咨询与建议

限定检索结果

文献类型

  • 533 篇 会议
  • 235 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 769 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 619 篇 工学
    • 376 篇 计算机科学与技术...
    • 307 篇 软件工程
    • 225 篇 信息与通信工程
    • 126 篇 电子科学与技术(可...
    • 107 篇 电气工程
    • 68 篇 控制科学与工程
    • 54 篇 仪器科学与技术
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 36 篇 化学工程与技术
    • 34 篇 光学工程
    • 30 篇 网络空间安全
    • 26 篇 材料科学与工程(可...
    • 24 篇 动力工程及工程热...
    • 20 篇 建筑学
    • 19 篇 土木工程
    • 18 篇 安全科学与工程
    • 17 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 12 篇 力学(可授工学、理...
  • 343 篇 理学
    • 214 篇 数学
    • 94 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 47 篇 化学
    • 44 篇 生物学
    • 23 篇 系统科学
  • 142 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 20 篇 法学
    • 11 篇 社会学
  • 12 篇 农学
  • 8 篇 经济学
  • 8 篇 医学
  • 8 篇 军事学
  • 5 篇 教育学
  • 1 篇 文学

主题

  • 25 篇 cryptography
  • 18 篇 synthetic apertu...
  • 14 篇 authentication
  • 14 篇 wireless sensor ...
  • 10 篇 public key crypt...
  • 8 篇 semantics
  • 8 篇 information secu...
  • 8 篇 security
  • 7 篇 support vector m...
  • 7 篇 feature extracti...
  • 7 篇 protocols
  • 6 篇 compressed sensi...
  • 6 篇 signal to noise ...
  • 6 篇 security of data
  • 6 篇 noise
  • 6 篇 network security
  • 6 篇 forecasting
  • 6 篇 privacy
  • 5 篇 sensor nodes
  • 5 篇 polarization

机构

  • 24 篇 state key lab. o...
  • 21 篇 state key lab. o...
  • 18 篇 school of comput...
  • 17 篇 hubei key labora...
  • 17 篇 school of cyber ...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 school of comput...
  • 14 篇 services computi...
  • 14 篇 school of inform...
  • 13 篇 school of cyber ...
  • 13 篇 cluster and grid...
  • 12 篇 national univers...
  • 11 篇 key lab. of inte...
  • 10 篇 state key lab. o...
  • 10 篇 school of softwa...
  • 10 篇 school of cyber ...
  • 9 篇 key lab. of comp...
  • 9 篇 state key lab. o...
  • 9 篇 peng cheng labor...

作者

  • 16 篇 hu yupu
  • 14 篇 qingsheng liu
  • 14 篇 cao xiaochun
  • 13 篇 hu shengshan
  • 13 篇 zhang leo yu
  • 13 篇 jin hai
  • 12 篇 huang qingming
  • 12 篇 xu qianqian
  • 12 篇 li hui
  • 10 篇 yang zhiyong
  • 10 篇 wang xuesong
  • 9 篇 liu qingsheng
  • 9 篇 wang zitai
  • 9 篇 kuang gangyao
  • 8 篇 yang yang
  • 8 篇 pei qingqi
  • 8 篇 liu gaohuan
  • 8 篇 zhou ziqi
  • 8 篇 meng deyu
  • 8 篇 li minghui

