咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 618 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,422 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 958 篇 工学
    • 690 篇 计算机科学与技术...
    • 557 篇 软件工程
    • 226 篇 信息与通信工程
    • 134 篇 电气工程
    • 115 篇 控制科学与工程
    • 91 篇 电子科学与技术(可...
    • 67 篇 生物工程
    • 60 篇 机械工程
    • 57 篇 网络空间安全
    • 42 篇 生物医学工程(可授...
    • 34 篇 仪器科学与技术
    • 32 篇 建筑学
    • 31 篇 光学工程
    • 31 篇 安全科学与工程
    • 27 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 25 篇 动力工程及工程热...
    • 24 篇 土木工程
  • 426 篇 理学
    • 257 篇 数学
    • 109 篇 物理学
    • 76 篇 统计学(可授理学、...
    • 75 篇 生物学
    • 53 篇 系统科学
  • 233 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 107 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 60 篇 法学
    • 36 篇 社会学
    • 25 篇 法学
  • 40 篇 医学
    • 35 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 19 篇 军事学
  • 14 篇 经济学
  • 12 篇 农学
  • 9 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 46 篇 feature extracti...
  • 40 篇 semantics
  • 40 篇 information secu...
  • 39 篇 cryptography
  • 35 篇 authentication
  • 32 篇 laboratories
  • 28 篇 accuracy
  • 28 篇 privacy
  • 26 篇 training
  • 23 篇 security
  • 20 篇 computer science
  • 20 篇 deep learning
  • 19 篇 computational mo...
  • 17 篇 access control
  • 17 篇 optimization
  • 17 篇 cloud computing
  • 17 篇 data models
  • 16 篇 public key crypt...
  • 16 篇 data mining
  • 16 篇 protocols

机构

  • 104 篇 school of softwa...
  • 64 篇 tsinghua nationa...
  • 62 篇 department of co...
  • 53 篇 advanced cryptog...
  • 46 篇 key laboratory f...
  • 43 篇 state key labora...
  • 41 篇 national key lab...
  • 33 篇 school of cybers...
  • 27 篇 state key labora...
  • 26 篇 university of ch...
  • 25 篇 hubei key labora...
  • 25 篇 school of comput...
  • 25 篇 school of cyber ...
  • 24 篇 guangxi key labo...
  • 22 篇 hubei engineerin...
  • 21 篇 national enginee...
  • 20 篇 services computi...
  • 20 篇 state key labora...
  • 19 篇 key laboratory f...
  • 19 篇 school of cyber ...

作者

  • 19 篇 wang jianmin
  • 18 篇 ming gu
  • 18 篇 hu shengshan
  • 17 篇 jin hai
  • 15 篇 yunhao liu
  • 14 篇 zhang leo yu
  • 14 篇 li minghui
  • 13 篇 zhang shibin
  • 13 篇 shen linlin
  • 12 篇 wang chaokun
  • 12 篇 jianmin wang
  • 12 篇 wang bin
  • 12 篇 kuang xiaohui
  • 12 篇 zhou ziqi
  • 11 篇 zhang hui
  • 10 篇 huang yuanyuan
  • 10 篇 xiong hu
  • 10 篇 jiaguang sun
  • 10 篇 liu yan
  • 10 篇 ping luo

