咨询与建议

限定检索结果

文献类型

  • 685 篇 会议
  • 424 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,110 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 714 篇 工学
    • 445 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 269 篇 信息与通信工程
    • 154 篇 电子科学与技术(可...
    • 98 篇 电气工程
    • 58 篇 网络空间安全
    • 53 篇 控制科学与工程
    • 51 篇 生物工程
    • 49 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 安全科学与工程
    • 28 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 14 篇 土木工程
    • 13 篇 生物医学工程(可授...
    • 12 篇 建筑学
  • 397 篇 理学
    • 214 篇 数学
    • 136 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 31 篇 系统科学
    • 30 篇 化学
  • 144 篇 管理学
    • 97 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 20 篇 法学
    • 13 篇 社会学
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 经济学
  • 8 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 32 篇 feature extracti...
  • 29 篇 deep learning
  • 29 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 26 篇 semantics
  • 24 篇 protocols
  • 21 篇 authentication
  • 16 篇 bandwidth
  • 16 篇 encryption
  • 16 篇 accuracy
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 12 篇 conferences

机构

  • 184 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 25 篇 school of comput...
  • 22 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 46 篇 xu bingjie
  • 41 篇 huang wei
  • 37 篇 li yang
  • 27 篇 zhang yichen
  • 24 篇 wang heng
  • 23 篇 hua jun
  • 23 篇 yang jie
  • 22 篇 yang xiaoniu
  • 21 篇 pan yan
  • 20 篇 shao yun
  • 19 篇 yu song
  • 19 篇 bingjie xu
  • 18 篇 xiaoniu yang
  • 18 篇 pi yaodi
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 14 篇 fei yu

