咨询与建议

限定检索结果

文献类型

  • 6,442 篇 会议
  • 5,204 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 11,653 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,461 篇 工学
    • 4,237 篇 计算机科学与技术...
    • 3,368 篇 软件工程
    • 1,685 篇 信息与通信工程
    • 1,160 篇 电子科学与技术(可...
    • 1,068 篇 电气工程
    • 1,059 篇 控制科学与工程
    • 629 篇 机械工程
    • 617 篇 光学工程
    • 594 篇 生物工程
    • 575 篇 仪器科学与技术
    • 471 篇 化学工程与技术
    • 375 篇 材料科学与工程(可...
    • 364 篇 网络空间安全
    • 320 篇 生物医学工程(可授...
    • 285 篇 动力工程及工程热...
    • 251 篇 安全科学与工程
    • 227 篇 交通运输工程
    • 226 篇 建筑学
    • 225 篇 土木工程
  • 4,307 篇 理学
    • 1,918 篇 数学
    • 1,472 篇 物理学
    • 681 篇 生物学
    • 611 篇 统计学(可授理学、...
    • 465 篇 化学
    • 400 篇 系统科学
    • 319 篇 大气科学
  • 1,576 篇 管理学
    • 989 篇 管理科学与工程(可...
    • 632 篇 图书情报与档案管...
    • 317 篇 工商管理
  • 296 篇 医学
    • 241 篇 临床医学
  • 260 篇 法学
  • 159 篇 农学
  • 134 篇 军事学
  • 132 篇 经济学
  • 62 篇 教育学
  • 22 篇 艺术学
  • 18 篇 文学
  • 1 篇 历史学

主题

  • 322 篇 feature extracti...
  • 203 篇 semantics
  • 188 篇 computational mo...
  • 184 篇 deep learning
  • 139 篇 accuracy
  • 133 篇 optimization
  • 132 篇 security
  • 121 篇 neural networks
  • 116 篇 authentication
  • 115 篇 training
  • 110 篇 data mining
  • 108 篇 simulation
  • 106 篇 object detection
  • 95 篇 visualization
  • 91 篇 convolution
  • 89 篇 laboratories
  • 88 篇 predictive model...
  • 86 篇 machine learning
  • 84 篇 protocols
  • 84 篇 federated learni...

机构

  • 204 篇 shandong provinc...
  • 181 篇 university of ch...
  • 140 篇 key laboratory o...
  • 134 篇 science and tech...
  • 123 篇 hubei province k...
  • 116 篇 department of co...
  • 113 篇 school of comput...
  • 89 篇 acoustic science...
  • 87 篇 college of compu...
  • 79 篇 national key lab...
  • 78 篇 key laboratory o...
  • 73 篇 school of softwa...
  • 71 篇 school of comput...
  • 70 篇 hubei province k...
  • 69 篇 tsinghua nationa...
  • 67 篇 state key labora...
  • 66 篇 cas key laborato...
  • 65 篇 advanced cryptog...
  • 62 篇 science and tech...
  • 62 篇 school of cyber ...

作者

  • 56 篇 shuxiang guo
  • 49 篇 qizhen sun
  • 47 篇 sun qizhen
  • 45 篇 li li
  • 44 篇 chen zhibo
  • 43 篇 yang yang
  • 43 篇 ding yong
  • 43 篇 wang wei
  • 41 篇 zheng wei-shi
  • 37 篇 li yang
  • 37 篇 ming tang
  • 36 篇 bin wang
  • 33 篇 hao li
  • 30 篇 liu yang
  • 29 篇 li chen
  • 28 篇 liu dong
  • 28 篇 wei li
  • 26 篇 liu xin
  • 25 篇 wang lei
  • 25 篇 li xin

