咨询与建议

限定检索结果

文献类型

  • 1,293 篇 会议
  • 1,101 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 2,395 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,397 篇 工学
    • 794 篇 计算机科学与技术...
    • 597 篇 软件工程
    • 342 篇 信息与通信工程
    • 248 篇 电子科学与技术(可...
    • 210 篇 电气工程
    • 180 篇 控制科学与工程
    • 115 篇 光学工程
    • 109 篇 生物工程
    • 108 篇 机械工程
    • 81 篇 仪器科学与技术
    • 66 篇 材料科学与工程(可...
    • 62 篇 化学工程与技术
    • 58 篇 网络空间安全
    • 48 篇 交通运输工程
    • 48 篇 安全科学与工程
    • 45 篇 动力工程及工程热...
    • 45 篇 建筑学
    • 42 篇 生物医学工程(可授...
    • 40 篇 土木工程
  • 848 篇 理学
    • 333 篇 数学
    • 283 篇 物理学
    • 131 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 98 篇 大气科学
    • 63 篇 化学
    • 60 篇 系统科学
  • 309 篇 管理学
    • 198 篇 管理科学与工程(可...
    • 125 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
  • 56 篇 法学
  • 36 篇 农学
  • 27 篇 经济学
  • 24 篇 军事学
  • 7 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 86 篇 feature extracti...
  • 71 篇 accuracy
  • 56 篇 training
  • 53 篇 semantics
  • 50 篇 deep learning
  • 50 篇 computational mo...
  • 40 篇 data models
  • 38 篇 optimization
  • 34 篇 federated learni...
  • 33 篇 neural networks
  • 32 篇 measurement
  • 29 篇 security
  • 27 篇 laboratories
  • 27 篇 protocols
  • 25 篇 predictive model...
  • 25 篇 visualization
  • 25 篇 robustness
  • 25 篇 adaptation model...
  • 23 篇 simulation
  • 23 篇 information secu...

机构

  • 153 篇 national key lab...
  • 153 篇 key laboratory o...
  • 125 篇 shandong provinc...
  • 82 篇 school of softwa...
  • 78 篇 department of co...
  • 73 篇 tsinghua nationa...
  • 54 篇 school of comput...
  • 45 篇 school of cyber ...
  • 42 篇 university of ch...
  • 39 篇 national enginee...
  • 37 篇 key laboratory f...
  • 32 篇 shandong provinc...
  • 31 篇 hubei key labora...
  • 29 篇 national enginee...
  • 28 篇 qilu university ...
  • 28 篇 hubei engineerin...
  • 27 篇 beijing institut...
  • 26 篇 services computi...
  • 25 篇 cluster and grid...
  • 22 篇 guangdong provin...

作者

  • 31 篇 kuang xiaohui
  • 26 篇 jian song
  • 26 篇 jin hai
  • 25 篇 zhao jinjing
  • 23 篇 shen linlin
  • 22 篇 hu shengshan
  • 22 篇 dan feng
  • 21 篇 xiaohui kuang
  • 19 篇 hai jin
  • 18 篇 jinjing zhao
  • 18 篇 wang dongxia
  • 17 篇 li jin
  • 17 篇 zhang leo yu
  • 17 篇 li xiang
  • 17 篇 feng dan
  • 16 篇 ming gu
  • 16 篇 zhou ziqi
  • 15 篇 huang minhuan
  • 15 篇 xiaoming wu
  • 15 篇 li minghui