语言

  • 1,301 篇 英文
  • 64 篇 中文
  • 57 篇 其他
检索条件"机构=School of Software and Key Laboratory for Information System Security"
1422 条 记 录,以下是41-50 订阅
排序:
DroidMD: An efficient and scalable Android malware detection approach at source code level
收藏 引用
International Journal of information and Computer security 2021年 第2-3期15卷 299-321页
作者: Akram, Junaid Mumtaz, Majid Jabeen, Gul Luo, Ping The Key State Laboratory of Information Security School of Software Engineering Tsinghua University 100086 China
security researchers and anti-virus industries have speckled stress on an Android malware, which can actually damage your phones and threatens the Android markets. In this paper, we propose and develop DroidMD, a scal... 详细信息
来源: 评论
An improved cryptanalysis of large RSA decryption exponent with constrained secret key
收藏 引用
International Journal of information and Computer security 2021年 第2期14卷 102-117页
作者: Mumtaz, Majid Ping, Luo Key Laboratory for Information Systems Security School of Software Tsinghua University Beijing100084 China
In this study, we revisit the RSA public key cryptosystem in some special case of Boneh and Durfee's attack when the private key d assumes to be larger than the public key e. The attack in this study is the variat... 详细信息
来源: 评论
FreqSense: Universal and Low-Latency Adversarial Example Detection for Speaker Recognition with Interpretability in Frequency Domain
FreqSense: Universal and Low-Latency Adversarial Example Det...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Yihuan Li, Yuanzhe Ren, Yanzhen Tu, Weiping Yang, Yuhong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education China School of Cyber Science and Engineering Wuhan University China National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China
Speaker recognition (SR) systems are particularly vulnerable to adversarial example (AE) attacks. To mitigate these attacks, AE detection systems are typically integrated into SR systems. To overcome the limitations o... 详细信息
来源: 评论
A Reversible Data Hiding in Encryption Domain for JPEG Image Based on Controllable Ciphertext Range of Paillier Homomorphic Encryption Algorithm  21st
A Reversible Data Hiding in Encryption Domain for JPEG Ima...
收藏 引用
21st Pacific Rim International Conference on Artificial Intelligence, PRICAI 2024
作者: Ma, Bin Zhao, Chunxin Ma, Ruihe Xian, Yongjin Wang, Chunpeng Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China School of Economics Jilin University Changchun130015 China
With the rapid advancement of cloud computing, significant security concerns regarding data storage have been continuously raised. When the encrypted images are stored in the cloud, reversible data hiding in encrypted... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
Robust Network For Segmenting Roof Planes From Sparse Point Clouds  36
Robust Network For Segmenting Roof Planes From Sparse Point ...
收藏 引用
36th International Conference on software Engineering and Knowledge Engineering, SEKE 2024
作者: Fu, Hang Zeng, Cheng Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Wuhan China School of Computer and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China
The plane is the fundamental characteristic for describing the shape of polyhedral buildings. Roof plane segmentation of airborne LiDAR point clouds is an important step in 3D building model reconstruction. Existing m... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Based on Mixed Channel Attention  36
Smart Contract Vulnerability Detection Based on Mixed Channe...
收藏 引用
36th International Conference on software Engineering and Knowledge Engineering, SEKE 2024
作者: Wang, Jiao Ran Zeng, Cheng Ba, Kai Yang Quan, Qing Yu Wang, Yi Feng School of Computer Science and Information Engineering Hubei University Wuhan China School of Artificial Intelligence Hubei University Wuhan China School of Cyberspace Security Hubei University Wuhan China Key Laboratory of Intelligence Sensing System and Security Hubei University Ministry of Education Wuhan China
As blockchain technology progresses, the deployment of smart contracts has become increasingly prevalent. Despite their growing popularity, smart contracts introduce substantial security risks and vulnerabilities. Pre... 详细信息
来源: 评论
Blockchain-Based Ciphertext Policy-Hiding Access Control Scheme  1
收藏 引用
18th EAI International Conference on security and Privacy in Communication Networks, SecureComm 2022
作者: Du, Ruizhong Zhang, Tianhe School of Cyber Security and Computer Hebei University Baoding071002 China Hebei Provincial Key Laboratory of High Credibility Information System Baoding071000 China
Ciphertext policy attribute encryption(CP-ABE) can realize one-to-many fine-grained access control, which can effectively solve the security problem of shared data. However, most existing CP-ABE protocols exhibit a si... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
An Enhanced Fusion Model for Android Malware Detection Leveraging Multi-Code Fragment Features and Fuzzy Hashing  20
An Enhanced Fusion Model for Android Malware Detection Lever...
收藏 引用
20th International Computer Conference on Wavelet Active Media Technology and information Processing, ICCWAMTIP 2023
作者: Lingrong, Han Shibin, Zhang Jiazhong, Lu Yuanyuan, Huang Zhi, Qin School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China
Traditional methods for detecting Android malware require large-scale datasets and complex feature engineering, which are unable to adapt to complex malicious features. Additionally, feature engineering based on fuzzy... 详细信息
来源: 评论