咨询与建议

限定检索结果

文献类型

  • 6,404 篇 会议
  • 5,135 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,546 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,360 篇 工学
    • 4,179 篇 计算机科学与技术...
    • 3,339 篇 软件工程
    • 1,649 篇 信息与通信工程
    • 1,129 篇 电子科学与技术(可...
    • 1,031 篇 控制科学与工程
    • 1,013 篇 电气工程
    • 621 篇 机械工程
    • 600 篇 光学工程
    • 592 篇 生物工程
    • 565 篇 仪器科学与技术
    • 462 篇 化学工程与技术
    • 372 篇 材料科学与工程(可...
    • 342 篇 网络空间安全
    • 317 篇 生物医学工程(可授...
    • 280 篇 动力工程及工程热...
    • 238 篇 安全科学与工程
    • 224 篇 建筑学
    • 223 篇 土木工程
    • 214 篇 交通运输工程
  • 4,246 篇 理学
    • 1,904 篇 数学
    • 1,451 篇 物理学
    • 677 篇 生物学
    • 607 篇 统计学(可授理学、...
    • 452 篇 化学
    • 398 篇 系统科学
    • 313 篇 大气科学
  • 1,555 篇 管理学
    • 970 篇 管理科学与工程(可...
    • 628 篇 图书情报与档案管...
    • 315 篇 工商管理
  • 289 篇 医学
    • 237 篇 临床医学
  • 255 篇 法学
  • 160 篇 农学
  • 134 篇 军事学
  • 131 篇 经济学
  • 61 篇 教育学
  • 22 篇 艺术学
  • 18 篇 文学
  • 1 篇 历史学

主题

  • 321 篇 feature extracti...
  • 204 篇 semantics
  • 187 篇 computational mo...
  • 176 篇 deep learning
  • 137 篇 accuracy
  • 130 篇 optimization
  • 129 篇 security
  • 120 篇 neural networks
  • 117 篇 training
  • 115 篇 authentication
  • 109 篇 data mining
  • 108 篇 simulation
  • 105 篇 object detection
  • 96 篇 visualization
  • 91 篇 convolution
  • 89 篇 laboratories
  • 88 篇 predictive model...
  • 85 篇 machine learning
  • 83 篇 protocols
  • 82 篇 information secu...

机构

  • 204 篇 shandong provinc...
  • 181 篇 university of ch...
  • 137 篇 science and tech...
  • 132 篇 key laboratory o...
  • 123 篇 hubei province k...
  • 116 篇 department of co...
  • 112 篇 school of comput...
  • 89 篇 acoustic science...
  • 86 篇 college of compu...
  • 80 篇 national key lab...
  • 78 篇 key laboratory o...
  • 75 篇 school of softwa...
  • 72 篇 state key labora...
  • 71 篇 school of comput...
  • 69 篇 hubei province k...
  • 69 篇 tsinghua nationa...
  • 67 篇 cas key laborato...
  • 65 篇 advanced cryptog...
  • 62 篇 science and tech...
  • 61 篇 school of optica...

作者

  • 56 篇 shuxiang guo
  • 49 篇 qizhen sun
  • 47 篇 sun qizhen
  • 45 篇 li li
  • 44 篇 chen zhibo
  • 43 篇 yang yang
  • 43 篇 ding yong
  • 43 篇 wang wei
  • 41 篇 zheng wei-shi
  • 38 篇 ming tang
  • 37 篇 li yang
  • 36 篇 bin wang
  • 33 篇 hao li
  • 30 篇 liu yang
  • 29 篇 li chen
  • 28 篇 liu dong
  • 28 篇 wei li
  • 26 篇 wang lei
  • 25 篇 li xin
  • 25 篇 liu xin

