咨询与建议

限定检索结果

文献类型

  • 685 篇 会议
  • 430 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 718 篇 工学
    • 445 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 270 篇 信息与通信工程
    • 154 篇 电子科学与技术(可...
    • 100 篇 电气工程
    • 58 篇 网络空间安全
    • 53 篇 控制科学与工程
    • 51 篇 生物工程
    • 49 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 安全科学与工程
    • 28 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 生物医学工程(可授...
  • 398 篇 理学
    • 215 篇 数学
    • 136 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 31 篇 系统科学
    • 30 篇 化学
  • 146 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 20 篇 法学
    • 13 篇 社会学
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 经济学
  • 9 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 33 篇 feature extracti...
  • 30 篇 deep learning
  • 30 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 26 篇 semantics
  • 24 篇 protocols
  • 21 篇 authentication
  • 17 篇 accuracy
  • 16 篇 bandwidth
  • 16 篇 encryption
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 12 篇 internet of thin...

机构

  • 184 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 25 篇 school of comput...
  • 23 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 47 篇 xu bingjie
  • 42 篇 huang wei
  • 38 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 24 篇 yang jie
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 20 篇 bingjie xu
  • 19 篇 pi yaodi
  • 18 篇 xiaoniu yang
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 14 篇 fei yu

语言

  • 1,053 篇 英文
  • 39 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Security Communication Laboratory"
1116 条 记 录,以下是21-30 订阅
排序:
DETCP: Self-Detoxifying Language Models With Contrastive Pairs
DETCP: Self-Detoxifying Language Models With Contrastive Pai...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dianqing Liu Yi Liu Junbo Guo Zhendong Mao School of Cyberspace Security University of Science and Technology of China Hefei China State Key Laboratory of Communication Content Cognition People’s Daily Online Beijing China
Influenced by context such as tone, emotion and demographic, pre-trained language models may generate harmful text, which limits their widespread application. While detoxifying language models seeks to reduce the like... 详细信息
来源: 评论
Improving key rates by tighter information reconciliation leakage estimation for quantum key distribution
arXiv
收藏 引用
arXiv 2025年
作者: Mao, Hao-Kun Yang, Bo Qiao, Yu-Cheng Yan, Bing-Ze Zhao, Qiang Xu, Bing-Jie Li, Qiong School of Cyberspace Science Faculty of Computing Harbin Institute of Technology Harbin150080 China Guangxi Key Lab Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China School of Information Engineering Zhejiang Ocean University Zhoushan316022 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
Previous research has aimed to precisely estimate information leakage to improve the secure key rate (SKR) and maximum transmission distance in quantum key distribution (QKD). However, existing methods repeatedly cons... 详细信息
来源: 评论
A Novel Vulnerability-Detection Method Based on the Semantic Features of Source Code and the LLVM Intermediate Representation
收藏 引用
Journal of Software: Evolution and Process 2025年 第5期37卷
作者: Chen, Jinfu Zhou, Jiapeng Lin, Wei Towey, Dave Cai, Saihua Chen, Haibo Chen, Jingyi Yin, Yemin School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang China School of Computer Science University of Nottingham Ningbo China Ningbo China
With the increasingly frequent attacks on software systems, software security is an issue that must be addressed. Within software security, automated detection of software vulnerabilities is an important subject. Most... 详细信息
来源: 评论
A Fast Framework for Efficiently Constructing Valuable Cubes  26th
A Fast Framework for Efficiently Constructing Valuable Cubes
收藏 引用
26th International Conference on Information and communications security, ICICS 2024
作者: Li, Jingtao Gao, Bo Wan, Jianxiong Li, Leixiao Zhang, Jiaxiang School of Data Science and Application Inner Mongolia University of Technology Hohhot China Inner Mongolia Key Laboratory of Beijiang Cyberspace Security Hohhot China School of Information Engineering Beijing Institute of Graphic Communication Beijing China Research Center of Large-Scale Energy Storage Technologies Ministry of Education of the People’s Republic of China Beijing China
The cube attack is a powerful technique for attacking symmetric ciphers, of which one of the core parts is the search for good cubes. The construction of candidate cubes targeting linear superpolies, proposed at Asiac... 详细信息
来源: 评论
Multi-channel transmission meta-holograms enabled by a single-layer complex-amplitude metasurface
收藏 引用
