咨询与建议

限定检索结果

文献类型

  • 544 篇 会议
  • 243 篇 期刊文献

馆藏范围

  • 787 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 554 篇 工学
    • 391 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 159 篇 电气工程
    • 118 篇 信息与通信工程
    • 79 篇 控制科学与工程
    • 69 篇 电子科学与技术(可...
    • 54 篇 网络空间安全
    • 44 篇 安全科学与工程
    • 27 篇 生物工程
    • 26 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 17 篇 交通运输工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 14 篇 化学工程与技术
  • 229 篇 理学
    • 131 篇 数学
    • 56 篇 物理学
    • 43 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 系统科学
    • 20 篇 化学
  • 136 篇 管理学
    • 102 篇 管理科学与工程(可...
    • 46 篇 工商管理
    • 44 篇 图书情报与档案管...
  • 30 篇 法学
    • 18 篇 社会学
    • 12 篇 法学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 13 篇 军事学
    • 11 篇 军队指挥学
  • 8 篇 农学
  • 5 篇 医学
  • 5 篇 艺术学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 34 篇 authentication
  • 29 篇 internet of thin...
  • 25 篇 cryptography
  • 24 篇 network security
  • 21 篇 security
  • 17 篇 access control
  • 14 篇 information secu...
  • 13 篇 data models
  • 12 篇 wireless communi...
  • 12 篇 accuracy
  • 11 篇 data privacy
  • 11 篇 anomaly detectio...
  • 11 篇 training
  • 10 篇 power grids
  • 10 篇 automation
  • 10 篇 laboratories
  • 10 篇 computational mo...
  • 9 篇 containers
  • 9 篇 network topology
  • 9 篇 blockchain

机构

  • 68 篇 state grid key l...
  • 63 篇 information secu...
  • 44 篇 state grid key l...
  • 36 篇 state key labora...
  • 28 篇 key laboratory o...
  • 26 篇 global energy in...
  • 24 篇 global energy in...
  • 19 篇 state grid smart...
  • 19 篇 national enginee...
  • 17 篇 global energy in...
  • 16 篇 state key labora...
  • 14 篇 state grid smart...
  • 12 篇 state grid corpo...
  • 11 篇 shandong provinc...
  • 11 篇 school of cyber ...
  • 11 篇 institute of inf...
  • 10 篇 state key labora...
  • 10 篇 institute of inf...
  • 10 篇 national enginee...
  • 10 篇 state grid zheji...

作者

  • 26 篇 yixian yang
  • 26 篇 xi zesheng
  • 25 篇 zhang bo
  • 25 篇 yang yixian
  • 21 篇 peng lin
  • 20 篇 lin peng
  • 17 篇 he chuan
  • 17 篇 lu chen
  • 17 篇 wang gang
  • 15 篇 xu min
  • 15 篇 chen mu
  • 15 篇 wang yunfan
  • 15 篇 shao zhipeng
  • 14 篇 wang he
  • 14 篇 yang ruxia
  • 14 篇 min xu
  • 13 篇 gang wang
  • 13 篇 yu hai
  • 13 篇 ruxia yang
  • 13 篇 chen lu

