咨询与建议

限定检索结果

文献类型

  • 346 篇 会议
  • 341 篇 期刊文献

馆藏范围

  • 687 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 445 篇 工学
    • 303 篇 计算机科学与技术...
    • 253 篇 软件工程
    • 100 篇 信息与通信工程
    • 76 篇 电气工程
    • 60 篇 生物工程
    • 50 篇 控制科学与工程
    • 34 篇 电子科学与技术(可...
    • 33 篇 化学工程与技术
    • 30 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 20 篇 安全科学与工程
    • 17 篇 网络空间安全
    • 16 篇 土木工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 建筑学
    • 12 篇 动力工程及工程热...
  • 195 篇 理学
    • 87 篇 数学
    • 74 篇 生物学
    • 42 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 29 篇 化学
    • 11 篇 系统科学
  • 95 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 23 篇 法学
    • 17 篇 社会学
  • 21 篇 农学
    • 13 篇 作物学
  • 18 篇 医学
    • 14 篇 临床医学
  • 12 篇 经济学
    • 11 篇 应用经济学
  • 4 篇 军事学
  • 3 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 32 篇 semantics
  • 25 篇 feature extracti...
  • 22 篇 deep learning
  • 21 篇 privacy
  • 17 篇 federated learni...
  • 16 篇 security
  • 16 篇 accuracy
  • 16 篇 training
  • 13 篇 image segmentati...
  • 13 篇 neural networks
  • 13 篇 computational mo...
  • 12 篇 data privacy
  • 12 篇 authentication
  • 11 篇 machine learning
  • 11 篇 data models
  • 10 篇 codes
  • 10 篇 blockchain
  • 9 篇 data mining
  • 9 篇 contrastive lear...
  • 9 篇 measurement

机构

  • 64 篇 school of cyber ...
  • 60 篇 hubei key labora...
  • 52 篇 shandong provinc...
  • 48 篇 school of comput...
  • 46 篇 key laboratory o...
  • 45 篇 shandong enginee...
  • 35 篇 national enginee...
  • 35 篇 hubei engineerin...
  • 32 篇 services computi...
  • 29 篇 hubei key labora...
  • 29 篇 cluster and grid...
  • 24 篇 hubei engineerin...
  • 23 篇 henan key labora...
  • 23 篇 school of softwa...
  • 20 篇 school of inform...
  • 19 篇 school of comput...
  • 18 篇 huazhong univers...
  • 18 篇 the hubei engine...
  • 17 篇 school of cyber ...
  • 15 篇 huazhong univers...

作者

  • 47 篇 zhou pan
  • 38 篇 jin hai
  • 33 篇 hai jin
  • 26 篇 hu shengshan
  • 22 篇 liu daizong
  • 19 篇 zhang leo yu
  • 17 篇 mahmood khalid
  • 16 篇 das ashok kumar
  • 16 篇 deqing zou
  • 15 篇 zou deqing
  • 15 篇 zhou ziqi
  • 15 篇 li minghui
  • 13 篇 wang haoyu
  • 12 篇 wan wei
  • 12 篇 fang xiang
  • 11 篇 xiaoke zhu
  • 11 篇 pan zhou
  • 11 篇 jing zhao
  • 11 篇 xu zichuan
  • 10 篇 shengshan hu