Optics Letters 2025年 第8期50卷 2542-2545页
作者: Zhu, Lei Wang, Yiya Dong, Liang Shang, Guanyu Burokur, Shah Nawaz Ding, Xumin School of Computer and Control Engineering Qiqihar University Qiqihar161006 China Communication and Electronics Engineering Institute Qiqihar University Qiqihar161006 China Key Laboratory of Big Data Network Security Detection and Analysis in Heilongjiang Qiqihar University Qiqihar161006 China Innovation Photonics and Imaging Center Instrumentation Science and Engineering Harbin Institute of Technology Harbin150001 China LEME UPL Univ. Paris Nanterre Ville d'AvrayF92410 France Advanced Microscopy and Instrumentation Research Center Harbin Institute of Technology Harbin150080 China
With an increasing demand for wireless communications, it is difficult for traditional communication technologies to achieve high-quality multi-channel wireless transmissions. Complex-amplitude metasurfaces provide an... 详细信息
来源: 评论
Personalized Federated Learning with State-Adaptive IoT Device Scheduling in Mobile Edge Computing
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Mai, Jun Cao, Kun Wei, Tongquan Jinan University College of Cyber Security Guangzhou510632 China Southeast University National Mobile Communication Research Laboratory Nanjing211189 China East China Normal University School of Computer Science and Technology Shanghai200062 China
Federated learning (FL) is envisioned as a pioneering framework for the distributed training of artificial intelligence models in mobile edge computing (MEC) environments. Traditional MEC-empowered FL approaches commo... 详细信息
来源: 评论
Scloud+: An Efficient LWE-Based KEM Without Ring/Module Structure  9th
Scloud+: An Efficient LWE-Based KEM Without Ring/Module Stru...
收藏 引用
9th International Conference on security Standardisation Research, SSR 2024
作者: Wang, Anyu Zheng, Zhongxiang Zhao, Chunhuan Qiu, Zhiyuan Zeng, Guang Yuan, Ye Mu, Changchun Wang, Xiaoyun Institute for Advanced Study BNRist Tsinghua University Beijing China School of Computer and Cyber Sciences Communication University of China Beijing China Shield Lab Huawei Technologies Beijing China Shandong Institute of Blockchain Jinan China Digital Currency Institute the People’s Bank of China China Zhongguancun Laboratory Beijing China National Financial Cryptography Research Center Beijing China Key Laboratory of Cryptologic Technology and Information Security School of Cyber Science and Technology Shandong University Qingdao China
We present Scloud+, an LWE-based key encapsulation mechanism (KEM). The key feature of Scloud+ is its use of the unstructured-LWE problem (i.e., without algebraic structures such as rings or modules) and its incorpora... 详细信息
来源: 评论
FL-based NN in 30.4-km MMW Transmission using Full-Photonic Conversion and TWT Amplifier
收藏 引用
IEEE Photonics technology Letters 2025年
作者: Zhao, Junhao Dong, Boyu Liu, Yinjun Ping, Dianyuan Tao, Li He, Shuhong Liu, Shishuo Zi, Zhangxiong Lu, Qichao Li, Yaxuan Jia, Junlian Li, Zhongya Yan, An Shi, Jianyang Chi, Nan Zhang, Junwen Shanghai Engineering Research Center of LEO Satellite Communication and Applications Shanghai Collaborative Innovation Center of LEO Satellite Communication Technology Department of Communication Science and Engineering Shanghai200433 China Shanghai Innovation Institute Shanghai200433 China CSDDC National Key Laboratory of Electromagnetic Effect and Security on Marine Equipment China Ship Development and Design Center Wuhan430000 China Beijing Vacuum Electronics Research Institute National Key Laboratory of Science and Technology on Vacuum Electronics Beijing100015 China
This letter presents a focal loss (FL)-based neural network soft de-mapping method for 30.4-km millimeter-wave (MMW) transmission, utilizing full-photonic up- and down-conversion. A traveling wave tube (TWT) is employ... 详细信息
来源: 评论
M-procedures robust to structural changes detection under strong mixing heavy-tailed time series models
收藏 引用
Journal of Statistical Planning and Inference 2025年 239卷
作者: Jin, Hao Hu, Jiating Zhu, Ling Tian, Shiyu Zhang, Si School of Computer Science and Technology Xi'an University of Science and Technology Xi'an 710054 China School of Sciences Xi'an University of Science and Technology Xi'an 710054 China Chongqing College of Mobile Communication Chongqing Key Laboratory of Public Big Data Security Technology Chongqing 401420 China
Many tests of change points resort to least squares estimation method, but it can lead to bias if these observations are heavy-tailed processes. The aim of this paper is to construct a ratio-typed test based on M-esti... 详细信息
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
Computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论