咨询与建议

限定检索结果

文献类型

  • 1,124 篇 期刊文献
  • 1,009 篇 会议
  • 12 册 图书

馆藏范围

  • 2,145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,439 篇 工学
    • 854 篇 计算机科学与技术...
    • 716 篇 软件工程
    • 358 篇 信息与通信工程
    • 220 篇 电子科学与技术(可...
    • 216 篇 电气工程
    • 171 篇 控制科学与工程
    • 154 篇 光学工程
    • 154 篇 生物工程
    • 102 篇 机械工程
    • 101 篇 材料科学与工程(可...
    • 89 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 81 篇 仪器科学与技术
    • 71 篇 网络空间安全
    • 50 篇 动力工程及工程热...
    • 46 篇 安全科学与工程
    • 40 篇 交通运输工程
  • 814 篇 理学
    • 318 篇 物理学
    • 315 篇 数学
    • 183 篇 生物学
    • 99 篇 化学
    • 94 篇 统计学(可授理学、...
    • 57 篇 系统科学
  • 314 篇 管理学
    • 177 篇 管理科学与工程(可...
    • 141 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 91 篇 医学
    • 70 篇 临床医学
    • 59 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 71 篇 法学
    • 53 篇 社会学
  • 29 篇 经济学
  • 26 篇 农学
  • 25 篇 军事学
  • 15 篇 教育学
  • 15 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 51 篇 feature extracti...
  • 39 篇 security
  • 38 篇 training
  • 34 篇 deep learning
  • 34 篇 semantics
  • 33 篇 authentication
  • 33 篇 machine learning
  • 27 篇 object detection
  • 25 篇 accuracy
  • 22 篇 internet of thin...
  • 22 篇 network security
  • 21 篇 protocols
  • 21 篇 cryptography
  • 20 篇 support vector m...
  • 20 篇 testing
  • 19 篇 privacy
  • 18 篇 conferences
  • 18 篇 convolution
  • 18 篇 optimization
  • 18 篇 computational mo...

机构

  • 86 篇 institute of inf...
  • 84 篇 school of cyber ...
  • 42 篇 national key lab...
  • 33 篇 university of ch...
  • 33 篇 institute of com...
  • 31 篇 state key labora...
  • 29 篇 guilin huigu ins...
  • 26 篇 institute of qua...
  • 26 篇 beijing institut...
  • 25 篇 school of cyber ...
  • 24 篇 guilin universit...
  • 21 篇 national enginee...
  • 21 篇 school of comput...
  • 20 篇 national enginee...
  • 20 篇 hubei engineerin...
  • 19 篇 services computi...
  • 18 篇 guilin universit...
  • 17 篇 hubei key labora...
  • 17 篇 department of el...
  • 17 篇 national compute...

作者

  • 29 篇 guo li
  • 25 篇 luo xiaonan
  • 22 篇 cao xiaochun
  • 19 篇 hideki imai
  • 17 篇 li ji
  • 16 篇 das ashok kumar
  • 15 篇 hu shengshan
  • 15 篇 li xiang
  • 14 篇 xuan qi
  • 14 篇 mahmood khalid
  • 14 篇 zhang leo yu
  • 13 篇 shi jinqiao
  • 13 篇 wen yan
  • 13 篇 yang jian
  • 13 篇 jin hai
  • 12 篇 timofte radu
  • 12 篇 yang xiaoniu
  • 12 篇 zhao jinjing
  • 12 篇 wang qin
  • 11 篇 li guo

