咨询与建议

限定检索结果

文献类型

  • 4,919 篇 会议
  • 3,225 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 8,178 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,339 篇 工学
    • 3,894 篇 计算机科学与技术...
    • 3,177 篇 软件工程
    • 1,413 篇 信息与通信工程
    • 685 篇 控制科学与工程
    • 639 篇 电气工程
    • 564 篇 电子科学与技术(可...
    • 465 篇 生物工程
    • 390 篇 网络空间安全
    • 341 篇 机械工程
    • 275 篇 仪器科学与技术
    • 247 篇 安全科学与工程
    • 226 篇 光学工程
    • 200 篇 生物医学工程(可授...
    • 198 篇 化学工程与技术
    • 164 篇 交通运输工程
    • 153 篇 动力工程及工程热...
    • 133 篇 建筑学
    • 124 篇 土木工程
  • 2,372 篇 理学
    • 1,254 篇 数学
    • 676 篇 物理学
    • 504 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 251 篇 系统科学
    • 217 篇 化学
  • 1,286 篇 管理学
    • 763 篇 管理科学与工程(可...
    • 570 篇 图书情报与档案管...
    • 286 篇 工商管理
  • 315 篇 法学
    • 197 篇 社会学
  • 200 篇 医学
    • 161 篇 临床医学
    • 151 篇 基础医学(可授医学...
  • 124 篇 经济学
  • 98 篇 军事学
  • 68 篇 农学
  • 55 篇 教育学
  • 41 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 244 篇 feature extracti...
  • 222 篇 security
  • 199 篇 deep learning
  • 178 篇 authentication
  • 177 篇 accuracy
  • 160 篇 semantics
  • 147 篇 machine learning
  • 139 篇 training
  • 135 篇 information secu...
  • 134 篇 computational mo...
  • 130 篇 privacy
  • 129 篇 protocols
  • 125 篇 cryptography
  • 123 篇 internet of thin...
  • 100 篇 real-time system...
  • 95 篇 blockchain
  • 94 篇 neural networks
  • 93 篇 predictive model...
  • 92 篇 network security
  • 91 篇 optimization

机构

  • 495 篇 school of cyber ...
  • 424 篇 institute of inf...
  • 196 篇 college of under...
  • 192 篇 state key labora...
  • 95 篇 school of comput...
  • 93 篇 college of infor...
  • 92 篇 institute of cyb...
  • 89 篇 acoustic science...
  • 77 篇 science and tech...
  • 76 篇 information secu...
  • 75 篇 school of comput...
  • 70 篇 china informatio...
  • 66 篇 shandong provinc...
  • 63 篇 national key lab...
  • 54 篇 chinese academy ...
  • 53 篇 school of comput...
  • 51 篇 national key lab...
  • 51 篇 guangdong provin...
  • 49 篇 key laboratory o...
  • 48 篇 peng cheng labor...

作者

  • 79 篇 xuan qi
  • 50 篇 yang jian
  • 38 篇 das ashok kumar
  • 37 篇 guo li
  • 36 篇 yu shanqing
  • 35 篇 luo xiaonan
  • 34 篇 zheng wei-shi
  • 34 篇 wang wei
  • 32 篇 yixian yang
  • 31 篇 cao xiaochun
  • 30 篇 huang qingming
  • 28 篇 li yang
  • 27 篇 limin sun
  • 26 篇 yang xiaoniu
  • 26 篇 choo kim-kwang r...
  • 25 篇 yang yang
  • 25 篇 zheng haibin
  • 23 篇 xiaochun cao
  • 23 篇 hideki imai
  • 23 篇 li xiang