语言

  • 1,048 篇 英文
  • 38 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Security Communication Laboratory"
1110 条 记 录,以下是1-10 订阅
排序:
GSA-DT: A Malicious Traffic Detection Model Based on Graph Self-Attention Network and Decision Tree
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 2059-2073页
作者: Cai, Saihua Tang, Han Chen, Jinfu Lv, Tianxiang Zhao, Wenjun Huang, Chunlei Jiangsu University School of Computer Science and Communication Engineering Zhenjiang212013 China Jiangsu Provincial Key Laboratory of Industrial Cyberspace Security Technology Zhenjiang212013 China
Malicious attack has shown a rapid growth in recent years, it is very important to accurately detect malicious traffic to defend against malicious attacks. Compared with machine learning and deep learning technologies... 详细信息
来源: 评论
Analysis of security for a New Kind of an Extended Generalized Feistel Network  24
Analysis of Security for a New Kind of an Extended Generaliz...
收藏 引用
3rd International Conference on Algorithms, Data Mining, and Information technology, ADMIT 2024
作者: Dong, Xinfeng Wu, You Zhou, Yu Tan, Hao Zhang, Wenzheng University of Electronic Science and Technology of China Sichuan Chengdu China National Key Laboratory of Security Communication Chengdu China
Differential cryptanalysis and linear cryptanalysis are two classic analytical methods for block ciphers, and they are of great significance for evaluating the security of block ciphers. In practical security evaluati... 详细信息
来源: 评论
Enhanced Data Mining Algorithms for Sybil Attack Prevention in Truth Discovery  24
Enhanced Data Mining Algorithms for Sybil Attack Prevention ...
收藏 引用
3rd International Conference on Algorithms, Data Mining, and Information technology, ADMIT 2024
作者: Shao, Yanjing Zhao, Wei Liu, Jianghua Xu, Lei Xu, Chungen School of Mathematics and Statistics Nanjing University of Science and Technology China National Key Laboratory of Security Communication China School of Computer Science and Engineering Nanjing University of Science and Technology China
In crowdsourcing systems, where substantial amounts of data from various contributors are aggregated to discern reliable information, privacy concerns are often managed through differential privacy techniques. However... 详细信息
来源: 评论
Anti-concept Drift-enabled Recognition Method of Encrypted Traffic Behavior  24
Anti-concept Drift-enabled Recognition Method of Encrypted T...
收藏 引用
2nd International Conference on communication Networks and Machine Learning, CNML 2024
作者: Zheng, Jicheng Huang, Shuangshuang Ji, Qingbing School of Computer Science and Technology Xi’an Jiaotong University Xi’an China National Key Laboratory of Security Communication Sichuan Chengdu China
Although encrypted traffic ensures information security, it can also be exploited by malicious actors, leading to security risks. This paper addresses the limitations of existing behavior recognition technologies, par... 详细信息
来源: 评论
DialTest-EA: An Enhanced Fuzzing Approach With Energy Adjustment for Dialogue Systems via Metamorphic Testing
DialTest-EA: An Enhanced Fuzzing Approach With Energy Adjust...
收藏 引用
作者: Chen, Haibo Chen, Jinfu Wu, Yucheng Cai, Saihua Ahmad, Bilal Huang, Rubing Wang, Shengran Zhang, Chi School of Computer Science and Communication Engineering Jiangsu Key Laboratory of Security Technology Industrial Cyberspace Jiangsu University Zhenjiang China School of Computer Science and Engineering Faculty of Innovation Engineering Macau University of Science and Technology China
Deep neural networks (DNNs) possess potent feature learning capability, enabling them to comprehend natural language, which strongly support developing dialogue systems. However, dialogue systems usually perform incor... 详细信息
来源: 评论
Generative Replay and Multi-steps Knowledge Distillation in Class-Incremental Learning  24
Generative Replay and Multi-steps Knowledge Distillation in ...
收藏 引用
3rd International Conference on Artificial Intelligence and Intelligent Information Processing, AIIIP 2024
作者: Meng, Yicheng Ping, Jinming Shi, Jingye Zhi, Ruicong School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China
Data-free generative modeling (GM) methods have gained much attention because pseudo data avoids security and privacy issues, and no amount limitation for storing real data in Class-Incremental Learning (CIL). However... 详细信息
来源: 评论
Password-Based Authenticated Key Exchange for Cloud Storage from RLWE  24
Password-Based Authenticated Key Exchange for Cloud Storage ...
收藏 引用
2nd International Conference on Electronics, Computers and communication technology, CECCT 2024
作者: Xie, Gang Xu, Chunxiang Jiang, Changsong Han, Yu Dong, Xinfeng School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu China University of Electronic Science and Technology of China Huzhou China School of Computer Science and Engineering and Technology of China University of Electronic Science and Technology of China Sichuan Chengdu China China and National Key Laboratory of Security Communication Sichuan Chengdu China
Cloud storage enables users to store, retrieve, and share large amounts of data in a flexible and convenient way. To guarantee only authorized users can access the data, authenticated key exchange is a feasible soluti... 详细信息
来源: 评论
On l-th NMDS Codes∗
收藏 引用
Chinese Journal of Electronics 2025年 第3期23卷 454-457页
作者: Hongxi Tong Wenhai Chen Fei Yu Department of Mathematics Shanghai University Shanghai China Science and Technology on Communication Security Laboratory Chengdu China
Linear codes with Singleton defects equivalent to 0, 1, 2 are studied, and they have good properties. They are called MDS codes, NMDS codes, NNMDS cdoes, respectively. In this paper, we study linear codes with large S... 详细信息
来源: 评论
Research on Radar Anti-deceptive-jamming Method based on Characterization  16
Research on Radar Anti-deceptive-jamming Method based on Cha...
收藏 引用
16th International Conference on Signal Processing Systems, ICSPS 2024
作者: Lei, Lei Jiang, Meiqiu Li, JiaChen Guo, Shisheng Cui, Guolong Xia, Bijun Zhu, Lei School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Electromagnetic Space Security Chengdu China
Deceptive jamming plays an increasingly important role in radar electronic countermeasures, and there is an urgent need to study new radar anti-deceptive jamming methods. In this paper, four characteristic factors, na... 详细信息
来源: 评论
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论