语言

  • 755 篇 英文
  • 19 篇 中文
  • 13 篇 其他
  • 2 篇 斯洛文尼亚文
检索条件"机构=State Grid Key Laboratory of Information and Network Security"
787 条 记 录,以下是1-10 订阅
排序:
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
Cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and networks 2025年 第2期11卷 442-454页
作者: Zhou, Zhou Tian, Youliang Xiong, Jinbo Peng, Changgen Li, Jing Yang, Nan State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China
Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. However, existing studies focus on centra... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
network Intrusion Detection for Modern Smart grids Based on Adaptive Online Incremental Learning
收藏 引用
IEEE Transactions on Smart grid 2025年 第3期16卷 2541-2553页
作者: Lu, Qiuyu An, Kexin Li, Jun'e Wang, Jin Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China State Grid Hubei Electric Power Research Institute Energy Internet Research Center Wuhan430072 China
New and evolving cyber attacks against smart grids are emerging. This necessitates that the network intrusion detection systems (IDSs) have online learning ability. However, most existing methods struggle to handle ne... 详细信息
来源: 评论
Electronic band structures of topological kagome materials
收藏 引用
Chinese Physics B 2025年 第1期34卷 29-44页
作者: Man Li Huan Ma Rui Lou Shancai Wang School of Information Network Security People’s Public Security University of ChinaBeijing 100038China Department of Physics Key Laboratory of Quantum State Construction and Manipulation(Ministry of Education)and Beijing Key Laboratory of Opto-electronic Functional Materials&Micronano DevicesRenmin University of ChinaBeijing 100872China Leibniz Institute for Solid State and Materials Research IFW Dresden01069 DresdenGermany Helmholtz-Zentrum Berlin fur Materialien und Energie Albert-Einstein-Strabe 1512489 BerlinGermany Joint Laboratory“Functional Quantum Materials”at BESSY II 12489 BerlinGermany
The kagome lattice has garnered significant attention due to its ability to host quantum spin Fermi liquid ***,the combination of unique lattice geometry,electron–electron correlations,and adjustable magnetism in sol... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Task Offloading in Internet of Vehicles: A DRL-based Approach with Representation Learning for DAG Scheduling
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5045-5060页
作者: Deng, Xiaoheng Yang, Haoyu Zhang, Jingjing Gui, Jinsong Lin, Siyu Wang, Xin Min, Geyong Central South University School of Electronic Information Changsha410075 China Central South University Shenzhen Research Institute China Beijing Jiaotong University School of Electronic and Information Engineering The State Key Laboratory of Rail Traffic Control and Safety Beijing100044 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China University of Exeter Department of Computer Science ExeterEX4 4QF United Kingdom
The rapid evolution of the Internet-of-Vehicles (IoV) has amplified the need for mobile computing resources, driving the shift toward offloading tasks to edge servers or vehicles with idle resources to optimize comput... 详细信息
来源: 评论
All-optical pattern matching systems based on optical RTFT and conjugate multiplication for 260GBaud PSK optical signal
收藏 引用
Optics Express 2025年 第8期33卷 18024-18036页
作者: Zhang, Tiantian Gong, Xiaoxue Zhang, Qihan Hou, Weigang Zhang, Xu Guo, Lei School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China Institute of Intelligent Communications and Network Security Chongqing University of Posts and Telecommunications Chongqing400065 China State Key Laboratory of Advanced Manufacturing for Optical Systems Changchun Institute of Optics Fine Mechanics and Physics Chinese Academy of Sciences Jilin Changchun130033 China
The photonic firewall is a device that detects and localizes risky information at the optical layer to enhance the security of optical networks. The most significant and challenging component of the photonic firewall ... 详细信息
来源: 评论
Anomaly Detection in network Access-Using LSTM and Encoder-Enhanced Generative Adversarial networks
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第7期49卷 175-186页
作者: Hu, Jian He, Yingjun Xu, Wenqian Jiang, Yixin Liang, Zhihong Yang, Yiwei Yunnan Power Grid Information Center China Southern Power Grid Kunming650217 China Electric Power Research Institute China Southern Power Grid Guangzhou510663 China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou510663 China
Along with the continuous development of information technology, the database has become an important module for enterprises and individuals to apply computers, and some important data are stored in the database, whic... 详细信息
来源: 评论
Multi-label pathology editing of chest X-rays with a Controlled Diffusion Model
收藏 引用
Medical Image Analysis 2025年 103卷
作者: Chu, Huan Qi, Xiaolong Wang, Huiling Liang, Yi School of Network Security and Information Technology Yili Normal University Yining835000 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Key Laboratory of Intelligent Computing Research and Application Yining835399 China
Large-scale generative models have garnered significant attention in the field of medical imaging, particularly for image editing utilizing diffusion models. However, current research has predominantly concentrated on... 详细信息
来源: 评论