咨询与建议

限定检索结果

文献类型

  • 4,849 篇 会议
  • 3,162 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 8,045 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,237 篇 工学
    • 3,816 篇 计算机科学与技术...
    • 3,141 篇 软件工程
    • 1,377 篇 信息与通信工程
    • 628 篇 控制科学与工程
    • 615 篇 电气工程
    • 546 篇 电子科学与技术(可...
    • 464 篇 生物工程
    • 377 篇 网络空间安全
    • 337 篇 机械工程
    • 273 篇 仪器科学与技术
    • 242 篇 安全科学与工程
    • 224 篇 光学工程
    • 200 篇 生物医学工程(可授...
    • 195 篇 化学工程与技术
    • 158 篇 交通运输工程
    • 146 篇 动力工程及工程热...
    • 134 篇 建筑学
    • 125 篇 土木工程
  • 2,344 篇 理学
    • 1,240 篇 数学
    • 667 篇 物理学
    • 502 篇 生物学
    • 404 篇 统计学(可授理学、...
    • 250 篇 系统科学
    • 209 篇 化学
  • 1,258 篇 管理学
    • 745 篇 管理科学与工程(可...
    • 559 篇 图书情报与档案管...
    • 279 篇 工商管理
  • 312 篇 法学
    • 195 篇 社会学
  • 197 篇 医学
    • 160 篇 临床医学
    • 150 篇 基础医学(可授医学...
  • 123 篇 经济学
  • 99 篇 军事学
  • 67 篇 农学
  • 52 篇 教育学
  • 41 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 241 篇 feature extracti...
  • 220 篇 security
  • 189 篇 deep learning
  • 176 篇 authentication
  • 173 篇 accuracy
  • 158 篇 semantics
  • 147 篇 machine learning
  • 137 篇 training
  • 136 篇 information secu...
  • 130 篇 computational mo...
  • 129 篇 privacy
  • 128 篇 protocols
  • 128 篇 cryptography
  • 123 篇 internet of thin...
  • 100 篇 real-time system...
  • 94 篇 neural networks
  • 94 篇 blockchain
  • 93 篇 network security
  • 92 篇 predictive model...
  • 89 篇 optimization

机构

  • 479 篇 school of cyber ...
  • 410 篇 institute of inf...
  • 198 篇 state key labora...
  • 195 篇 college of under...
  • 93 篇 college of infor...
  • 93 篇 school of comput...
  • 90 篇 institute of cyb...
  • 89 篇 acoustic science...
  • 78 篇 science and tech...
  • 76 篇 information secu...
  • 72 篇 school of comput...
  • 71 篇 china informatio...
  • 65 篇 shandong provinc...
  • 60 篇 national key lab...
  • 54 篇 chinese academy ...
  • 53 篇 school of comput...
  • 52 篇 national key lab...
  • 51 篇 guangdong provin...
  • 48 篇 key laboratory o...
  • 47 篇 peng cheng labor...

作者

  • 79 篇 xuan qi
  • 49 篇 yang jian
  • 38 篇 das ashok kumar
  • 37 篇 guo li
  • 36 篇 yu shanqing
  • 35 篇 luo xiaonan
  • 34 篇 wang wei
  • 34 篇 cao xiaochun
  • 33 篇 zheng wei-shi
  • 32 篇 yixian yang
  • 30 篇 huang qingming
  • 28 篇 li yang
  • 27 篇 limin sun
  • 27 篇 zheng haibin
  • 26 篇 yang xiaoniu
  • 25 篇 yang yang
  • 25 篇 choo kim-kwang r...
  • 23 篇 hideki imai
  • 22 篇 xiaochun cao
  • 22 篇 qiao gang

