咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 617 篇 期刊文献

馆藏范围

  • 1,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 957 篇 工学
    • 689 篇 计算机科学与技术...
    • 557 篇 软件工程
    • 226 篇 信息与通信工程
    • 134 篇 电气工程
    • 115 篇 控制科学与工程
    • 91 篇 电子科学与技术(可...
    • 67 篇 生物工程
    • 60 篇 机械工程
    • 57 篇 网络空间安全
    • 42 篇 生物医学工程(可授...
    • 34 篇 仪器科学与技术
    • 32 篇 建筑学
    • 31 篇 光学工程
    • 31 篇 安全科学与工程
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 25 篇 动力工程及工程热...
    • 24 篇 土木工程
  • 426 篇 理学
    • 257 篇 数学
    • 109 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 75 篇 生物学
    • 53 篇 系统科学
  • 233 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 60 篇 法学
    • 36 篇 社会学
    • 25 篇 法学
  • 40 篇 医学
    • 35 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 19 篇 军事学
  • 14 篇 经济学
  • 12 篇 农学
  • 9 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 46 篇 feature extracti...
  • 40 篇 semantics
  • 40 篇 information secu...
  • 39 篇 cryptography
  • 35 篇 authentication
  • 32 篇 laboratories
  • 28 篇 accuracy
  • 28 篇 privacy
  • 26 篇 training
  • 23 篇 security
  • 20 篇 computer science
  • 20 篇 deep learning
  • 19 篇 computational mo...
  • 17 篇 access control
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 17 篇 data models
  • 16 篇 public key crypt...
  • 16 篇 data mining
  • 16 篇 protocols

机构

  • 104 篇 school of softwa...
  • 64 篇 tsinghua nationa...
  • 62 篇 department of co...
  • 53 篇 advanced cryptog...
  • 46 篇 key laboratory f...
  • 43 篇 state key labora...
  • 41 篇 national key lab...
  • 33 篇 school of cybers...
  • 27 篇 state key labora...
  • 26 篇 university of ch...
  • 25 篇 hubei key labora...
  • 25 篇 school of comput...
  • 25 篇 school of cyber ...
  • 24 篇 guangxi key labo...
  • 22 篇 hubei engineerin...
  • 21 篇 national enginee...
  • 20 篇 services computi...
  • 20 篇 state key labora...
  • 19 篇 key laboratory f...
  • 19 篇 school of cyber ...

作者

  • 19 篇 wang jianmin
  • 18 篇 ming gu
  • 18 篇 hu shengshan
  • 17 篇 jin hai
  • 15 篇 yunhao liu
  • 14 篇 zhang leo yu
  • 14 篇 li minghui
  • 13 篇 zhang shibin
  • 13 篇 shen linlin
  • 12 篇 wang chaokun
  • 12 篇 jianmin wang
  • 12 篇 wang bin
  • 12 篇 kuang xiaohui
  • 12 篇 zhou ziqi
  • 11 篇 zhang hui
  • 10 篇 huang yuanyuan
  • 10 篇 xiong hu
  • 10 篇 jiaguang sun
  • 10 篇 liu yan
  • 10 篇 ping luo

语言

  • 1,298 篇 英文
  • 64 篇 中文
  • 57 篇 其他
检索条件"机构=School of Software and Key Laboratory for Information System Security"
1419 条 记 录,以下是1-10 订阅
排序:
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第9期140卷 2613-2634页
作者: Ziqiao Zhou Tianyang Zhou Jinghao Xu Junhu Zhu Henan Key Laboratory of Information Security National Engineering Technology Research Center of the Digital Switching SystemZhengzhou450000China School of Cryptographic Engineering Information Engineering UniversityZhengzhou450000China
Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers t... 详细信息
来源: 评论
A new method of constructing adversarial examplesfor quantum variational circuits
收藏 引用
Chinese Physics B 2023年 第7期32卷 268-272页
作者: 颜金歌 闫丽丽 张仕斌 School of Cybersecurity Chengdu University of Information TechnologySichuan 610000China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Sichuan 610000China
A quantum variational circuit is a quantum machine learning model similar to a neural network.A crafted adversarial example can lead to incorrect results for the *** adversarial examples to train the model will greatl... 详细信息
来源: 评论
Super-resolution reconstruction of single image for latent features
收藏 引用
Computational Visual Media 2024年 第6期10卷 1219-1239页
作者: Xin Wang Jing-Ke Yan Jing-Ye Cai Jian-Hua Deng Qin Qin Yao Cheng School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610000 China State Key Laboratory of Rail Transit Vehicle System Southwest Jiaotong UniversityChengdu 610000China School of Marine Engineering Guilin University of Electronic TechnologyGuilin 541000China School of Computer and Information Security Guilin University of Electronic TechnologyGuilin 541000China
Single-image super-resolution(SISR)typically focuses on restoring various degraded low-resolution(LR)images to a single high-resolution(HR)***,during SISR tasks,it is often challenging for models to simultaneously mai... 详细信息
来源: 评论
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 407-426页
作者: Binyong Li Liangming Deng Jie Zhang Xianhui Deng School of Cybersecurity(Xin Gu Industrial College) Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225China SUGON Industrial Control and Security Center Chengdu610225China
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... 详细信息
来源: 评论
Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 13-26页
作者: Ruizhong Du Caixia Ma Mingyue Li School of Cyberspace Security and Computer and Hebei Province Key Laboratory of High Confidence Information SystemHebei UniversityBaoding 071002China College of Cyber Science Nankai UniversityTianjin 300350China
While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information *** encryption technology can perform keyword searches over encrypted data while... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of Computer Science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
Phishing detection on Ethereum via transaction subgraphs embedding
IET Blockchain
收藏 引用
IET Blockchain 2023年 第4期3卷 194-203页
作者: Lv, Haifeng Ding, Yong Guangxi Key Laboratory of Machine Vision and Intelligent Control WuZhou University Wuzhou China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Industry Software Technology WuZhou University Wuzhou China
With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective... 详细信息
来源: 评论
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on systems, Man, and Cybernetics: systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论