咨询与建议

限定检索结果

文献类型

  • 4,919 篇 会议
  • 3,225 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 8,178 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,339 篇 工学
    • 3,894 篇 计算机科学与技术...
    • 3,177 篇 软件工程
    • 1,413 篇 信息与通信工程
    • 685 篇 控制科学与工程
    • 639 篇 电气工程
    • 564 篇 电子科学与技术(可...
    • 465 篇 生物工程
    • 390 篇 网络空间安全
    • 341 篇 机械工程
    • 275 篇 仪器科学与技术
    • 247 篇 安全科学与工程
    • 226 篇 光学工程
    • 200 篇 生物医学工程(可授...
    • 198 篇 化学工程与技术
    • 164 篇 交通运输工程
    • 153 篇 动力工程及工程热...
    • 133 篇 建筑学
    • 124 篇 土木工程
  • 2,372 篇 理学
    • 1,254 篇 数学
    • 676 篇 物理学
    • 504 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 251 篇 系统科学
    • 217 篇 化学
  • 1,286 篇 管理学
    • 763 篇 管理科学与工程(可...
    • 570 篇 图书情报与档案管...
    • 286 篇 工商管理
  • 315 篇 法学
    • 197 篇 社会学
  • 200 篇 医学
    • 161 篇 临床医学
    • 151 篇 基础医学(可授医学...
  • 124 篇 经济学
  • 98 篇 军事学
  • 68 篇 农学
  • 55 篇 教育学
  • 41 篇 文学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 244 篇 feature extracti...
  • 222 篇 security
  • 199 篇 deep learning
  • 178 篇 authentication
  • 177 篇 accuracy
  • 160 篇 semantics
  • 147 篇 machine learning
  • 139 篇 training
  • 135 篇 information secu...
  • 134 篇 computational mo...
  • 130 篇 privacy
  • 129 篇 protocols
  • 125 篇 cryptography
  • 123 篇 internet of thin...
  • 100 篇 real-time system...
  • 95 篇 blockchain
  • 94 篇 neural networks
  • 93 篇 predictive model...
  • 92 篇 network security
  • 91 篇 optimization

机构

  • 495 篇 school of cyber ...
  • 424 篇 institute of inf...
  • 196 篇 college of under...
  • 192 篇 state key labora...
  • 95 篇 school of comput...
  • 93 篇 college of infor...
  • 92 篇 institute of cyb...
  • 89 篇 acoustic science...
  • 77 篇 science and tech...
  • 76 篇 information secu...
  • 75 篇 school of comput...
  • 70 篇 china informatio...
  • 66 篇 shandong provinc...
  • 63 篇 national key lab...
  • 54 篇 chinese academy ...
  • 53 篇 school of comput...
  • 51 篇 national key lab...
  • 51 篇 guangdong provin...
  • 49 篇 key laboratory o...
  • 48 篇 peng cheng labor...

作者

  • 79 篇 xuan qi
  • 50 篇 yang jian
  • 38 篇 das ashok kumar
  • 37 篇 guo li
  • 36 篇 yu shanqing
  • 35 篇 luo xiaonan
  • 34 篇 zheng wei-shi
  • 34 篇 wang wei
  • 32 篇 yixian yang
  • 31 篇 cao xiaochun
  • 30 篇 huang qingming
  • 28 篇 li yang
  • 27 篇 limin sun
  • 26 篇 yang xiaoniu
  • 26 篇 choo kim-kwang r...
  • 25 篇 yang yang
  • 25 篇 zheng haibin
  • 23 篇 xiaochun cao
  • 23 篇 hideki imai
  • 23 篇 li xiang

