咨询与建议

限定检索结果

文献类型

  • 6,442 篇 会议
  • 5,204 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,461 篇 工学
    • 4,237 篇 计算机科学与技术...
    • 3,368 篇 软件工程
    • 1,685 篇 信息与通信工程
    • 1,160 篇 电子科学与技术(可...
    • 1,068 篇 电气工程
    • 1,059 篇 控制科学与工程
    • 629 篇 机械工程
    • 617 篇 光学工程
    • 594 篇 生物工程
    • 575 篇 仪器科学与技术
    • 471 篇 化学工程与技术
    • 375 篇 材料科学与工程(可...
    • 364 篇 网络空间安全
    • 320 篇 生物医学工程(可授...
    • 285 篇 动力工程及工程热...
    • 251 篇 安全科学与工程
    • 227 篇 交通运输工程
    • 226 篇 建筑学
    • 225 篇 土木工程
  • 4,307 篇 理学
    • 1,918 篇 数学
    • 1,472 篇 物理学
    • 681 篇 生物学
    • 611 篇 统计学(可授理学、...
    • 465 篇 化学
    • 400 篇 系统科学
    • 319 篇 大气科学
  • 1,576 篇 管理学
    • 989 篇 管理科学与工程(可...
    • 632 篇 图书情报与档案管...
    • 317 篇 工商管理
  • 296 篇 医学
    • 241 篇 临床医学
  • 260 篇 法学
  • 159 篇 农学
  • 134 篇 军事学
  • 132 篇 经济学
  • 62 篇 教育学
  • 22 篇 艺术学
  • 18 篇 文学
  • 1 篇 历史学

主题

  • 322 篇 feature extracti...
  • 203 篇 semantics
  • 188 篇 computational mo...
  • 184 篇 deep learning
  • 139 篇 accuracy
  • 133 篇 optimization
  • 132 篇 security
  • 121 篇 neural networks
  • 116 篇 authentication
  • 115 篇 training
  • 110 篇 data mining
  • 108 篇 simulation
  • 106 篇 object detection
  • 95 篇 visualization
  • 91 篇 convolution
  • 89 篇 laboratories
  • 88 篇 predictive model...
  • 86 篇 machine learning
  • 84 篇 protocols
  • 84 篇 federated learni...

机构

  • 204 篇 shandong provinc...
  • 181 篇 university of ch...
  • 140 篇 key laboratory o...
  • 134 篇 science and tech...
  • 123 篇 hubei province k...
  • 116 篇 department of co...
  • 113 篇 school of comput...
  • 89 篇 acoustic science...
  • 87 篇 college of compu...
  • 79 篇 national key lab...
  • 78 篇 key laboratory o...
  • 73 篇 school of softwa...
  • 71 篇 school of comput...
  • 70 篇 hubei province k...
  • 69 篇 tsinghua nationa...
  • 67 篇 state key labora...
  • 66 篇 cas key laborato...
  • 65 篇 advanced cryptog...
  • 62 篇 science and tech...
  • 62 篇 school of cyber ...

作者

  • 56 篇 shuxiang guo
  • 49 篇 qizhen sun
  • 47 篇 sun qizhen
  • 45 篇 li li
  • 44 篇 chen zhibo
  • 43 篇 yang yang
  • 43 篇 ding yong
  • 43 篇 wang wei
  • 41 篇 zheng wei-shi
  • 37 篇 li yang
  • 37 篇 ming tang
  • 36 篇 bin wang
  • 33 篇 hao li
  • 30 篇 liu yang
  • 29 篇 li chen
  • 28 篇 liu dong
  • 28 篇 wei li
  • 26 篇 liu xin
  • 25 篇 wang lei
  • 25 篇 li xin

语言

  • 9,728 篇 英文
  • 1,521 篇 其他
  • 422 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Science and Technology Laboratory of Information System Security"
11653 条 记 录,以下是41-50 订阅
排序:
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
Unsupervised Meteorological Downscaling Based on Dual Learning and Subgrid-scale Auxiliary information
收藏 引用
Advances in Atmospheric sciences 2025年 第1期42卷 53-66页
作者: Jing HU Jialing MU Xiaomeng HUANG Xi WU Department of Computer Science Chengdu University of Information TechnologyChengdu 610225China Department of Earth System Science Ministry of Education Key Laboratory for Earth System ModelingInstitute for Global Change StudiesTsinghua UniversityBeijing 100084China
Climate downscaling is used to transform large-scale meteorological data into small-scale data with enhanced detail,which finds wide applications in climate modeling,numerical weather forecasting,and renewable *** dee... 详细信息
来源: 评论
Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN  24
Test Suite Generation Based on Context-Adapted Structural Co...
收藏 引用
24th Asia-Pacific Network Operations and Management Symposium, APNOMS 2023
作者: Kong, Wei Du, Qianjin Cao, Huayang Li, Hu Wang, Tong Tian, Jianwen Kuang, Xiaohui National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Deep learning (DL) introduces a novel data-driven programming paradigm, where the system logic is constructed through data training. However, this approach poses challenges in terms of system analysis and defect detec... 详细信息
来源: 评论
Verifiable delay functions and delay encryptions from hyperelliptic curves
收藏 引用
Cybersecurity 2024年 第4期7卷 110-121页
作者: Chao Chen Fangguo Zhang School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 510006China Guangdong Province Key Laboratory of Information Security Technology Guangzhou 510006China
Verifiable delay functions(VDFs)and delay encryptions(DEs)are two important primitives in decentralized systems,while existing constructions are mainly based on time-lock puzzles.A disparate framework has been establi... 详细信息
来源: 评论
Explicit Constructions of Capacity-Achieving T-PIR Schemes over Small Fields via Generalized Minor Matrices
收藏 引用
IEEE Transactions on information Theory 2025年 第7期71卷 5109-5129页
作者: Xu, Jingke Fang, Weijun Shandong Agricultural University School of Information Science and Engineering Tai’an271017 China Shandong University State Key Laboratory of Cryptography and Digital Economy Security Qingdao266237 China Ministry of Education Shandong University Key Laboratory of Cryptologic Technology and Information Security Qingdao266237 China Shandong University School of Cyber Science and Technology Qingdao266237 China
Suppose a distributed storage system containing M files is replicated across N servers, and a user wants to privately retrieve one file by accessing the servers such that the identity of the retrieved file is kept sec... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Combining Local Electromagnetic Scattering and Global Structure Features for SAR Open Set Recognition
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12572-12587页
作者: Lin, Qinjie Sun, Hao Xu, Yanjie Wang, Junyu Ji, Kefeng Kuang, Gangyao National University of Defense Technology State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System College of Electronic Science and Technology Changsha410073 China
Automatic target recognition (ATR) is crucial for synthetic aperture radar (SAR) image interpretation. However, existing SAR ATR primarily rely on algorithms from the field of computer vision, many methods have not ad... 详细信息
来源: 评论
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1280-1284页
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Laboratory of Cryptography Application Technology Innovation and Testing Verification Ministry of Industry and Information Technology Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
In-memory computing based on phase change memory for high energy efficiency
收藏 引用
science China(information sciences) 2023年 第10期66卷 20-41页
作者: Luchang HE Xi LI Chenchen XIE Zhitang SONG National Key Laboratory of Materials for Integrated Circuits Shanghai Institute of Micro-System and Information Technology Chinese Academy of Sciences School of Microelectronics University of Science and Technology of China
The energy efficiency issue caused by the memory wall in traditional von Neumann architecture is difficult to reconcile. In-memory computing(CIM) based on emerging nonvolatile memory(NVM) is a promising solution to av... 详细信息
来源: 评论