咨询与建议

限定检索结果

文献类型

  • 6,442 篇 会议
  • 5,204 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,461 篇 工学
    • 4,237 篇 计算机科学与技术...
    • 3,368 篇 软件工程
    • 1,685 篇 信息与通信工程
    • 1,160 篇 电子科学与技术(可...
    • 1,068 篇 电气工程
    • 1,059 篇 控制科学与工程
    • 629 篇 机械工程
    • 617 篇 光学工程
    • 594 篇 生物工程
    • 575 篇 仪器科学与技术
    • 471 篇 化学工程与技术
    • 375 篇 材料科学与工程(可...
    • 364 篇 网络空间安全
    • 320 篇 生物医学工程(可授...
    • 285 篇 动力工程及工程热...
    • 251 篇 安全科学与工程
    • 227 篇 交通运输工程
    • 226 篇 建筑学
    • 225 篇 土木工程
  • 4,307 篇 理学
    • 1,918 篇 数学
    • 1,472 篇 物理学
    • 681 篇 生物学
    • 611 篇 统计学(可授理学、...
    • 465 篇 化学
    • 400 篇 系统科学
    • 319 篇 大气科学
  • 1,576 篇 管理学
    • 989 篇 管理科学与工程(可...
    • 632 篇 图书情报与档案管...
    • 317 篇 工商管理
  • 296 篇 医学
    • 241 篇 临床医学
  • 260 篇 法学
  • 159 篇 农学
  • 134 篇 军事学
  • 132 篇 经济学
  • 62 篇 教育学
  • 22 篇 艺术学
  • 18 篇 文学
  • 1 篇 历史学

主题

  • 322 篇 feature extracti...
  • 203 篇 semantics
  • 188 篇 computational mo...
  • 184 篇 deep learning
  • 139 篇 accuracy
  • 133 篇 optimization
  • 132 篇 security
  • 121 篇 neural networks
  • 116 篇 authentication
  • 115 篇 training
  • 110 篇 data mining
  • 108 篇 simulation
  • 106 篇 object detection
  • 95 篇 visualization
  • 91 篇 convolution
  • 89 篇 laboratories
  • 88 篇 predictive model...
  • 86 篇 machine learning
  • 84 篇 protocols
  • 84 篇 federated learni...

机构

  • 204 篇 shandong provinc...
  • 181 篇 university of ch...
  • 140 篇 key laboratory o...
  • 134 篇 science and tech...
  • 123 篇 hubei province k...
  • 116 篇 department of co...
  • 113 篇 school of comput...
  • 89 篇 acoustic science...
  • 87 篇 college of compu...
  • 79 篇 national key lab...
  • 78 篇 key laboratory o...
  • 73 篇 school of softwa...
  • 71 篇 school of comput...
  • 70 篇 hubei province k...
  • 69 篇 tsinghua nationa...
  • 67 篇 state key labora...
  • 66 篇 cas key laborato...
  • 65 篇 advanced cryptog...
  • 62 篇 science and tech...
  • 62 篇 school of cyber ...

作者

  • 56 篇 shuxiang guo
  • 49 篇 qizhen sun
  • 47 篇 sun qizhen
  • 45 篇 li li
  • 44 篇 chen zhibo
  • 43 篇 yang yang
  • 43 篇 ding yong
  • 43 篇 wang wei
  • 41 篇 zheng wei-shi
  • 37 篇 li yang
  • 37 篇 ming tang
  • 36 篇 bin wang
  • 33 篇 hao li
  • 30 篇 liu yang
  • 29 篇 li chen
  • 28 篇 liu dong
  • 28 篇 wei li
  • 26 篇 liu xin
  • 25 篇 wang lei
  • 25 篇 li xin

