咨询与建议

限定检索结果

文献类型

  • 685 篇 会议
  • 430 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 718 篇 工学
    • 445 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 270 篇 信息与通信工程
    • 154 篇 电子科学与技术(可...
    • 100 篇 电气工程
    • 58 篇 网络空间安全
    • 53 篇 控制科学与工程
    • 51 篇 生物工程
    • 49 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 安全科学与工程
    • 28 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 生物医学工程(可授...
  • 398 篇 理学
    • 215 篇 数学
    • 136 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 31 篇 系统科学
    • 30 篇 化学
  • 146 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 20 篇 法学
    • 13 篇 社会学
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 经济学
  • 9 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 33 篇 feature extracti...
  • 30 篇 deep learning
  • 30 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 26 篇 semantics
  • 24 篇 protocols
  • 21 篇 authentication
  • 17 篇 accuracy
  • 16 篇 bandwidth
  • 16 篇 encryption
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 12 篇 internet of thin...

机构

  • 184 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 25 篇 school of comput...
  • 23 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 47 篇 xu bingjie
  • 42 篇 huang wei
  • 38 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 24 篇 yang jie
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 20 篇 bingjie xu
  • 19 篇 pi yaodi
  • 18 篇 xiaoniu yang
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 14 篇 fei yu

语言

  • 1,053 篇 英文
  • 39 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Security Communication Laboratory"
1116 条 记 录,以下是71-80 订阅
排序:
Enhancing security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
收藏 引用
Chinese Journal of Electronics 2018年 第3期27卷 625-633页
作者: LIU Dong CHEN Jing DU Ruiying ZHANG Huanguo Key Laboratory of Aerospace Information Security and the Trusted Computing Ministry of Education School of ComputerWuhan University Science and Technology on Communication Security Laboratory North Automatic Control Technique Research Institute Collaborative Innovation Center of Geospatial Technology
Recently several reduced-operation two Factor authentication(2FA) methods have been proposed to improve the usability of traditional 2FA. The existing works cannot protect the user's password from online guessing ... 详细信息
来源: 评论
Open World Recognition of communication Jamming Signals
收藏 引用
China communications 2023年 第6期20卷 199-214页
作者: Yan Tang Zhijin Zhao Jie Chen Shilian Zheng Xueyi Ye Caiyi Lou Xiaoniu Yang School of Communication Engineering Hangzhou Dianzi UniversityHangzhou 310018China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China
To improve the recognition ability of communication jamming signals,Siamese Neural Network-based Open World Recognition(SNNOWR)is *** algorithm can recognize known jamming classes,detect new(unknown)jamming classes,an... 详细信息
来源: 评论
MILP-aided bit-based division property for ARX ciphers
收藏 引用
science China(Information sciences) 2018年 第11期61卷 229-231页
作者: Ling SUN Wei WANG Ru LIU Meiqin WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Science and Technology on Communication Security Laboratory No.30 Research Institute of China Electronics Technology Group Corporation State Key Laboratory of Cryptology
Division property, which was proposed by Todo [1]at EUROCRYPT 2015, is a new technique to detect integral property. It could explicitly depict the hidden properties between the traditional ALL and BALANCE properties i... 详细信息
来源: 评论
Deep radio signal clustering with interpretability analysis based on saliency map
收藏 引用
Digital communications and Networks 2024年 第5期10卷 1448-1458页
作者: Huaji Zhou Jing Bai Yiran Wang Junjie Ren Xiaoniu Yang Licheng Jiao School of Artificial Intelligence Xidian UniversityXi’an710071China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033China
With the development of information technology,radio communication technology has made rapid *** radio signals that have appeared in space are difficult to classify without manually *** radio signal clustering methods... 详细信息
来源: 评论
Incremental Learning of Radio Modulation Classification Based on Sample Recall
收藏 引用
China communications 2023年 第7期20卷 258-272页
作者: Yan Zhao Shichuan Chen Tao Chen Weiguo Shen Shilian Zheng Zhijin Zhao Xiaoniu Yang School of Communication Engineering Hangzhou Dianzi UniversityHangzhou 310018China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China Institute of Cyberspace Security Zhejiang University of TechnologyHangzhou 310023China
Radio modulation classification has always been an important technology in the field of *** difficulty of incremental learning in radio modulation classification is that learning new tasks will lead to catastrophic fo... 详细信息
来源: 评论
The security analysis of PhpBB forum
The security analysis of PhpBB forum
收藏 引用
International Conference on Cyberspace technology, CCT 2014
作者: Zhang, Lijun Fan, Jia Science and Technology on Communication Security Laboratory ChengDu China
PhpBB forum is one of the widely applied network forums. In this paper, we investigate the security of this kind of forum. We analyze the whole process of security mechanism related to user's password, including p... 详细信息
来源: 评论
Optimization of WinRAR Password Cracking Algorithm Based on Heterogeneous Computing  21
Optimization of WinRAR Password Cracking Algorithm Based on ...
收藏 引用
21st IEEE International Conference on communication technology, ICCT 2021
作者: Yin, Hao Ni, Lulin Science and Technology on Communication Security Laboratory Chengdu China
Different versions of WinRAR compression software use SHA-1, SHA-256 as the core and use AES-128, AES-256, and CRC32 as verification encryption. WinRAR passwords are difficult to crack, and high-efficiency hardware ac... 详细信息
来源: 评论
Parametrical Construction of MDS Based on Block Cyclic Shift  21
Parametrical Construction of MDS Based on Block Cyclic Shift
收藏 引用
4th International Conference on Computer science and Software Engineering, CSSE 2021
作者: Wu, You Wang, Jin-Bo Zhang, Wen-Zheng Science and Technology on Communication Security Laboratory Institute of Southwestern Communication China
With the advent of the information age, using the same standard algorithm with fixed logic is difficult to meet the increasingly diversified cryptographic application requirements of cloud computing, Internet of thing... 详细信息
来源: 评论
The Design Method of Micro-Unit Cryptographic Service Framework
The Design Method of Micro-Unit Cryptographic Service Framew...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Zhao, Qi Tian, Bo Liu, Yiming Science and Technology on Communication Security Laboratory Chengdu China
In order to adapt to the rapid development of information technology in the digital age, it is necessary to build a general cryptographic service delivery capability to provide security protection for data exchange in... 详细信息
来源: 评论
A security Analysis of the Authentication Mechanism of Password Managers  21
A Security Analysis of the Authentication Mechanism of Passw...
收藏 引用
21st IEEE International Conference on communication technology, ICCT 2021
作者: Yu, Fei Yin, Hao Science and Technology on Communication Security Laboratory Chengdu China
A password manager is a tool that generates, stores and manages user's passwords for local and online services. The security of the popular password managers relies on their authentication mechanism. This paper gi... 详细信息
来源: 评论