语言

  • 624 篇 英文
  • 58 篇 其他
  • 6 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Henan Data Security Engineering Technology Research Center"
687 条 记 录,以下是621-630 订阅
排序:
Behavioral Response of Lasioderma serricorne to Materials from Cinnamomum camphora
收藏 引用
Grain & Oil Science and technology 2018年 第2期1卷 109-112页
作者: LYU Jianhua ZENG Shujing HUO Mingfei ZHANG Yupu KANG Yulong Engineering Research Center of Grain Storage and Security Ministry of Education School of Food Science and Technology Henan University of Technology
The attractiveness of Cinnamomum camphora(Laurales: Lauraceae) blocks and essential oil to Lasioderma serricorne(Fabricius)(Coleoptera: Anobiidae) adults was investigated. The results showed that the behavioral respon... 详细信息
来源: 评论
Identity-Based Encryption Tightly Secure Under Chosen-Ciphertext Attacks  24th
Identity-Based Encryption Tightly Secure Under Chosen-Cipher...
收藏 引用
24th Annual International Conference on Theory and Application of Cryptology and Information security, ASIACRYPT 2018
作者: Hofheinz, Dennis Jia, Dingding Pan, Jiaxin Karlsruhe Institute of Technology Karlsruhe Germany State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China Data Assurance and Communication Security Research Center IIE CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
We propose the first identity-based encryption (IBE) scheme that is (almost) tightly secure against chosen-ciphertext attacks. Our scheme is efficient, in the sense that its ciphertext overhead is only seven group ele... 详细信息
来源: 评论
An algorithm for describing the convex and concave shape of protein surface  1
收藏 引用
4th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2018
作者: Wang, Wei Li, Keliang Lv, Hehe Sun, Lin Zhang, Hongjun Shi, Jinling Zhang, Shiguang Zhou, Yun Zhao, Yuan Xv, Jingjing Department of Computer Science and Technology College of Computer and Information Engineering Henan Normal University XinxiangHenan Province453007 China Laboratory of Computation Intelligence and Information Processing Engineering Technology Research Center for Computing Intelligence and Data Mining XinxiangHenan Province453007 China School of Aviation Engineering Anyang University AnyangHenan Province455000 China School of International Education Xuchang University XuchangHenan Province461000 China
Protein surface plays a key role in many biological processes. Most proteins participate in the life activities of cells via binding to other proteins or ligand molecules. It is an important work to study protein stru... 详细信息
来源: 评论
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism  24th
Understanding and Constructing AKE via Double-Key Key Encaps...
收藏 引用
24th Annual International Conference on Theory and Application of Cryptology and Information security, ASIACRYPT 2018
作者: Xue, Haiyang Lu, Xianhui Li, Bao Liang, Bei He, Jingnan State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Chalmers University of Technology Gothenburg Sweden
Motivated by abstracting the common idea behind several implicitly authenticated key exchange (AKE) protocols, we introduce a primitive that we call double-key key encapsulation mechanism (2-key KEM). It is a special ... 详细信息
来源: 评论
Corrigendum to “Quantitative estimation of the factors impacting spatiotemporal variation in NPP in the Dongting Lake wetlands using Landsat time series data for the last two decades” [Ecol. Indic. 135 (2022) 108544]
收藏 引用
Ecological Indicators 2022年 144卷
作者: Meng Zhang Naiquan Yuan Hui Lin Yang Liu Huaiqing Zhang Research Center of Forestry Remote Sensing & Information Engineering Central South University of Forestry & Technology Changsha 410004 China Key Laboratory of State Forestry Administration on Forest Resources Management and Monitoring in Southern Area Changsha 410004 China Key Laboratory of Forestry Remote Sensing Based Big Data & Ecological Security for Hunan Province Changsha 410004 China Hunan Academy of Geosciences Planning and Design Co. Ltd Changsha 410118 China Research Institute of Forest Resources Information Techniques Chinese Academy of Forestry Beijing 100091 China
来源: 评论
Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud data
Multi-Keyword Search Guaranteeing Forward and Backward Priva...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Li Gong Hongwei Li Guowen Xu Xizhao Luo Mi Wen School of Computer Science and Engineering University of Electronic Science and Technology of China China CETC Big Data Research Institute Co. Ltd. Guiyang China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China Science and Technology on Communication Security Laboratory Chengdu China School of Computer Science and Technology Soochow University Suzhou China School of Computer Science and Technology Shanghai University of Electric Power Shanghai China
