咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是61-70 订阅
排序:
A generalized reliability analysis of 3-ary n-cubes  16
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
16th International Conference on Communication Software and Networks, ICCSN 2024
作者: Bai, Zefang Wang, Guijuan Ma, Meijie School of Mathematics and Statistics Jinan250353 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Dynamic Strip Convolution and Adaptive Morphology Perception Plugin for Medical Anatomy Segmentation
收藏 引用
IEEE Transactions on Medical Imaging 2025年 第6期44卷 2541-2552页
作者: Hu, Guyue Kang, Yukun Zhao, Gangming Jin, Zhe Li, Chenglong Tang, Jin Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Hefei230601 China Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Hefei230601 China The University of Hong Kong Department of Computer Science Hong Kong Anhui University School of Artificial Intelligence Hefei230601 China
Medical anatomy segmentation is essential for computer-aided diagnosis and lesion localization in medical images. For example, segmenting individual ribs benefits localizing the lung lesions and providing vital medica... 详细信息
来源: 评论
Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of computer science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis  9
An automated construction method for symmetric encryption ro...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Du, Gaolei Sun, Yunge Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
Quantum Remote State Preparation Based on Quantum Network Coding
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 119-132页
作者: Zhen-Zhen Li Zi-Chen Li Yi-Ru Sun Haseeb Ahmad Gang Xu Xiu-Bo Chen School of Information Engineering Beijing Institute of Graphic CommunicationBeijing102600China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Information Security Center State key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province China
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network *** this paper,a quantum remote state preparation scheme based on quantum network coding is *** with the... 详细信息
来源: 评论
A Dirty Data Identification Method in Mechanical Equipment Condition Monitoring  10
A Dirty Data Identification Method in Mechanical Equipment C...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Hao, Huijuan Zhao, Hongge Zhu, Sijian Feng, Yue Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China JinanChina
The rise of the Industrial Internet of Things (IIOT) has brought new opportunities for the mechanical equipment condition monitoring. The trend towards intelligent and automated production of mechanical equipment has ... 详细信息
来源: 评论
An Approach to New Bearing Fault Diagnosis Utilizing Deep Transfer Learning  10
An Approach to New Bearing Fault Diagnosis Utilizing Deep Tr...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Hao, HuiJuan Feng, Yue Zhao, HongGe Zhu, SiJian Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Jinan China
Bearings, serving as crucial components in mechanical equipment, exert a direct influence on the overall performance of the system. Deep transfer learning has garnered significant attention in the realm of intelligent... 详细信息
来源: 评论