咨询与建议

限定检索结果

文献类型

  • 802 篇 会议
  • 646 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 956 篇 工学
    • 520 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 365 篇 信息与通信工程
    • 242 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 98 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 56 篇 机械工程
    • 49 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 37 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 33 篇 航空宇航科学与技...
    • 30 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 562 篇 理学
    • 282 篇 数学
    • 209 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 51 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 24 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 34 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 20 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 shilian zheng

语言

  • 1,326 篇 英文
  • 87 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1449 条 记 录,以下是1061-1070 订阅
排序:
Efficient flush-reload cache attack on scalar multiplication based signature algorithm
收藏 引用
science China(information sciences) 2018年 第3期61卷 234-236页
作者: Ping ZHOU Tao WANG Xiaoxuan LOU Xinjie ZHAO Fan ZHANG Shize GUO Department of Information Engineering Ordnance Engineering College College of Information Science and Electrical Engineering Zhejiang University Institute of North Electronic Equipment Science and Technology on Communication Security Laboratory
Dear editor,Cache timing attack is a very powerful side channel attack technique to break cryptographic ***,Flush-Reload,a new type of cache attacks,was proposed to attack cryptographic implementations on multi-core *... 详细信息
来源: 评论
Corrigendum to ‘Dodecahydrododecaborate anion cluster-reduced nano-Au-decorated graphene oxide for 100% hydrogenation of nitroaromatics’[Colloid Interface Sci. Commun. 50 (2022) 100672]
收藏 引用
Colloid and Interface science communications 2023年 55卷
作者: Yuwen Wang Xue Zhao Jianbing Chen Shuxing Zhou Xianxi Zhang Xinzhong Wang Thomas Wågberg Guangzhi Hu School of Electronic Communication Technology Shenzhen Institute of Information Technology Shenzhen 518172 China School of Materials and Energy Institute for Ecological Research and Pollution Control of Plateau Lakes Yunnan University Kunming 650504 China Research Academy of Non-metallic Mining Industry Development Materials and Environmental Engineering College Chizhou University Chizhou 247000 China Hubei Key Laboratory of Low Dimensional Optoelectronic Materials and Devices Hubei University of Arts and Science Xiangyang 441053 China School of Chemistry and Chemical Engineering Liaocheng University Liaocheng 252000 China Department of Physics Umeå University Umeå 901 87 Sweden
来源: 评论
Unidirectional FHPRE scheme from lattice for cloud computing
收藏 引用
International Journal of Network security 2019年 第4期21卷 592-600页
作者: Li, Juyan Ma, Chunguang Zhang, Lei Yuan, Qi College of Computer Science and Technology Harbin Engineering University Harbin150001 China College of Data Science and Technology Heilongjiang University Harbin150080 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China College of Information and Electronic Technology Jiamusi University Jiamusi154007 China College of Communication and Electronic Engineering Qiqihar University Qiqihar161006 China
With the emerging of new types of network forms, services and cloud computation, the situation has transformed from one party to many parties at least one of both communication ends, that is "one-to-many," &... 详细信息
来源: 评论
Sub-Sample High-Resolution TOA Estimation Algorithm for LTE Downlink  9
Sub-Sample High-Resolution TOA Estimation Algorithm for LTE ...
收藏 引用
2017 9th IEEE International Conference on communication Software and Networks (ICCSN 2017)
作者: Huijie Zhu Jiawei Zhu Bin Jiang Science and Technology on Communication Information Security Control Laboratory No. 36 Research Institute of China Electronics Technology Group Corporation
This paper presents a novel super-resolution time of arrive(TOA) estimation algorithm, which utilizes the primary synchronization signal(PSS) in LTE downlink. Unlike the conventional coherent detection algorithm with ... 详细信息
来源: 评论
Identification of block ciphers under CBC mode  8
Identification of block ciphers under CBC mode
收藏 引用
8th International Congress of information and communication technology, ICICT 2018
作者: Tan, Cheng Deng, Xiaoyan Zhang, Lijun Science and Technology on Communication Security Laboratory No. 8 of Venture Road Chengdu Sichuan Province610041 China College of Applied Mathematics Chengdu University of Information Technology No. 24 of Xuefu Road Chengdu Sichuan Province610103 China
It has been challenging work to identify block ciphers under CBC mode over the past few decades. But we can still conduct the identification of block ciphers under CBC mode if enough ciphertext streams are available. ... 详细信息
来源: 评论
Receive buffer pre-division based flow control for MPTCP  1
收藏 引用
13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017
作者: Han, Jiangping Xue, Kaiping Yue, Hao Hong, Peilin Yu, Nenghai Li, Fenghua Department of EEIS University of Science and Technology of China HefeiAnhui230027 China Science and Technology on Communication Networks Laboratory ShijiazhuangHebei050081 China Department of Computer Science San Francisco State University San FranciscoCA94132 United States State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
Multipath TCP (MPTCP) enables terminals utilizing multiple interfaces for data transmission simultaneously, which provides better performance and brings many benefits. However, using multiple paths brings some new cha... 详细信息
来源: 评论
Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
收藏 引用
science China(information sciences) 2017年 第4期60卷 235-237页
作者: Fan ZHANG Xinjie ZHAO Wei HE Shivam BHASIN Shize GUO College of Information Science and Electrical Engineering Zhejiang University Science and Technology on Communication Security Laboratory Institute of North Electronic Equipment Temasek Laboratories Nanyang Technological University
Fault analysis is a very powerful technique to break cryptographic *** particular,bitlevel fault analysis(BLFA),where faults are injected by flipping one or a few isolated bits,are among the most efficient of the *** ... 详细信息
来源: 评论
Transistor level SCA-resistant scheme based on fluctuating power logic
收藏 引用
science China(information sciences) 2017年 第10期60卷 270-272页
作者: Liang GENG Fan ZHANG Jizhong SHEN Wei HE Shivam BHASIN Xinjie ZHAO Shize GUO College of Information Science and Electronic Engineering Zhejiang University Science and Technology on Communication Security Laboratory Temasek Laboratories Nanyang Technological University The Institute of North Electronic Equipment
Dear editor,The main objective of side-channel analysis(SCA)is to extract the secret key using physical leakages from underlying fundamental logic *** analysis(PA)is one type of SCA,such as simple power analysis(SPA),... 详细信息
来源: 评论
Evaluation of Age of information for LDPC Coded Transmission over AWGN Channels
Evaluation of Age of Information for LDPC Coded Transmission...
收藏 引用
IEEE Vehicular technology Conference
作者: Mangang Xie Qianfan Wang Jie Gong Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Age of information (AoI) is an important metric in real-time status update communication system to assess the freshness of information. Different from previous works, this paper focuses on the average AoI over additiv... 详细信息
来源: 评论
Secure communications in a unified non-orthogonal multiple access framework
arXiv
收藏 引用
arXiv 2019年
作者: Yue, Xinwei Liu, Yuanwei Yao, Yuanyuan Li, Xuehua Liu, Rongke Nallanathan, Arumugam School of Information and Communication Engineering Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing100101 China School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom School of Electronic and Information Engineering Beihang University Beijing100191 China
This paper investigates the impact of physical layer secrecy on the performance of a unified non-orthogonal multiple access (NOMA) framework, where both external and internal eavesdropping scenarios are examined. The ... 详细信息
来源: 评论