语言

  • 10,037 篇 英文
  • 1,098 篇 其他
  • 413 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Science and Technology Laboratory of Information System Security"
11546 条 记 录,以下是1-10 订阅
排序:
security Testing for Deep Learning Models in Multiple Scenarios  3rd
Security Testing for Deep Learning Models in Multiple Scenar...
收藏 引用
3rd International Conference on Machine Learning, Cloud Computing and Intelligent Mining, MLCCIM 2024
作者: Wu, Zhendong Li, Hu Zhang, Ming Lu, Shuaibing National Key Laboratory of Science and Technology on Information System Security Beijing China
Deep learning models are widely used in security-sensitive tasks such as facial recognition and autonomous driving. security issues in deep models could have serious implications for people’s lives, such as life-thre... 详细信息
来源: 评论
TransFlowGAN: Generation and Balancing of Network Traffic Data  24
TransFlowGAN: Generation and Balancing of Network Traffic Da...
收藏 引用
2024 Asia Pacific Conference on Computing Technologies, Communications and Networking, CTCNet 2024
作者: Zhang, Hongzheng National Key Laboratory of Science and Technology on Information System Security China
In recent years, with the rapid development of deep learning technology, researchers in the field of network security have begun to explore the use of deep learning to solve the problem of encrypted traffic classifica... 详细信息
来源: 评论
Feature Distillation GAN: An Adversarial Example Defense Method Based on Feature Reconstruction  2nd
Feature Distillation GAN: An Adversarial Example Defense Met...
收藏 引用
2nd International Conference on Network Simulation and Evaluation, NSE 2023
作者: Liu, Ruiqi Li, Hu Wang, Dongxia Zhao, Chongyang Li, Boyu National Key Laboratory of Science and Technology On Information System Security Beijing China
Purifying and reconstructing adversarial examples into benign ones by generative models is a class of defense methods to eliminate adversarial perturbations. These methods do not make assumptions on adversarial attack... 详细信息
来源: 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and Technology Changchun University of Science and TechnologyChangchun 130012China Key Laboratory of Network and Information Security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 评论
Efficient and secure confidential transaction scheme based on commitment and aggregated zero-knowledge proofs
收藏 引用
Journal of Cyber security technology 2024年 第4期8卷 312-332页
作者: Yong, Wang Lijie, Chen Yifan, Wu Qiancheng, Wan School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Cryptography and Information Security Guilin China
As a distributed ledger technology, blockchain has broad applications in many areas such as finance, agriculture, and contract signing due to its advantages of being tamperproof and difficult to forge. However, the op... 详细信息
来源: 评论
Experimental demonstration of 220-GHz terahertz signals wireless transmission over 4.6 km
收藏 引用
science China(information sciences) 2025年 第1期68卷 386-388页
作者: Yi WEI Jianjun YU Mingxu WANG Xiongwei YANG Qiutong ZHANG Jingwen TAN Bing ZHANG Ying WU Yang HAN Peng TIAN Wen ZHOU Kaihui WANG Feng ZHAO State Key Laboratory of ASIC and System Key Laboratory for Information Science of Electromagnetic Waves (MoE)School of Information Science and Technology Fudan University School of Electronic Engineering Xi'an University of Posts and Telecommunications
The advancement of terahertz (THz) communication technology drives the evolution of wireless communication systems,offering novel pathways and technical means for the development of future 6G communication *** wireles... 详细信息
来源: 评论
A backdoor attack against quantum neural networks with limited information
收藏 引用
Chinese Physics B 2023年 第10期32卷 219-228页
作者: 黄晨猗 张仕斌 College of Cyberspace Security Chengdu University of Information TechnologyChengdu 610225China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu 610225China
Backdoor attacks are emerging security threats to deep neural *** these attacks,adversaries manipulate the network by constructing training samples embedded with backdoor *** backdoored model performs as expected on c... 详细信息
来源: 评论
Robust tube-based MPC with smooth computation for dexterous robot manipulation
收藏 引用
science China(information sciences) 2024年 第11期67卷 252-268页
作者: Yu LUO Tianying JI Fuchun SUN Qie SIMA Huaping LIU Mingxuan JING Jianwei ZHANG Department of Computer Science and Technology Tsinghua University Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Department of Informatics University of Hamburg
Dexterous robot manipulation has shone in complex industrial scenarios, where multiple manipulators, or fingers, cooperate to grasp and manipulate objects. When encountering multi-objective optimization with system co... 详细信息
来源: 评论
Online Fault-Tolerant Tracking Control With Adaptive Critic for Nonaffine Nonlinear systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 215-227页
作者: Ding Wang Lingzhi Hu Xiaoli Li Junfei Qiao IEEE the School of Information Science and Technology Beijing Key Laboratory of Computational Intelligence and Intelligent SystemBeijing Laboratory of Smart Environmental Protection and Beijing Institute of Artificial Intelligence Beijing University of Technology
In this paper, a fault-tolerant-based online critic learning algorithm is developed to solve the optimal tracking control issue for nonaffine nonlinear systems with actuator ***, a novel augmented plant is constructed... 详细信息
来源: 评论
Deep radio signal clustering with interpretability analysis based on saliency map
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1448-1458页
作者: Huaji Zhou Jing Bai Yiran Wang Junjie Ren Xiaoniu Yang Licheng Jiao School of Artificial Intelligence Xidian UniversityXi’an710071China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033China
With the development of information technology,radio communication technology has made rapid *** radio signals that have appeared in space are difficult to classify without manually *** radio signal clustering methods... 详细信息
来源: 评论