 29 篇 department of co...
  • 29 篇 department of in...
  • 28 篇 department of co...
  • 27 篇 university of ch...
  • 25 篇 department of in...
  • 24 篇 department of co...
  • 22 篇 department of in...
  • 22 篇 department of co...
  • 21 篇 department of ma...
  • 20 篇 department of in...
  • 20 篇 department of co...
  • 20 篇 department of co...
  • 20 篇 department of el...
  • 20 篇 department of el...

作者

  • 55 篇 abdelwahed motwa...
  • 37 篇 ishfaq yaseen
  • 34 篇 walid el-shafai
  • 31 篇 muhammad adnan k...
  • 28 篇 anwer mustafa hi...
  • 26 篇 abu sarwar zaman...
  • 25 篇 mohamed k.nour
  • 24 篇 doaa sami khafag...
  • 23 篇 el-sayed m.el-ke...
  • 22 篇 mehedi masud
  • 21 篇 abdelaziz a.abde...
  • 20 篇 radwa marzouk
  • 18 篇 kim-kwang raymon...
  • 18 篇 mesfer al duhayy...
  • 17 篇 rajeev kumar
  • 17 篇 muhammad shafiq
  • 16 篇 sagheer abbas
  • 15 篇 imran khan
  • 15 篇 mahmoud ragab
  • 14 篇 wei wang

语言

  • 6,600 篇 英文
  • 174 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Information Security and Applied Computing"
6775 条 记 录,以下是1-10 订阅
排序:
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim department of Financial information security Kookmin UniversitySeoul02707Republic of Korea department of information security Cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym information security Technology Ltd. Center for applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Pervasive Attentive Neural Network for Intelligent Image Classification Based on N-CDE’s
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1137-1156页
作者: Anas W.Abulfaraj department of information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityRabigh21911Saudi Arabia
The utilization of visual attention enhances the performance of image classification *** attentionbased models have demonstrated notable performance,but many of these models exhibit reduced accuracy when confronted wi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An End-To-End Hyperbolic Deep Graph Convolutional Neural Network Framework
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 537-563页
作者: Yuchen Zhou Hongtao Huo Zhiwen Hou Lingbin Bu Yifan Wang Jingyi Mao Xiaojun Lv Fanliang Bu School of information Network security People’s Public Security University of ChinaBeijing100038China Institute of computing Technology China Academy of Railway Sciences Corporation LimitedBeijing100081China
Graph Convolutional Neural Networks(GCNs)have been widely used in various fields due to their powerful capabilities in processing graph-structured ***,GCNs encounter significant challenges when applied to scale-free g... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Survey on the Evolution of Bootkits Attack and Defense Techniques
收藏 引用
China Communications 2024年 第1期21卷 102-130页
作者: Yilin Zhou Guojun Peng Zichuan Li Side Liu Key Laboratory of Aerospace information security and Trust computing Ministry of EducationWuhan 430072China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China
According to the boot process of modern computer systems,whoever boots first will gain control *** advantage of this feature,a malicious code called bootkit can hijack the control before the OS bootloader and bypass s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Enhancing Ulcerative Colitis Diagnosis:A Multi-Level Classification Approach with Deep Learning
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第7期140卷 1129-1142页
作者: Hasan J.Alyamani department of information Systems Faculty of Computing and Information Technology in RabighKing Abdulaziz UniversityJeddah21589Saudi Arabia
The evaluation of disease severity through endoscopy is pivotal in managing patients with ulcerative colitis,a condition with significant clinical ***,endoscopic assessment is susceptible to inherent variations,both w... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Framework to Construct S-Box Quantum Circuits Using System Modeling: Application to 4-Bit S-Boxes
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 545-561页
作者: Yongjin Jeon Seungjun Baek Jongsung Kim department of Financial information security Kookmin UniversitySeoul02707Republic of Korea
Quantum computers accelerate many algorithms based on the superposition principle of quantum *** Grover algorithm provides significant performance to malicious users attacking symmetric key *** the performance of atta... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace information security and Trusted computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of computing Power Network and information security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Malware Detection Using Dual Siamese NetworkModel
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 563-584页
作者: ByeongYeol An JeaHyuk Yang Seoyeon Kim Taeguen Kim department of Software Convergence Soonchunhyang UniversityAsan31538Republic of Korea department of Mobility Convergence security Soonchunhyang UniversityAsan31538Republic of Korea department of information security Engineering Soonchunhyang UniversityAsan31538Republic of Korea
This paper proposes a new approach to counter cyberattacks using the increasingly diverse malware in cyber *** signature detection methods that utilize static and dynamic features face limitations due to the continuou... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Intelligent Machine Learning Based Brain Tumor Segmentation through Multi-Layer Hybrid U-Net with CNN Feature Integration
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1301-1317页
作者: Sharaf J.Malebary department of information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityP.O.Box 344Rabigh21911Saudia Arabia
Brain tumors are a pressing public health concern, characterized by their high mortality and morbidity ***, the manual segmentation of brain tumors remains a laborious and error-prone task, necessitatingthe developmen... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论