咨询与建议

限定检索结果

文献类型

  • 685 篇 会议
  • 430 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 718 篇 工学
    • 445 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 270 篇 信息与通信工程
    • 154 篇 电子科学与技术(可...
    • 100 篇 电气工程
    • 58 篇 网络空间安全
    • 53 篇 控制科学与工程
    • 51 篇 生物工程
    • 49 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 安全科学与工程
    • 28 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 生物医学工程(可授...
  • 398 篇 理学
    • 215 篇 数学
    • 136 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 31 篇 系统科学
    • 30 篇 化学
  • 146 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 20 篇 法学
    • 13 篇 社会学
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 经济学
  • 9 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 33 篇 feature extracti...
  • 30 篇 deep learning
  • 30 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 26 篇 semantics
  • 24 篇 protocols
  • 21 篇 authentication
  • 17 篇 accuracy
  • 16 篇 bandwidth
  • 16 篇 encryption
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 12 篇 internet of thin...

机构

  • 184 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 25 篇 school of comput...
  • 23 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 47 篇 xu bingjie
  • 42 篇 huang wei
  • 38 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 24 篇 yang jie
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 20 篇 bingjie xu
  • 19 篇 pi yaodi
  • 18 篇 xiaoniu yang
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 14 篇 fei yu

语言

  • 1,053 篇 英文
  • 39 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Security Communication Laboratory"
1116 条 记 录,以下是41-50 订阅
排序:
A Hierarchy Distributed-Agents Model for Network Risk Evaluation Based on Deep Learning
收藏 引用
Computer Modeling in Engineering & sciences 2019年 第7期120卷 1-23页
作者: Jin Yang Tao Li Gang Liang Wenbo He Yue Zhao College of Cyber Security Department of Computing and SoftwareSichuan UniversityChengduChina McMaster University Science and Technology on Communication Security LaboratoryCanada Science and Technology on Communication Security Laboratory ChengduChina
Deep Learning presents a critical capability to be geared into environments being constantly changed and ongoing learning dynamic,which is especially relevant in Network Intrusion *** this paper,as enlightened by the ... 详细信息
来源: 评论
Double-RIS Enabled Physical Layer security for Wireless-Powered communication Systems Over Rayleigh Fading Channels
收藏 引用
IEEE Transactions on communications 2025年
作者: Chen, Jingyu Cao, Kunrui Ding, Haiyang Lv, Lu Ye, Yinghui Chi, Haolian Wang, Tao Yang, Liang National University of Defense Technology School of Information and Communications Wuhan430035 China Xidian University School of Telecommunications Engineering Xi'an710071 China Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Xi'an710121 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China
This paper investigates the physical layer security for a double-reconfigurable intelligent surface (DRIS) aided wireless-powered communication (WPC) system in the presence of an eavesdropper, where one RIS (termed as... 详细信息
来源: 评论
Multi-user quantum key distribution with collective eavesdropping detection over collective-noise channels
收藏 引用
Chinese Physics B 2015年 第7期24卷 114-124页
作者: 黄伟 温巧燕 刘斌 高飞 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Science and Technology on Communication Security Laboratory
A multi-user quantum key distribution protocol is proposed with single particles and the collective eavesdropping detection strategy on a star network. By utilizing this protocol, any two users of the network can acco... 详细信息
来源: 评论
A multip-level additive distortion method for security improvement in palette image steganography
收藏 引用
Journal of Visual communication and Image Representation 2025年 110卷
作者: Chen, Yi Wang, Hongxia Cui, Yunhe Shen, Guowei Guo, Chun Liu, Yong Wu, Hanzhou State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou Provincial Characteristic Key Laboratory of Software Engineering and Information Security Guizhou University Guiyang550025 China School of Cyber Science and Engineering Sichuan University Chengdu610065 China School of Artificial Intelligence Hubei University of Automotive Technology Shiyan442002 China School of Big Data and Computer Science Guizhou Normal University Guiyang550025 China School of Communication and Information Engineering Shanghai University Shanghai200444 China
With the rapid development of the Internet and communication technology, palette images have become a preferred media for steganography. However, the security of palette image steganography faces a big problem. To add... 详细信息
来源: 评论