语言

  • 9,728 篇 英文
  • 1,521 篇 其他
  • 422 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Science and Technology Laboratory of Information System Security"
11653 条 记 录,以下是81-90 订阅
排序:
Mini-Savi: Realistic Satellite Network Simulation Platform Based on Open-Source Tools  4
Mini-Savi: Realistic Satellite Network Simulation Platform B...
收藏 引用
4th International Conference on Frontiers of Computers and Communication Engineering, FCCE 2023
作者: Tang, Zhu Zhao, Jingjing Li, Hu Guo, Tianhang Wang, Quan Chen, Hongyan Zhao, Baokang National University of Defense Technology College of Computer Changsha China National Key Laboratory of Science and Technology on Information System Security Beijing China
Recently, mega satellite constellations are very popular for global instant messaging, and inter-satellite links are planned for delay reduction, leading to satellite network architecture finally. Although there are m... 详细信息
来源: 评论
Cooperative Caching Strategy Based on Two-Layer Caching Model for Remote Sensing Satellite Networks
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3903-3922页
作者: Rui Xu Xiaoqiang Di Hao Luo Hui Qi Xiongwen He Wenping Lei School of Computer Science and Technology Changchun University of Science and TechnologyChangchun130022China School of Information Engineering Henan Institute of Science and TechnologyXinxiang453003China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and TechnologyChangchun130022China Information Center Changchun University of Science and TechnologyChangchun130022China Beijing Institute of Spacecraft System Engineering Beijing100094China Beijing Institute of Space Mechanic and Electricity Beijing100094China
In information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite *** ... 详细信息
来源: 评论
A Review of Intelligent Configuration and Its security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论
Fiber Bragg gratings inscription with a single UV laser pulse by high-temperature arc pretreatment
收藏 引用
Optics Express 2025年 第10期33卷 21692-21706页
作者: Xin, Jingtao Liao, Jingjing Yu, Chenbo Li, Qihui Zhu, Lianqing Beijing Information Science and Technology University Key Laboratory of the Ministry of Education for Optoelectronic Measurement Technology and Instrument Beijing100101 China Guangzhou Nansha Intelligent Photonic Sensing Research Institute Guangzhou100094 China Beijing Information Science and Technology University Beijing Laboratory of Optical Fiber Sensing and System Beijing130033 China
This study proposes a high-temperature arc discharge pretreatment method to enhance the photosensitivity of hydrogen-loaded germanium-doped fibers for single-pulse FBG inscription. By coupling hydrogen diffusion dynam... 详细信息
来源: 评论
Open World Recognition of Communication Jamming Signals
收藏 引用
China Communications 2023年 第6期20卷 199-214页
作者: Yan Tang Zhijin Zhao Jie Chen Shilian Zheng Xueyi Ye Caiyi Lou Xiaoniu Yang School of Communication Engineering Hangzhou Dianzi UniversityHangzhou 310018China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is *** algorithm can recognize known jamming classes,detect new(unknown)jamming classes,an... 详细信息
来源: 评论
A Code-Based ISE to Protect Boolean Masking in Software
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded systems 2025年 第2期2025卷 293-332页
作者: Tian, Qi Cheng, Hao Guo, Chun Page, Daniel Wang, Meiqin Wang, Weijia School of Cyber Science and Technology Shandong University Qingdao China Quan Cheng Laboratory Jinan China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao China School of Computer Science University of Bristol Bristol United Kingdom
Side-Channel Attacks (SCAs) pose a significant threat to data security in embedded environments. To counteract the power-based SCAs, masking is a widely used defense technique, that introduces randomness to obscure th... 详细信息
来源: 评论
A Blackbox Fuzzing Based on Automated State Machine Extraction  8
A Blackbox Fuzzing Based on Automated State Machine Extracti...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Zhang, Zhaowei Yu, Wenjing Wang, Zibin Xiang, Youlin National Key Laboratory of Science and Technology on Information System Security Beijing China School of Computer Science Fudan University Shanghai Key Laboratory of Data Science Shanghai China
Currently, protocol fuzzing techniques mainly employ two approaches: greybox fuzzing based on mutation and blackbox fuzzing based on generation. Greybox fuzzing techniques use message exchanges between the protocol se... 详细信息
来源: 评论
Three-axis high-sensitivity vibration sensor based on ultra-fine and ultra-short fiber Bragg gratings
收藏 引用
IEEE Sensors Journal 2025年 第12期25卷 21557-21565页
作者: Yu, Chenbo Xin, Jingtao Liao, JingJing Li, Qihui Li, Kun Beijing Information Science & Technology University Key Laboratory of the Ministry of Education for Optoelectronic Measurement Technology and Instrument Beijing100192 China Guangzhou Nansha Intelligent Photonic Sensing Research Institute Guangzhou511462 China Beijing Information Science & Technology University Beijing Laboratory of Optical Fiber Sensing and System Beijing100016 China
This paper presents a three-axis high-sensitivity vibration sensor based on ultra-fine and ultra-short fiber Bragg gratings (FBGs). A theoretical model for the sensor's sensitivity and natural frequency is develop... 详细信息
来源: 评论
Research on privacy information retrieval model based on hybrid homomorphic encryption
收藏 引用
Cybersecurity 2024年 第4期7卷 52-61页
作者: Wei-tao Song Guang Zeng Wen-zheng Zhang Dian-hua Tang Science and Technology on Communication Security Laboratory.Chengdu 610041 China Zhejiang University Hangzhou 311200China PLA SSF Information Engineering University Zhengzhou 450000China College of Computer Science and Technology National University of Defense TechnologyChangsha 410073China
The computational complexity of privacy information retrieval protocols is often linearly related to database *** the database size is large,the efficiency of privacy information retrieval protocols is relatively *** ... 详细信息
来源: 评论
Solving Multi-Objective Vehicle Routing Problems with Time Windows: A Decomposition-Based Multiform Optimization Approach
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 305-324页
作者: Yiqiao Cai Zifan Lin Meiqin Cheng Peizhong Liu Ying Zhou Xiamen Key Laboratory of Data Security and Blockchain Technology College of Computer Science and TechnologyHuaqiao UniversityXiamen361021China College of Engineering Huaqiao UniversityQuanzhou362000China School of Computer Sciences Shenzhen Institute of Information TechnologyShenzhen518000China
In solving multi-objective vehicle routing problems with time windows (MOVRPTW),most existing algorithms focus on the optimization of a single problem formulation. However,little effort has been devoted to exploiting ... 详细信息
来源: 评论