语言

  • 7,566 篇 英文
  • 315 篇 其他
  • 170 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Information Security and Engineering Technology"
8045 条 记 录,以下是11-20 订阅
排序:
A Novel S-Box GenerationMethodology Based on the Optimized GANModel
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1911-1927页
作者: Runlian Zhang Rui Shu Yongzhuang Wei Hailong Zhang Xiaonian Wu Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing100085China
S-boxes can be the core component of block ciphers,and how to efficiently generate S-boxes with strong cryptographic properties appears to be an important task in the design of block *** this work,an optimized model b... 详细信息
来源: 评论
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
Cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论
TMC-GCN: Encrypted Traffic Mapping Classification Method Based on Graph Convolutional Networks
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 3179-3201页
作者: Baoquan Liu Xi Chen Qingjun Yuan Degang Li Chunxiang Gu School of Cyberspace Security Zhengzhou UniversityZhengzhou450002China School of Cyberspace Security Information Engineering UniversityZhengzhou450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001China
With the emphasis on user privacy and communication security, encrypted traffic has increased dramatically, which brings great challenges to traffic classification. The classification method of encrypted traffic based... 详细信息
来源: 评论
A Fault-Tolerant Group Key Management Scheme for the Internet of Things Based on Multi-Layer Blockchain
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18004-18018页
作者: Hou, Zhiwen Pei, Tingrui Li, Ming Wei, Kaimin Chen, Yingyang Cao, Sixing Jinan University College of Cyber Security Guangzhou510632 China Jinan University The Natl. Joint Engineering Research Center of Network Security Detection and Protection Technology College of Information Science and Technology Jinan University College of Cyber Security Guangzhou510632 China Jinan University College of Information Science and Technology Guangzhou510632 China
The importance of group communication in the context of the Internet of Things (IoT) is growing, yet the security and stability of this communication are facing significant challenges. The prevailing distributed group... 详细信息
来源: 评论
A verifiable EVM-based cross-language smart contract implementation scheme for matrix calculation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 432-441页
作者: Yunhua He Yigang Yang Chao Wang Anke Xie Li Ma Bin Wu Yongdong Wu Information Science and Technology North China University of TechnologyBeijing100144China Bei Hang University Yunnan Innovation Institute Yunnan650233China Institute of Information Engineering Chinese Academy of SciencesBeijing101408China College of Cyber Security and College of Information Science and Technology Jinan UniversityGuangzhou510632China
The wide application of smart contracts allows industry companies to implement some complex distributed collaborative businesses,which involve the calculation of complex functions,such as matrix ***,complex functions ... 详细信息
来源: 评论
Randomization Strategies in Image Steganography Techniques:A Review
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3139-3171页
作者: AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)BangiSelangor43600Malaysia Department of Information and Communication Engineering Pabna University of Science and TechnologyPabna6600Bangladesh
Image steganography is one of the prominent technologies in data hiding *** system performance mostly depends on the embedding *** goal is to embed strictly confidential information into images without causing percept... 详细信息
来源: 评论
Redundant Node Scheduling Algorithm for Wireless Sensor Networks Based on Topology Structure
收藏 引用
IEEE Access 2025年 13卷 84752-84764页
作者: Shi, Lijuan Zheng, Jun Changzhou College of Information Technology School of Cyberspace Security Changzhou213164 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information engineering Nanjing210016 China
Wireless sensor networks face issues such as high energy consumption and the impact of individual node failures on the entire network. In order to effectively regulate redundant nodes to balance node coverage and ener... 详细信息
来源: 评论
A new edge weight-based measure for k-shell influential node identification in complex networks
收藏 引用
International Journal of security and Networks 2024年 第1期19卷 1-9页
作者: Xiong, Yang Cheng, Yang School of Cyberspace Security Changzhou College of Information Technology Changzhou213164 China School of Computer and Information Engineering Changzhou Institute of Technology Changzhou213002 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China
There are mainly two problems with traditional k-shell centrality in complex networks. First, the traditional k-shell centrality divides many nodes into the same shell layer, which cannot accurately distinguish the pr... 详细信息
来源: 评论
Comprehensive Risk Evaluation Model for Data Center security Risk Assessment  10
Comprehensive Risk Evaluation Model for Data Center Security...
收藏 引用
10th International Conference on Wireless and Telematics, ICWT 2024
作者: Hussaini, Sayed Shoaib Raharjo, Budi Institute of Technology Bandung Management Engineering and Information Security Bandung Indonesia
Data centers play a crucial role in modern organizations by storing and processing large volumes of sensitive information. However, the evolving threat landscape and the increasing sophistication of cyberattacks pose ... 详细信息
来源: 评论
Spectrum fragmentation-aware dynamic network slicing deployment in computing power networks based on elastic optical networks
收藏 引用
Journal of Optical Communications 2025年 第2期46卷 335-346页
作者: Wang, Laiming Zhang, Haojie Li, Lei Ren, Danping Hu, Jinhua Zhao, Jijun School of Information and Electrical Engineering Hebei University of Engineering Handan056038 China Hebei Key Laboratory of Security and Protection Information Sensing and Processing Handan056038 China Beijing KELIBANG Information Technology Corporation Limited Beijing10081 China
The widespread application of AI with high computing requirements has driven the rapid development of the computing field. Computing Power Networks (CPNs) have been recognized as solutions to providing on-demand compu... 详细信息
来源: 评论