语言

  • 9,728 篇 英文
  • 1,521 篇 其他
  • 422 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Science and Technology Laboratory of Information System Security"
11653 条 记 录,以下是31-40 订阅
排序:
Robust and Verifiable Privacy Federated Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1895-1908页
作者: Lu, Zhi Lu, Songfeng Tang, Xueming Wu, Junjun Huazhong University of Science and Technology Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan430074 China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518063 China
Federated learning (FL) safeguards user privacy by uploading gradients instead of raw data. However, inference attacks can reconstruct raw data using gradients uploaded by users in FL. To mitigate this issue, research... 详细信息
来源: 评论
AWG-based large dynamic range fiber Bragg grating interrogation system
收藏 引用
Optoelectronics Letters 2024年 第3期20卷 129-134页
作者: LI Shufeng YUAN Pei LI Ke LI Ting ZHU Lianqing Key Laboratory of the Ministry of Education for Optoelectronic Measurement Technology and Instrument Beijing Information Science&Technology UniversityBeijing 100192China Beijing Laboratory of Optical Fiber Sensing and System Beijing Information Science&Technology UniversityBeijing 100016China
Arrayed waveguide gratings(AWGs) are extensively employed in fiber Bragg grating(FBG) interrogation systems due to their compact size, lightweight nature, and excellent interrogation performance. The resolution and to... 详细信息
来源: 评论
Random Probing security with Precomputation
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded systems 2025年 第1期2025卷 523-551页
作者: Wang, Bohan Ji, Fanjie Sun, Yiteng Wang, Weijia School of Cyber Science and Technology Shandong University Qingdao China Quan Cheng Laboratory Jinan China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China
At Eurocrypt 2014, Duc, Dziembowski and Faust proposed the random probing model to bridge the gap between the probing model proposed at Crypto 2003 and the noisy model proposed at Eurocrypt 2013. Compared with the pro... 详细信息
来源: 评论
Low-overhead fault-tolerant error correction scheme based on quantum stabilizer codes
收藏 引用
Chinese Physics B 2022年 第4期31卷 143-150页
作者: Xiu-Bo Chen Li-Yun Zhao Gang Xu Xing-Bo Pan Si-Yi Chen Zhen-Wen Cheng Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China School of Information Science and Technology North China University of TechnologyBeijing 100144China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu 610025China
Fault-tolerant error-correction(FTEC)circuit is the foundation for achieving reliable quantum computation and remote ***,designing a fault-tolerant error correction scheme with a solid error-correction ability and low... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Fast measurement and prediction method for electromagnetic susceptibility of receiver
收藏 引用
Journal of systems Engineering and Electronics 2024年 第2期35卷 275-285页
作者: CHEN Yan LU Zhonghao LIU Yunxia State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System College of Electronic Science and TechnologyNational University of Defense TechnologyChangsha 410073China State Key Laboratory of Astronautic Dynamics Xi’an 710043China
Aiming at evaluating and predicting rapidly and accurately a high sensitivity receiver’s adaptability in complex electromagnetic environments,a novel testing and prediction method based on dual-channel multi-frequenc... 详细信息
来源: 评论
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks  35
Fine-Grained Source Code Vulnerability Detection via Graph N...
收藏 引用
35th International Conference on Software Engineering and Knowledge Engineering, SEKE 2023
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanpin Kuang, Xiaohui Li, Xiang Zhong, Wenjing National Key Laboratory of Science and Technology Information System Security Beijing China Xidian University Xi’an China
Although the number of exploitable vulnerabilities in software continues to increase, the speed of bug fixes and software updates have not increased accordingly. It is therefore crucial to analyze the source code and ... 详细信息
来源: 评论
Teachers cooperation:team-knowledge distillation for multiple cross-domain few-shot learning
收藏 引用
Frontiers of Computer science 2023年 第2期17卷 91-99页
作者: Zhong JI Jingwei NI Xiyao LIU Yanwei PANG School of Electrical and Information Engineering Tianjin UniversityTianjin 300072China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300308China Tianjin Key Laboratory of Brain-Inspired Intelligence Technology Tianjin 300072China
Although few-shot learning(FSL)has achieved great progress,it is still an enormous challenge especially when the source and target set are from different domains,which is also known as cross-domain few-shot learning(C... 详细信息
来源: 评论
CRP2-VCS: Contrast-Oriented Region-Based Progressive Probabilistic Visual Cryptography Schemes
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年 第6期35卷 5501-5517页
作者: Wu, Xiaotian Song, Bofan Fang, Jia Yan, WeiQi Peng, Qing-Yu Jinan University College of Cyber Security The College of Information Science and Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Auckland University of Technology Department of Computer and Information Systems Auckland1010 New Zealand Jinan University Dynamics and Space Science Department of Computer Science The Sino-French Joint Laboratory for Astrometry Guangzhou510632 China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast... 详细信息
来源: 评论
An Erebus Attack Detection Method Oriented to Blockchain Network Layer
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5395-5431页
作者: Qianyi Dai Bin Zhang Kaiyong Xu Shuqin Dong Zhengzhou Information Science and Technology Institute Zhengzhou450001Henan ProvinceChina Henan Key Laboratory of Information Security Zhengzhou450001Henan ProvinceChina
Recently,the Erebus attack has proved to be a security threat to the blockchain network layer,and the existing research has faced challenges in detecting the Erebus attack on the blockchain network *** cloud-based act... 详细信息
来源: 评论