Several classes of linear codes with few weights derived from Weil sums
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Zhao Qiu, Mingxiu Li, Nian Tang, Xiaohu Wu, Liwei Key Laboratory of Intelligent Sensing System and Security Hubei University Ministry of Education Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Hubei University Wuhan430062 China State Key Laboratory of Integrated Service Networks Xi’an710071 China Hubei Key Laboratory of Applied Mathematics Faculty of Mathematics and Statistics Hubei University Wuhan430062 China Southwest Jiaotong University Chengdu610031 China Wuhan Maritime Communication Research Institute China
Linear codes with few weights have applications in secret sharing, authentication codes, association schemes and strongly regular graphs. In this paper, several classes of t-weight linear codes over Fq are presented w... 详细信息
来源: 评论
UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks
收藏 引用
IEEE Transactions on Network science and Engineering 2025年
作者: Hadi, Hassan Jalil Cao, Yue Khan, Muhammad Khurram Ahmad, Naveed Hu, Yulin Fu, Chao Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430073 China King Saud University Center of Excellence in Information Assurance Riyadh Saudi Arabia Prince Sultan University College of Computer and Information Science Riyadh Saudi Arabia Wuhan University School of Electronic Information China Information and Communication Technology Co. LtdChina China
Unmanned Aerial Vehicles (UAVs) are necessary for numerous tasks but are vulnerable to cyber threats due to their widespread use and connectivity. The lack of a comprehensive dataset necessitates the development of ef... 详细信息
来源: 评论
Efficient collision attacks on smart card implementations of masked AES
收藏 引用
science China(Information sciences) 2015年 第5期58卷 97-111页
作者: WANG An WANG ZongYue ZHENG XueXin WANG XiaoMei CHEN Man ZHANG GuoShuang WU LiJi Institute of Microelectronics Tsinghua University Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University China Academy of Electronics and Information Technology School of Computer and Communication Engineering University of Science and TechnologyBeijing Science and Technology on Communication Security Laboratory
Collision attack is often employed against some cryptographic algorithms such as AES and *** a usual countermeasure, masking can resist such attacks to some extent. In CHES 2011, Clavier et *** a collision-correlation... 详细信息
来源: 评论
On l-th NMDS Codes
收藏 引用
Chinese Journal of Electronics 2014年 第3期23卷 454-457页
作者: TONG Hongxi CHEN Wenhai YU Fei Department of Mathematics Shanghai University Science and Technology on Communication Security Laboratory
Linear codes with Singleton defects equivalent to 0, 1, 2 are studied, and they have good properties. They are called MDS codes, NMDS codes, NNMDS cdoes, respectively. In this paper, we study linear codes with large S... 详细信息
来源: 评论
Quantum private query: A new kind of practical quantum cryptographic protocol
收藏 引用
science China(Physics,Mechanics & Astronomy) 2019年 第7期62卷 10-21页
作者: Fei Gao SuJuan Qin Wei Huang QiaoYan Wen State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Science and Technology on Communication Security Laboratory Institute of Southwestern Communication State Key Laboratory of Cryptology
This research aims to review the developments in the field of quantum private query(QPQ), a type of practical quantum cryptographic protocol. The primary protocol, as proposed by Jacobi et al., and the improvements in... 详细信息
来源: 评论
Combined Field Integral Equation Using Multibranch RWG Functions for Electromagnetic Scattering from Piecewise Homogeneous Dielectric Objects with Junctions
收藏 引用
IEEE Antennas and Wireless Propagation Letters 2025年
作者: Dong, Zhiwen Chen, Xinlei Gao, Fan Gu, Changqing Li, Zhuo Yang, Wu Lu, Weibing Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Key Laboratory of Radar Imaging and Microwave Photonics Nanjing211106 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Key Laboratory of Radar Imaging and Microwave Photonics Key Laboratory of Inlet and Exhaust System Technology Nanjing211106 China Southeast University State Key Laboratory of Millimeter Waves Nanjing210096 China Southeast University State Key Laboratory of Millimeter Waves School of Information Science and Engineering Nanjing210096 China Southeast University Center for Flexible RF Technology MOE Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing210096 China
A new method that utilizes multibranch Rao-Wilton-Glisson (MB-RWG) functions and the electric and magnetic current combined field integral equations (JMCFIE) is proposed for analyzing piecewise homogeneous dielectric ... 详细信息
来源: 评论