咨询与建议

限定检索结果

文献类型

  • 4,836 篇 会议
  • 3,144 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 8,014 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,223 篇 工学
    • 3,811 篇 计算机科学与技术...
    • 3,142 篇 软件工程
    • 1,376 篇 信息与通信工程
    • 629 篇 控制科学与工程
    • 612 篇 电气工程
    • 545 篇 电子科学与技术(可...
    • 464 篇 生物工程
    • 377 篇 网络空间安全
    • 334 篇 机械工程
    • 272 篇 仪器科学与技术
    • 242 篇 安全科学与工程
    • 224 篇 光学工程
    • 200 篇 生物医学工程(可授...
    • 193 篇 化学工程与技术
    • 158 篇 交通运输工程
    • 145 篇 动力工程及工程热...
    • 134 篇 建筑学
    • 125 篇 土木工程
  • 2,343 篇 理学
    • 1,239 篇 数学
    • 670 篇 物理学
    • 501 篇 生物学
    • 404 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 209 篇 化学
  • 1,257 篇 管理学
    • 744 篇 管理科学与工程(可...
    • 559 篇 图书情报与档案管...
    • 279 篇 工商管理
  • 312 篇 法学
    • 195 篇 社会学
  • 197 篇 医学
    • 160 篇 临床医学
    • 150 篇 基础医学(可授医学...
  • 123 篇 经济学
  • 99 篇 军事学
  • 66 篇 农学
  • 52 篇 教育学
  • 41 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 240 篇 feature extracti...
  • 219 篇 security
  • 188 篇 deep learning
  • 176 篇 authentication
  • 172 篇 accuracy
  • 157 篇 semantics
  • 145 篇 machine learning
  • 136 篇 information secu...
  • 136 篇 training
  • 129 篇 computational mo...
  • 129 篇 privacy
  • 128 篇 protocols
  • 128 篇 cryptography
  • 123 篇 internet of thin...
  • 100 篇 real-time system...
  • 95 篇 blockchain
  • 94 篇 neural networks
  • 93 篇 network security
  • 90 篇 predictive model...
  • 89 篇 optimization

机构

  • 479 篇 school of cyber ...
  • 409 篇 institute of inf...
  • 198 篇 state key labora...
  • 193 篇 college of under...
  • 93 篇 college of infor...
  • 93 篇 school of comput...
  • 90 篇 institute of cyb...
  • 88 篇 acoustic science...
  • 78 篇 science and tech...
  • 76 篇 information secu...
  • 73 篇 china informatio...
  • 72 篇 school of comput...
  • 65 篇 shandong provinc...
  • 59 篇 national key lab...
  • 55 篇 school of comput...
  • 54 篇 chinese academy ...
  • 52 篇 national key lab...
  • 52 篇 guangdong provin...
  • 49 篇 key laboratory o...
  • 46 篇 peng cheng labor...

作者

  • 79 篇 xuan qi
  • 50 篇 yang jian
  • 38 篇 das ashok kumar
  • 37 篇 guo li
  • 36 篇 yu shanqing
  • 35 篇 luo xiaonan
  • 35 篇 cao xiaochun
  • 34 篇 wang wei
  • 33 篇 zheng wei-shi
  • 32 篇 yixian yang
  • 30 篇 huang qingming
  • 28 篇 li yang
  • 27 篇 limin sun
  • 27 篇 zheng haibin
  • 26 篇 yang xiaoniu
  • 25 篇 yang yang
  • 25 篇 choo kim-kwang r...
  • 23 篇 hideki imai
  • 22 篇 qiao gang
  • 22 篇 mohammad kamrul ...

语言

  • 7,535 篇 英文
  • 315 篇 其他
  • 170 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Information Security and Engineering Technology"
8014 条 记 录,以下是1-10 订阅
排序:
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of Information Security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as ... 详细信息
来源: 评论
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 432-441页
作者: Yunhua He Yigang Yang Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu Information Science and Technology North China University of Technology Institute of Information Engineering Chinese Academy of Sciences Bei Hang University Yunnan Innovation Institute College of Cyber Security and College of Information Science and Technology Jinan University
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses, which involve the calculation of complex functions, such as matrix operations. However,... 详细信息
来源: 评论
FedCLCC:A personalized federated learning algorithm for edge cloud collaboration based on contrastive learning and conditional computing
收藏 引用
Defence technology(防务技术) 2025年 第1期43卷 80-93页
作者: Kangning Yin Xinhui Ji Yan Wang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Federated learning(FL)is a distributed machine learning paradigm for edge cloud *** can facilitate data-driven decision-making in tactical scenarios,effectively addressing both data volume and infrastructure challenge... 详细信息
来源: 评论
TransTM:A device-free method based on time-streaming multiscale transformer for human activity recognition
收藏 引用
Defence technology(防务技术) 2024年 第2期32卷 619-628页
作者: Yi Liu Weiqing Huang Shang Jiang Bobai Zhao Shuai Wang Siye Wang Yanfang Zhang Institute of Information Engineering Chinese Academy of Sciences School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina School of Information Management Beijing Information Science and Technology UniversityBeijingChina
RFID-based human activity recognition(HAR)attracts attention due to its convenience,noninvasiveness,and privacy *** RFID-based HAR methods use modeling,CNN,or LSTM to extract features ***,they have shortcomings:1)requ... 详细信息
来源: 评论
A WKB method based on parabolic cylinder function for very-low-frequency sound propagation in deep ocean
收藏 引用
Chinese Physics B 2025年 第3期34卷 433-446页
作者: Jian-Kang Zhan Sheng-Chun Piao Li-Jia Gong Yang Dong Yong-Chao Guo Guang-Xue Zheng National Key Laboratory of Underwater Acoustic Technology Harbin Engineering UniversityHarbin 150001China Key Laboratory of Marine Information Acquisition and Security(Harbin Engineering University) Ministry of Industry and Information TechnologyHarbin 150001China College of Underwater Acoustic Engineering Harbin Engineering UniversityHarbin 150001China
A Wentzel-Kramers-Brillouin(WKB)method is introduced for obtaining a uniform asymptotic solution for underwater sound propagation at very low frequencies in deep *** method utilizes a mode sum and employs the referenc... 详细信息
来源: 评论
Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第9期140卷 2613-2634页
作者: Ziqiao Zhou Tianyang Zhou Jinghao Xu Junhu Zhu Henan Key Laboratory of Information Security National Engineering Technology Research Center of the Digital Switching SystemZhengzhou450000China School of Cryptographic Engineering Information Engineering UniversityZhengzhou450000China
Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers t... 详细信息
来源: 评论
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 183-211页
作者: Murad Njoum Rossilawati Sulaiman Zarina Shukur Faizan Qamar Center of Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia Computer Science and Cyber Security Faculty of Engineering and Information TechnologyBirZeit UniversityBirZeitRamallahP.O.Box 14Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t... 详细信息
来源: 评论
Two-Layer Attention Feature Pyramid Network for Small Object Detection
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第10期141卷 713-731页
作者: Sheng Xiang Junhao Ma Qunli Shang Xianbao Wang Defu Chen College of Information Engineering Zhejiang University of TechnologyHangzhou310023China Binjiang Cyberspace Security Institute of ZJUT Hangzhou310056China
Effective small object detection is crucial in various applications including urban intelligent transportation and pedestrian ***,small objects are difficult to detect accurately because they contain less *** current ... 详细信息
来源: 评论
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 567-585页
作者: Feng Zhao Hongtao Ding Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic TechnologyGuilin541004China School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the ***,due to the open and variable nature o... 详细信息
来源: 评论