语言

  • 2,151 篇 英文
  • 152 篇 其他
  • 91 篇 中文
  • 2 篇 法文
  • 1 篇 德文
检索条件"机构=National Key Laboratory Of Science And Technology On Information System Security"
2395 条 记 录,以下是1-10 订阅
排序:
security Testing for Deep Learning Models in Multiple Scenarios  3rd
Security Testing for Deep Learning Models in Multiple Scenar...
收藏 引用
3rd International Conference on Machine Learning, Cloud Computing and Intelligent Mining, MLCCIM 2024
作者: Wu, Zhendong Li, Hu Zhang, Ming Lu, Shuaibing National Key Laboratory of Science and Technology on Information System Security Beijing China
Deep learning models are widely used in security-sensitive tasks such as facial recognition and autonomous driving. security issues in deep models could have serious implications for people’s lives, such as life-thre... 详细信息
来源: 评论
TransFlowGAN: Generation and Balancing of Network Traffic Data  24
TransFlowGAN: Generation and Balancing of Network Traffic Da...
收藏 引用
2024 Asia Pacific Conference on Computing Technologies, Communications and Networking, CTCNet 2024
作者: Zhang, Hongzheng National Key Laboratory of Science and Technology on Information System Security China
In recent years, with the rapid development of deep learning technology, researchers in the field of network security have begun to explore the use of deep learning to solve the problem of encrypted traffic classifica... 详细信息
来源: 评论
Feature Distillation GAN: An Adversarial Example Defense Method Based on Feature Reconstruction  2nd
Feature Distillation GAN: An Adversarial Example Defense Met...
收藏 引用
2nd International Conference on Network Simulation and Evaluation, NSE 2023
作者: Liu, Ruiqi Li, Hu Wang, Dongxia Zhao, Chongyang Li, Boyu National Key Laboratory of Science and Technology On Information System Security Beijing China
Purifying and reconstructing adversarial examples into benign ones by generative models is a class of defense methods to eliminate adversarial perturbations. These methods do not make assumptions on adversarial attack... 详细信息
来源: 评论
IMCSCL: Image-Based Malware Classification using Self-Supervised and Contrastive Learning  23
IMCSCL: Image-Based Malware Classification using Self-Superv...
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and security, QRS 2023
作者: Jia, Yetao Meng, Yangyang Zhuang, Honglin National Key Laboratory of Science and Technology on Information System Security Beijing China
The use of malware for illicit cyber activities, including network attacks and information theft, poses a severe threat to cybersecurity. In comparison to traditional malware detection methods based on signature and h... 详细信息
来源: 评论
Adversarial Example Detection for Deep Neural Networks: A Review  8
Adversarial Example Detection for Deep Neural Networks: A Re...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Zhao, Chongyang Li, Hu Wang, Dongxia Liu, Ruiqi National Key Laboratory of Science and Technology on Information System Security Beijing China
Deep neural networks have been widely applied in various critical domains. However, they are vulnerable to the threat of adversarial examples. It is challenging to make deep neural networks inherently robust to advers... 详细信息
来源: 评论
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar  30
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar
收藏 引用
30th IEEE International Conference on Parallel and Distributed systems, ICPADS 2024
作者: Wang, Haolin Xu, Wei Li, Zezhao Yang, Yanni Huang, Zhijian Shandong University School of Computer Science and Technology Qingdao China National Key Laboratory of Science and Technology on Information System Security China
Two-dimensional vibration measurement is essential for monitoring structure and machine health, especially providing more information than those 1D solutions. However, most existing 2D vibration monitoring methods req... 详细信息
来源: 评论
Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第9期140卷 2613-2634页
作者: Ziqiao Zhou Tianyang Zhou Jinghao Xu Junhu Zhu Henan Key Laboratory of Information Security National Engineering Technology Research Center of the Digital Switching SystemZhengzhou450000China School of Cryptographic Engineering Information Engineering UniversityZhengzhou450000China
Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers t... 详细信息
来源: 评论
Fast measurement and prediction method for electromagnetic susceptibility of receiver
收藏 引用
Journal of systems Engineering and Electronics 2024年 第2期35卷 275-285页
作者: CHEN Yan LU Zhonghao LIU Yunxia State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System College of Electronic Science and TechnologyNational University of Defense TechnologyChangsha 410073China State Key Laboratory of Astronautic Dynamics Xi’an 710043China
Aiming at evaluating and predicting rapidly and accurately a high sensitivity receiver’s adaptability in complex electromagnetic environments,a novel testing and prediction method based on dual-channel multi-frequenc... 详细信息
来源: 评论
In-memory computing based on phase change memory for high energy efficiency
收藏 引用
science China(information sciences) 2023年 第10期66卷 20-41页
作者: Luchang HE Xi LI Chenchen XIE Zhitang SONG National Key Laboratory of Materials for Integrated Circuits Shanghai Institute of Micro-System and Information Technology Chinese Academy of Sciences School of Microelectronics University of Science and Technology of China
The energy efficiency issue caused by the memory wall in traditional von Neumann architecture is difficult to reconcile. In-memory computing(CIM) based on emerging nonvolatile memory(NVM) is a promising solution to av... 详细信息
来源: 评论
Machine Learning security Analysis Framework Based on Threat Matrix  8
Machine Learning Security Analysis Framework Based on Threat...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Li, Hu Ma, Qiongmin Zhang, Ming Kuang, Xiaohui National Key Laboratory of Science and Technology on Information System Security Beijing China National Key Laboratory for Complex Systems Simulation Beijing China
Machine Learning and Artificial Intelligence technology accelerates technological progress and promotes social development, but also brings many security problems. Machine learning models may be affected, deceived, co... 详细信息
来源: 评论