咨询与建议

限定检索结果

文献类型

  • 6,442 篇 会议
  • 5,204 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,461 篇 工学
    • 4,237 篇 计算机科学与技术...
    • 3,368 篇 软件工程
    • 1,685 篇 信息与通信工程
    • 1,160 篇 电子科学与技术(可...
    • 1,068 篇 电气工程
    • 1,059 篇 控制科学与工程
    • 629 篇 机械工程
    • 617 篇 光学工程
    • 594 篇 生物工程
    • 575 篇 仪器科学与技术
    • 471 篇 化学工程与技术
    • 375 篇 材料科学与工程(可...
    • 364 篇 网络空间安全
    • 320 篇 生物医学工程(可授...
    • 285 篇 动力工程及工程热...
    • 251 篇 安全科学与工程
    • 227 篇 交通运输工程
    • 226 篇 建筑学
    • 225 篇 土木工程
  • 4,307 篇 理学
    • 1,918 篇 数学
    • 1,472 篇 物理学
    • 681 篇 生物学
    • 611 篇 统计学(可授理学、...
    • 465 篇 化学
    • 400 篇 系统科学
    • 319 篇 大气科学
  • 1,576 篇 管理学
    • 989 篇 管理科学与工程(可...
    • 632 篇 图书情报与档案管...
    • 317 篇 工商管理
  • 296 篇 医学
    • 241 篇 临床医学
  • 260 篇 法学
  • 159 篇 农学
  • 134 篇 军事学
  • 132 篇 经济学
  • 62 篇 教育学
  • 22 篇 艺术学
  • 18 篇 文学
  • 1 篇 历史学

主题

  • 322 篇 feature extracti...
  • 203 篇 semantics
  • 188 篇 computational mo...
  • 184 篇 deep learning
  • 139 篇 accuracy
  • 133 篇 optimization
  • 132 篇 security
  • 121 篇 neural networks
  • 116 篇 authentication
  • 115 篇 training
  • 110 篇 data mining
  • 108 篇 simulation
  • 106 篇 object detection
  • 95 篇 visualization
  • 91 篇 convolution
  • 89 篇 laboratories
  • 88 篇 predictive model...
  • 86 篇 machine learning
  • 84 篇 protocols
  • 84 篇 federated learni...

机构

  • 204 篇 shandong provinc...
  • 181 篇 university of ch...
  • 140 篇 key laboratory o...
  • 134 篇 science and tech...
  • 123 篇 hubei province k...
  • 116 篇 department of co...
  • 113 篇 school of comput...
  • 89 篇 acoustic science...
  • 87 篇 college of compu...
  • 79 篇 national key lab...
  • 78 篇 key laboratory o...
  • 73 篇 school of softwa...
  • 71 篇 school of comput...
  • 70 篇 hubei province k...
  • 69 篇 tsinghua nationa...
  • 67 篇 state key labora...
  • 66 篇 cas key laborato...
  • 65 篇 advanced cryptog...
  • 62 篇 science and tech...
  • 62 篇 school of cyber ...

作者

  • 56 篇 shuxiang guo
  • 49 篇 qizhen sun
  • 47 篇 sun qizhen
  • 45 篇 li li
  • 44 篇 chen zhibo
  • 43 篇 yang yang
  • 43 篇 ding yong
  • 43 篇 wang wei
  • 41 篇 zheng wei-shi
  • 37 篇 li yang
  • 37 篇 ming tang
  • 36 篇 bin wang
  • 33 篇 hao li
  • 30 篇 liu yang
  • 29 篇 li chen
  • 28 篇 liu dong
  • 28 篇 wei li
  • 26 篇 liu xin
  • 25 篇 wang lei
  • 25 篇 li xin