语言

  • 2,003 篇 英文
  • 74 篇 其他
  • 68 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=National Engineering Lab of Info-Security Technology Institute of Information Engineering"
2145 条 记 录,以下是1-10 订阅
排序:
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of Information Security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as ... 详细信息
来源: 评论
Inexact proximal gradient algorithm with random reshuffling for nonsmooth optimization
收藏 引用
Science China(information Sciences) 2025年 第1期68卷 219-237页
作者: Xia JIANG Yanyan FANG Xianlin ZENG Jian SUN Jie CHEN National Key Lab of Autonomous Intelligent Unmanned Systems School of AutomationBeijing Institute of Technology Beijing Institute of Technology Chongqing Innovation Center School of Electronic and Information Engineering Tongji University
Proximal gradient algorithms are popularly implemented to achieve convex optimization with nonsmooth regularization. Obtaining the exact solution of the proximal operator for nonsmooth regularization is challenging be... 详细信息
来源: 评论
LIGHT-YOLOv11: An Efficient S mall Object Detection Model for UAV Images  14
LIGHT-YOLOv11: An Efficient S mall Object Detection Model fo...
收藏 引用
14th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2025
作者: Dewangan, Bhimendra Srinivas, M. Computer Science and Information Security National Institute of Technology Warangal India Computer Science and Engineering National Institute of Technology Warangal India
Object recognition in UAV images is very challenging due to the frequent appearance of numerous small and truncated entities. Object detection is an essential component of computer vision for accurate object localizat... 详细信息
来源: 评论
Phishing Classification Based on Text Content of an Email Body Using Transformers
Phishing Classification Based on Text Content of an Email Bo...
收藏 引用
International Conference on information security, Privacy, and Digital Forensics, 2022
作者: Somesha, M. Pais, Alwyn R. Department of Computer Science and Engineering Information Security Research Lab National Institute of Technology Karnataka Surathkal575025 India
Phishing attacks steal sensitive credentials using different techniques, tools, and some sophisticated methods. The techniques include content injection, information re-routing, social engineering, server hacking, soc... 详细信息
来源: 评论
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science and Engineering University College of EngineeringTindivanamMelpakkamTamil nadu 604001India Department of Computer Engineering National Institute of Technology KurukshetraIndia
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri... 详细信息
来源: 评论
Research on the Cross-Correlation Characteristics of Signals from Ocean Bottom Seismometer
Research on the Cross-Correlation Characteristics of Signals...
收藏 引用
2024 OES China Ocean Acoustics, COA 2024
作者: Cao, Dejin Zhang, Haigang Xie, Jinhuai Gao, Xiao College of Underwater Acoustic Engineering Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology Key Lab. of Mar. Info. Acquisition and Security of Ministry of Industry and Information Technology Harbin China
In this study, considerable differences in waveform between vector signals and acoustic pressure signals were received from the seabed interface. The cross-correlation characteristics between the acoustic pressure and... 详细信息
来源: 评论
Differential Fault Analysis on 3DES Middle Rounds Based on Error Propagation
收藏 引用
Chinese Journal of Electronics 2022年 第1期31卷 68-78页
作者: MA Xiangliang ZHANG Lizhen WU Liji LI Xia ZHANG Xiangmin LI Bing LIU Yuling School of Integrated Circuits Tsinghua University Beijing National Research Center for Information Science and Technology National Research Center for Information Technology Security Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences
Since differential fault analysis(DFA)was first implemented on data encryption standard(DES), many scholars have improved this attack and extended the limit of the original last two rounds to the earlier rounds. Howev... 详细信息
来源: 评论
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques
收藏 引用
Journal of Cyber security and Mobility 2022年 第3期11卷 279-320页
作者: Somesha, M. Pais, Alwyn R. Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology karnataka Karnataka Surathkal575025 India
Email phishing is a cyber-attack, bringing substantial financial damage to corporate and commercial organizations. A phishing email is a special type of spamming, used to trick the user to disclose personal informatio... 详细信息
来源: 评论
Rectangle Attack Against Type-I Generalized Feistel Structures
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 713-720页
作者: ZHANG Yi LIU Guoqiang SHEN Xuan LI Chao College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences College of Information and Communication National University of Defense Technology
Type-I generalized Feistel networks(GFN) are widely used frameworks in symmetric-key primitive designs such as CAST-256 and Lesamnta. Different from the extensive studies focusing on specific block cipher instances, t... 详细信息
来源: 评论
NFVDC: A flexible and efficient NFV platform for dynamic service chaining  22
NFVDC: A flexible and efficient NFV platform for dynamic ser...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lu, Qiuwen Liu, Qingyun Fang, Binxing Chinese Academy of Sciences Institute of Information Engineering Beijing China National Engineering Research Center of Information Security Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Harbin Institute of Technology Shenzhen China
This paper presents the design and implementation of a novel Network Function Virtualization (NFV) platform, NFVDC, specifically for dynamic service chaining. Unlike traditional service chaining methods, NFVDC support... 详细信息
来源: 评论