Using searchable encryption (SE), users' data can be outsourced to an untrusted server while ensuring privacy of both the queries and the data. Meanwhile, to efficiently support data updating, dynamic SE (DSE) has... 详细信息
来源: 评论
Nano Proteolysis Targeting Chimeras (PROTACs) with Anti-Hook Effect for Tumor Therapy
收藏 引用
Angewandte Chemie 2023年 第37期135卷
作者: Ni-Yuan Zhang Da-Yong Hou Xing-Jie Hu Jian-Xiao Liang Man-Di Wang Zhang-Zhi Song Li Yi Zhi-Jia Wang Prof. Hong-Wei An Prof. Wanhai Xu Prof. Hao Wang CAS Key Laboratory for Biomedical Effects of Nanomaterials and Nanosafety CAS Center for Excellence in Nanoscience National Center for Nanoscience and Technology (NCNST) Beijing 100190 China Center of Materials Science and Optoelectronics Engineering University of Chinese Academy of Sciences Beijing 100049 P. R. China Contribution: Conceptualization (lead) Data curation (lead) Methodology (lead) Project administration (lead) Writing - original draft (lead) Writing - review & editing (lead) Department of Urology Harbin Medical University Cancer Hospital Heilongjiang Key Laboratory of Scientific Research in Urology Harbin 150001 China NHC Key Laboratory of Molecular Probes and Targeted Diagnosis and Therapy Harbin Medical University Harbin 150001 China Henan Institute of Advanced Technology Zhengzhou University Zhengzhou 450052 China Contribution: Data curation (equal) ​Investigation (equal) Methodology (equal) Supervision (equal) Contribution: Formal analysis (equal) ​Investigation (equal) Methodology (equal) Supervision (equal) Contribution: Formal analysis (equal) ​Investigation (equal) Supervision (equal) Contribution: ​Investigation (equal) Methodology (equal) Supervision (equal) Contribution: Data curation (equal) Formal analysis (equal) Methodology (equal) Contribution: Conceptualization (lead) Data curation (lead) Project administration (lead) Supervision (lead) Writing - review & editing (lead) Contribution: Conceptualization (lead) Data curation (lead) Methodology (lead) Project administration (lead) Supervision (lead) Writing - review & editing (lead)
Proteolysis targeting chimera (PROTAC) is an emerging pharmacological modality with innovated post-translational protein degradation capabilities. However, off-target induced unintended tissue effects and intrinsic “... 详细信息
来源: 评论
Erratum to “High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators”
收藏 引用
security and Communication Networks 2020年 第1期2020卷
作者: Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 *** Data Assurance and Communications Security Research Center Chinese Academy of Sciences Beijing 100093 *** School of Cyber Security University of Chinese Academy of Sciences Beijing 100093 *** China Information Technology Security Evaluation Center Beijing 100085 *** School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 100093 ***
来源: 评论
Towards the Trust-Enhancements of Single Sign-On Services
Towards the Trust-Enhancements of Single Sign-On Services
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Xuhua Bao Xiaokun Zhang Jingqiang Lin Dawei Chu Qiongxiao Wang Fengjun Li Legendsec Information Technology (Beijing) Inc. CHINA Joint Laboratory of Institute of Information Engineering Chinese Academy of Sciences and QiAnXin Group Academy of Opto-Electronics Chinese Academy of Sciences State Key Laboratory of Information Security Chinese Academy of Sciences Data Assurance and Communication Security Research Center Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Department of Electrical Engineering and Computer Science University of Kansas USA
Single sign-on (SSO) becomes popular as the identity management and authentication infrastructure in the Internet. A user receives an SSO ticket after being authenticated by the identity provider (IdP), and this IdP-i... 详细信息
来源: 评论
Bidirectional LSTM-CRF for biomedical named entity recognition  14
Bidirectional LSTM-CRF for biomedical named entity recogniti...
收藏 引用
14th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2018
作者: Yang, Xuemin Gao, Zhihong Li, Yongmin Pan, Chuandi Yang, Ronggen Gong, Lejun Yang, Geng Jiangsu Key Laboratory of Big Data Security Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210003 China Zhejiang Engineering Research Center of Intelligence Medicine Wenzhou325035 China Faculty Intelligent Science and Control Engineering Jinling Institute of Technology Nanjing211169 China
Bio-medical entity recognition extracts significant entities, for instance cells, proteins and genes, which is an arduous task in an automatic system that mine knowledge in bioinformatics texts. In this thesis, we uti... 详细信息
来源: 评论