语言

  • 704 篇 英文
  • 56 篇 中文
  • 9 篇 其他
检索条件"机构=Key Lab. for Information System Security"
769 条 记 录,以下是1-10 订阅
排序:
FL-PPELA: Partial Parameter Enhancement and Local Adaptive Aggregation for Personalized Federated Learning
FL-PPELA: Partial Parameter Enhancement and Local Adaptive A...
收藏 引用
PhD Symposium, Posters, Demos, and A Web for more inclusive, sustainable and prosperous societies, WEB-for-GOOD 2024 and 1st International Workshop on AI and Web Data Analytics, AIWDA 2024 form the 25th International Conference on Web information systems Engineering, WISE 2024
作者: Pan, Jinkun Liang, Xiaoyan Du, Ruizhong School of Cyber Security and Computer Hebei University Hebei070012 China Key Lab on High Trusted Information System of Hebei Province Hebei070012 China
A key challenge in federated learning is statistical heterogeneity, which affects the generalization ability of the global model on each client. To address this issue, we propose a method called Partial Parameter Enha... 详细信息
来源: 评论
Research on 1050 nm high-power narrow linewidth fiber laser based on tapered ytterbium-doped fiber  7
Research on 1050 nm high-power narrow linewidth fiber laser ...
收藏 引用
7th Optics Young Scientist Summit, OYSS 2024
作者: Ye, Yun Wang, Xiaolin Wang, Yanbin Zhou, Xuanfeng Jiang, Chenglong Zhang, Defeng Xi, Xiaoming Xu, Xiaojun State Key Lab. of Complex Electromagnetic Environment Effects on Electronics and Information System Luoyang471003 China College of Advanced Interdisciplinary Studies National University of Defense Technology Changsha410073 China
Compared to conventional uniform fibers, long tapered Yb-doped fibers (T-YDF) have outstanding potential to alleviate the detrimental nonlinear effects due to their unique mode field characteristics along the length d... 详细信息
来源: 评论
Automated Design of Complex Analog Circuits with Multiagent Based Reinforcement Learning  23
Automated Design of Complex Analog Circuits with Multiagent ...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Jinxin Zhang Jiarui Bao Zhangcheng Huang Xuan Zeng Ye Lu State Key Lab. of ASIC & System School of Information Science and Technology Frontier Institute of Chip and System State Key Lab. of ASIC & System Microelectronics Department Fudan University Shanghai China
Despite the effort of analog circuit design automation, currently complex analog circuit design still requires extensive manual iterations, making it lab.r intensive and time-consuming. Recently, reinforcement learnin... 详细信息
来源: 评论
Cross-Sensor SAR Image Target Detection Based on Dynamic Feature Discrimination and Center-Aware Calibration
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Zhang, Xianghui Zhang, Siqian Sun, Zhongzhen Liu, Chenfang Sun, Yuli Ji, Kefeng Kuang, Gangyao National University of Defense Technology State Key Lab. of Complex Electromagnetic Environment Effects on Electronics and Information System College of Electronic Science and Technology Changsha410073 China
In practical synthetic aperture radar (SAR) target detection applications, it is often encountered that the training and testing data come from different SAR sensors, leading to a decline in the SAR target detection p... 详细信息
来源: 评论
Directional Beamforming for High-Speed Railway Communications with Frequency Offset Precorrection
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 163-168页
作者: Yuan Cao Yinghong Wen Wei Xu Xin Xie School of Electronics and Information Engineering Beijing Jiaotong University National Engineering Research Center of Rail Transportation Operation and Control System Beijing China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China National Mobile Communications Research Lab. Southeast University Nanjing China
This paper considers a multi-antenna transmission strategy for high speed railway communications. In order to achieve better performance than conventional space-frequency block coding schemes, we propose a directional...
来源: 评论
Splicer+: Secure Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalab.lity
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wang, Wei Gao, Sheng Qu, Qiang Tian, Wensheng Shen, Yulong The School of Computer Science and Technology Xidian University Xi’an710071 China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China The Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China The School of Information Central University of Finance and Economics Beijing100081 China The Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China The Huawei Blockchain Lab Huawei Cloud Tech Co. Ltd. Shenzhen518055 China The Nanhu Lab Jiaxing314001 China The Cryptology and Computer Security Laboratory Shanghai Jiao Tong University Shanghai200240 China
Payment channel hub (PCH) is a promising approach for payment channel networks (PCNs) to improve efficiency by deploying robust hubs to steadily process off-chain transactions. However, existing PCHs, often preplaced ... 详细信息
来源: 评论
Cross-layer transmission and energy scheduling under full-duplex energy harvesting wireless OFDM joint transmission
收藏 引用
Science China(information Sciences) 2016年 第10期59卷 136-151页
作者: Hongjia LI Zejue WANG Dan HU Song CI Zhen XU State Key Lab of Information Security Institute of Information EngineeringChinese Academy of Sciences Cisco System Incorporated Department of Computer and Electronics Engineering University of Nebraska-Lincoln
This paper studies the design of the optimal and online cross-layer transmission and energy schedulings for a full-duplex energy harvesting wireless orthogonal frequency division multiplexing(OFDM) joint transmissions... 详细信息
来源: 评论
A file-based implementation of XML encryption
A file-based implementation of XML encryption
收藏 引用
2011 5th Malaysian Conference in Software Engineering, MySEC 2011
作者: Seak, Sea Chong Siong, Ng Kang MIMOS Berhad Information System Security Lab. Malaysia
XML is the de-facto language of business transaction and widely used as a standard format to exchange electronic documents and messages. The most popular technology about the XML is the feature of structuring data and... 详细信息
来源: 评论
key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2006年 第2期11卷 152-157页
作者: 李发根 高军涛 刘双根 胡予濮 Key Lab. of Computer Networks and Information Security Xidian Univ. Xi'an 710071 China
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... 详细信息
来源: 评论
High Order Differential Attack and Trace Attack to Block Ciphers
收藏 引用
中国电子杂志(英文版) 2001年 第3期10卷 382-384页
作者: HU Yupu CHEN Kai Xiao Guozhen Information Security and Privacy Institute ISN National Key Lab. Xidian University Xi'an 710071 China
In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's alge... 详细信息
来源: 评论