语言

  • 7,474 篇 英文
  • 538 篇 其他
  • 175 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Information Security and Engineering Technology"
8178 条 记 录,以下是41-50 订阅
排序:
CL-SCA: A Contrastive Learning Approach for Profiled Side-Channel Analysis
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 5109-5122页
作者: Liu, Annyu Wang, An Sun, Shaofei Wei, Congming Ding, Yaoling Wang, Yongjuan Zhu, Liehuang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing University of Posts and Telecommunications School of Cyberspace Security Beijing100876 China Information Engineering University Institute of Cyberspace Security Zhengzhou450001 China
Side-channel analysis (SCA) based on machine learning, particularly neural networks, has gained considerable attention in recent years. However, previous works predominantly focus on establishing connections between l... 详细信息
来源: 评论
Teachers cooperation:team-knowledge distillation for multiple cross-domain few-shot learning
收藏 引用
Frontiers of Computer Science 2023年 第2期17卷 91-99页
作者: Zhong JI Jingwei NI Xiyao LIU Yanwei PANG School of Electrical and Information Engineering Tianjin UniversityTianjin 300072China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308China Tianjin Key Laboratory of Brain-Inspired Intelligence Technology Tianjin 300072China
Although few-shot learning(FSL)has achieved great progress,it is still an enormous challenge especially when the source and target set are from different domains,which is also known as cross-domain few-shot learning(C... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Solving Multi-Objective Vehicle Routing Problems with Time Windows: A Decomposition-Based Multiform Optimization Approach
收藏 引用
Tsinghua Science and technology 2024年 第2期29卷 305-324页
作者: Yiqiao Cai Zifan Lin Meiqin Cheng Peizhong Liu Ying Zhou Xiamen Key Laboratory of Data Security and Blockchain Technology College of Computer Science and TechnologyHuaqiao UniversityXiamen361021China College of Engineering Huaqiao UniversityQuanzhou362000China School of Computer Sciences Shenzhen Institute of Information TechnologyShenzhen518000China
In solving multi-objective vehicle routing problems with time windows (MOVRPTW),most existing algorithms focus on the optimization of a single problem formulation. However,little effort has been devoted to exploiting ... 详细信息
来源: 评论
Computer Vision-Based Attendance System - A Review
Computer Vision-Based Attendance System - A Review
收藏 引用
2024 Arab ICT Conference, AICTC 2024
作者: Alshamsi, Wadima M. Alghaithi, Shamma H. Alkaabi, Taif A. Almheiri, Salama R. Alshemeili, Shayma K. Hamid, Yasir Ababneh, Nedal Information Security Engineering Technology Abu Dhabi Polytechnic Abu Dhabi United Arab Emirates
Attendance systems are necessary in educational institutions to track student attendance and guarantee that students are present for lessons. Traditional attendance methods, on the other hand, are frequently inefficie... 详细信息
来源: 评论
A Novel Trustworthiness Measurement Model Based on Weight and User Feedback
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 612-625页
作者: ZHOU Wei MA Yanfang PAN Haiyu School of Computer Science and Technology Huaibei Normal University School of Computer Science and Information Engineering Changzhou Institute of Technology School of Computer Science and Information Security Guilin University of Electronic Technology
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af... 详细信息
来源: 评论
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting  26th
FirmPorter: Porting RTOSes at the Binary Level for Firmwa...
收藏 引用
26th International Conference on information and Communications security, ICICS 2024
作者: Xin, Mingfeng Wen, Hui Deng, Liting Li, Hong Li, Qiang Sun, Limin Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China
The rapid growth of the Industrial Internet of Things (IIoT) has brought real-time operating system (RTOS) into focus as major targets for both security analysts and malicious adversaries. Due to the non-standard hard... 详细信息
来源: 评论
Open World Recognition of Communication Jamming Signals
收藏 引用
China Communications 2023年 第6期20卷 199-214页
作者: Yan Tang Zhijin Zhao Jie Chen Shilian Zheng Xueyi Ye Caiyi Lou Xiaoniu Yang School of Communication Engineering Hangzhou Dianzi UniversityHangzhou 310018China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is *** algorithm can recognize known jamming classes,detect new(unknown)jamming classes,an... 详细信息
来源: 评论
An Enhanced Group Key-Based security Protocol to Protect 5G SON Against FBS
收藏 引用
Computer Systems Science & engineering 2023年 第5期45卷 1145-1165页
作者: Hoonyong Park TaeGuen Kim Daniel Gerbi Duguma Jiyoon Kim Ilsun You dWilly Susilo Department of Information Security Engineering Soonchunhyang UniversityAsan-si31538Korea Department of Financial Information Security Kookmin UniversitySeoul-si02707Korea Institute of Cybersecurity and Cryptology School of Computing and Information TechnologyUniversity of WollongongWollongong2522Australia
Network operators are attempting many innovations and changes in 5G using self-organizing networks(SON).The SON operates on the measurement reports(MR),which are obtained from user equipment(UE)and secured against mal... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论