语言

  • 7,474 篇 英文
  • 538 篇 其他
  • 175 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Information Security and Engineering Technology"
8178 条 记 录,以下是31-40 订阅
排序:
PL-attack: Projected Light-based Adversarial Attacks against Deep Neural Networks in the Physical World  24
PL-attack: Projected Light-based Adversarial Attacks against...
收藏 引用
3rd International Conference on Algorithms, Data Mining, and information technology, ADMIT 2024
作者: Huang, Haojie Chen, Jinyin Zheng, Haibin Chen, Yixin Huang, Haoben College of Information Engineering Zhejiang University of Technology China Institute of Cyberspace Security Zhejiang University of Technology China
The rapid development of artificial intelligence has led to the increasing application of image recognition in autonomous driving and surveillance. However, these systems are often vulnerable to adversarial attacks. I... 详细信息
来源: 评论
In‑depth Correlation Power Analysis Attacks on a Hardware Implementation of CRYSTALS‑Dilithium
收藏 引用
Cybersecurity 2025年 第2期8卷 229-241页
作者: Huaxin Wang Yiwen Gao Yuejun Liu Qian Zhang Yongbin Zhou School of Cyber Science and Engineering Nanjing University of Science and TechnologyNanjingChina Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
During the standardisation process of post-quantum cryptography,NIST encourages research on side-channel analysis for candidate *** the recommended lattice signature scheme,CRYSTALS-Dilithium,when implemented on hardw... 详细信息
来源: 评论
Boosting for Distributed Online Convex Optimization
收藏 引用
Tsinghua Science and technology 2023年 第4期28卷 811-821页
作者: Yuhan Hu Yawei Zhao Lailong Luo Deke Guo Science and Technology on Information Systems Engineering Laboratory National University of Defense TechnologyChangsha 410073China Medical Engineering Laboratory of Chinese PLA General Hospital and also with the School of Cyberspace SecurityDongguan University of TechnologyDongguan 523000China
Decentralized Online Learning(DOL)extends online learning to the domain of distributed ***,limitations of local data in decentralized settings lead to a decrease in the accuracy of decisions or models compared to cent... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Incremental Learning of Radio Modulation Classification Based on Sample Recall
收藏 引用
China Communications 2023年 第7期20卷 258-272页
作者: Yan Zhao Shichuan Chen Tao Chen Weiguo Shen Shilian Zheng Zhijin Zhao Xiaoniu Yang School of Communication Engineering Hangzhou Dianzi UniversityHangzhou 310018China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China Institute of Cyberspace Security Zhejiang University of TechnologyHangzhou 310023China
Radio modulation classification has always been an important technology in the field of *** difficulty of incremental learning in radio modulation classification is that learning new tasks will lead to catastrophic fo... 详细信息
来源: 评论
Differential Fault Analysis on 3DES Middle Rounds Based on Error Propagation
收藏 引用
Chinese Journal of Electronics 2022年 第1期31卷 68-78页
作者: MA Xiangliang ZHANG Lizhen WU Liji LI Xia ZHANG Xiangmin LI Bing LIU Yuling School of Integrated Circuits Tsinghua University Beijing National Research Center for Information Science and Technology National Research Center for Information Technology Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Since differential fault analysis(DFA)was first implemented on data encryption standard(DES), many scholars have improved this attack and extended the limit of the original last two rounds to the earlier rounds. Howev... 详细信息
来源: 评论
Code-Based Conjunction Obfuscation
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 237-247页
作者: ZHANG Zheng ZHANG Zhuoran ZHANG Fangguo School of Computer Science and Engineering Sun Yat-sen University Guangdong Province Key Laboratory of Information Security Technology
The pattern-matching problem with wildcards can be formulated as a conjunction where an accepting string is same as the pattern for all non-wildcards. A scheme of conjunction obfuscation is a algorithm that “encrypt... 详细信息
来源: 评论
Energy Efficiency Maximization for Cooperative NOMA with Hardware Impairments
收藏 引用
China Communications 2024年 第12期21卷 80-91页
作者: Wang Zhengqiang Chang Ruifei Wan Xiaoyu Fan Zifu Duo Bin School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this... 详细信息
来源: 评论
Super-resolution reconstruction of single image for latent features
收藏 引用
Computational Visual Media 2024年 第6期10卷 1219-1239页
作者: Xin Wang Jing-Ke Yan Jing-Ye Cai Jian-Hua Deng Qin Qin Yao Cheng School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610000 China State Key Laboratory of Rail Transit Vehicle System Southwest Jiaotong UniversityChengdu 610000China School of Marine Engineering Guilin University of Electronic TechnologyGuilin 541000China School of Computer and Information Security Guilin University of Electronic TechnologyGuilin 541000China
Single-image super-resolution(SISR)typically focuses on restoring various degraded low-resolution(LR)images to a single high-resolution(HR)***,during SISR tasks,it is often challenging for models to simultaneously mai... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论