语言

  • 9,728 篇 英文
  • 1,521 篇 其他
  • 422 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Science and Technology Laboratory of Information System Security"
11653 条 记 录,以下是11-20 订阅
排序:
IMCSCL: Image-Based Malware Classification using Self-Supervised and Contrastive Learning  23
IMCSCL: Image-Based Malware Classification using Self-Superv...
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and security, QRS 2023
作者: Jia, Yetao Meng, Yangyang Zhuang, Honglin National Key Laboratory of Science and Technology on Information System Security Beijing China
The use of malware for illicit cyber activities, including network attacks and information theft, poses a severe threat to cybersecurity. In comparison to traditional malware detection methods based on signature and h... 详细信息
来源: 评论
Adversarial Example Detection for Deep Neural Networks: A Review  8
Adversarial Example Detection for Deep Neural Networks: A Re...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Zhao, Chongyang Li, Hu Wang, Dongxia Liu, Ruiqi National Key Laboratory of Science and Technology on Information System Security Beijing China
Deep neural networks have been widely applied in various critical domains. However, they are vulnerable to the threat of adversarial examples. It is challenging to make deep neural networks inherently robust to advers... 详细信息
来源: 评论
A second-order knowledge filter transfer learning algorithm for modeling nonlinear systems
收藏 引用
science China Technological sciences 2025年 第6期68卷 105-120页
作者: Honggui HAN Mengmeng LI Xiaolong WU Hongyan YANG Junfei QIAO School of Information Science and Technology Beijing University of Technology Beijing Key Laboratory of Computational Intelligence and Intelligent System Engineering Research Center of Digital Community Ministry of Education
Transfer learning algorithms can transform prior knowledge into linearization knowledge to model nonlinear systems. However, the linearization knowledge-based models tend to diverge in the process of knowledge lineari... 详细信息
来源: 评论
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar  30
m2Vib: 2D Vibration Measurement Using a Single mmWave Radar
收藏 引用
30th IEEE International Conference on Parallel and Distributed systems, ICPADS 2024
作者: Wang, Haolin Xu, Wei Li, Zezhao Yang, Yanni Huang, Zhijian Shandong University School of Computer Science and Technology Qingdao China National Key Laboratory of Science and Technology on Information System Security China
Two-dimensional vibration measurement is essential for monitoring structure and machine health, especially providing more information than those 1D solutions. However, most existing 2D vibration monitoring methods req... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
SCARE: A Novel Framework to Enhance Chinese Harmful Memes Detection
收藏 引用
IEEE Transactions on Affective Computing 2025年 第2期16卷 933-945页
作者: Gu, Tianlong Feng, Mingfeng Feng, Xuan Wang, Xuemin Jinan University College of Information Science and Technology College of Cyber Security Guangzhou510632 China Guilin University of Electronic Science and Technology College of Computer and Information Security Guilin541004 China Guilin University of Electronic Science and Technology Guangxi Key Laboratory of Trusted Software Guilin541004 China
Harmful meme detection presents a significant multimodal challenge that necessitates contextual background knowledge and comprehensive inference. Although some research studies have been related to harmful meme detect... 详细信息
来源: 评论
Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第9期140卷 2613-2634页
作者: Ziqiao Zhou Tianyang Zhou Jinghao Xu Junhu Zhu Henan Key Laboratory of Information Security National Engineering Technology Research Center of the Digital Switching SystemZhengzhou450000China School of Cryptographic Engineering Information Engineering UniversityZhengzhou450000China
Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers t... 详细信息
来源: 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and Information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China Department of Cyberspace Security Beijing Electronic Science and Technology InstituteBeijing100070China Information Security Institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 评论
Practical continuous-variable quantum key distribution with feasible optimization parameters
收藏 引用
science China(information sciences) 2023年 第8期66卷 80-91页
作者: Li MA Jie YANG Tao ZHANG Yun SHAO Jinlu LIU Yujie LUO Heng WANG Wei HUANG Fan FAN Chuang ZHOU Liangliang ZHANG Shuai ZHANG Yichen ZHANG Yang LI Bingjie XU Science and Technology on Communication Security Laboratory Institute of Southwestern Communication State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications
Continuous-variable quantum key distribution(CV-QKD) offers an approach to achieve a potential high secret key rate(SKR) in metropolitan areas. There are several challenges in developing a practical CV-QKD system from... 详细信息
来源: 评论
Design and performance evaluation of a novel ranging signal based on an LEO satellite communication constellation
收藏 引用
Geo-Spatial information science 2023年 第1期26卷 107-124页
作者: Jingfang Su Jia Su Qingwu Yi Cailun Wu Weimin Hou School of Information Science and Engineering Hebei University of Science and TechnologyShijiazhuangChina The State Key Laboratory of Satellite Navigation System and Equipment Technology ShijiazhuangChina
Driven by improvements in satellite internet and Low Earth Orbit(LEO)navigation augmenta-tion,the integration of communication and navigation has become increasingly common,and further improving navigation capabilitie... 详细信息
来源: 评论