咨询与建议

限定检索结果

文献类型

  • 544 篇 会议
  • 243 篇 期刊文献

馆藏范围

  • 787 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 554 篇 工学
    • 391 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 159 篇 电气工程
    • 118 篇 信息与通信工程
    • 79 篇 控制科学与工程
    • 69 篇 电子科学与技术(可...
    • 54 篇 网络空间安全
    • 44 篇 安全科学与工程
    • 27 篇 生物工程
    • 26 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 17 篇 交通运输工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 14 篇 化学工程与技术
  • 229 篇 理学
    • 131 篇 数学
    • 56 篇 物理学
    • 43 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 系统科学
    • 20 篇 化学
  • 136 篇 管理学
    • 102 篇 管理科学与工程(可...
    • 46 篇 工商管理
    • 44 篇 图书情报与档案管...
  • 30 篇 法学
    • 18 篇 社会学
    • 12 篇 法学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 13 篇 军事学
    • 11 篇 军队指挥学
  • 8 篇 农学
  • 5 篇 医学
  • 5 篇 艺术学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 34 篇 authentication
  • 29 篇 internet of thin...
  • 25 篇 cryptography
  • 24 篇 network security
  • 21 篇 security
  • 17 篇 access control
  • 14 篇 information secu...
  • 13 篇 data models
  • 12 篇 wireless communi...
  • 12 篇 accuracy
  • 11 篇 data privacy
  • 11 篇 anomaly detectio...
  • 11 篇 training
  • 10 篇 power grids
  • 10 篇 automation
  • 10 篇 laboratories
  • 10 篇 computational mo...
  • 9 篇 containers
  • 9 篇 network topology
  • 9 篇 blockchain

机构

  • 68 篇 state grid key l...
  • 63 篇 information secu...
  • 44 篇 state grid key l...
  • 36 篇 state key labora...
  • 28 篇 key laboratory o...
  • 26 篇 global energy in...
  • 24 篇 global energy in...
  • 19 篇 state grid smart...
  • 19 篇 national enginee...
  • 17 篇 global energy in...
  • 16 篇 state key labora...
  • 14 篇 state grid smart...
  • 12 篇 state grid corpo...
  • 11 篇 shandong provinc...
  • 11 篇 school of cyber ...
  • 11 篇 institute of inf...
  • 10 篇 state key labora...
  • 10 篇 institute of inf...
  • 10 篇 national enginee...
  • 10 篇 state grid zheji...

作者

  • 26 篇 yixian yang
  • 26 篇 xi zesheng
  • 25 篇 zhang bo
  • 25 篇 yang yixian
  • 21 篇 peng lin
  • 20 篇 lin peng
  • 17 篇 he chuan
  • 17 篇 lu chen
  • 17 篇 wang gang
  • 15 篇 xu min
  • 15 篇 chen mu
  • 15 篇 wang yunfan
  • 15 篇 shao zhipeng
  • 14 篇 wang he
  • 14 篇 yang ruxia
  • 14 篇 min xu
  • 13 篇 gang wang
  • 13 篇 yu hai
  • 13 篇 ruxia yang
  • 13 篇 chen lu

语言

  • 755 篇 英文
  • 19 篇 中文
  • 13 篇 其他
  • 2 篇 斯洛文尼亚文
检索条件"机构=State Grid Key Laboratory of Information and Network Security"
787 条 记 录,以下是21-30 订阅
排序:
Cross-Layer security for Semantic Communications: Metrics and Optimization
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui Nanjing University of Posts and Telecommunications College of Science Nanjing210003 China Nanjing University of Posts and Telecommunications College of Communication and Information Engineering Nanjing210003 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China Tsinghua University Department of Electronic Engineering Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
security Vulnerability Assessment of Power IoT based on Business security
Security Vulnerability Assessment of Power IoT based on Busi...
收藏 引用
2020 International Conference on Control, Robotics and Intelligent System, CCRIS 2020
作者: Fei, Jiaxuan Chen, Kai Yao, Qigui Guo, Qian Wang, Xiangqun State Grid Key Laboratory of Information and Network Security China
Power Internet of Things is the application of IoT in smart power grid. Once attacked, it will cause huge losses. Therefore, it is necessary to conduct a security assessment to take defensive measures. However, the tr... 详细信息
来源: 评论
Dynamic Access Control and Authorization System based on Zero-trust architecture
Dynamic Access Control and Authorization System based on Zer...
收藏 引用
2020 International Conference on Control, Robotics and Intelligent System, CCRIS 2020
作者: Yao, Qigui Wang, Qi Zhang, Xiaojian Fei, Jiaxuan State Grid Key Laboratory of Information and Network Security China
With the development of cloud computing, artificial intelligence, big data and other technologies, network systems are facing more and more security risks and threats. The traditional security architecture based on bo... 详细信息
来源: 评论
Density-aware and Depth-aware Visual Representation for Zero-Shot Object Counting
Density-aware and Depth-aware Visual Representation for Zero...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Fang Nan Feng Tian Ni Zhang Nian Liu Haonan Miao Guang Dai Mengmeng Wang Faculty of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an China School of Automation Northwestern Polytechnical University Xi’an China Computer Vision Department Mohamed bin Zayed University of Artificial Intelligence Abu Dhabi UAE SGIT AI Lab State Grid Corporation of China Zhejiang University of Technology Hang Zhou China
Previous methods often utilize CLIP semantic classifiers with class names for zero-shot object counting. However, they ignore crucial density and depth knowledge for counting tasks. Thus, we propose a density-aware an... 详细信息
来源: 评论
A novel quantum multiparty summation protocol based on a cooperative random number mechanism
收藏 引用
EPJ Quantum Technology 2025年 第1期12卷 1-19页
作者: Zhang, Kejia Zhang, Yu Zhang, Xue Liu, Hongyan Song, Tingting Du, Gang School of Computer Science and Big Data (School of Cybersecurity) Heilongjiang University Harbin China State Key Laboratory of Public Big Data Guizhou University Guiyang China School of Mathematical Science Heilongjiang University Harbin China Institute for Cryptology and Network Security Heilongjiang University Harbin China School of China Construction Bank University Northeastern Institute Harbin China College of Information Science and Technology Jinan University Guangzhou China
As a particular area of quantum security multiparty computation, quantum secure multiparty summation plays a critical role in modern cryptography. It is widely known that most of the existing quantum summation protoco...
来源: 评论
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power information System  2
An Attack Intention Recognition Method Based on Evaluation I...
收藏 引用
2017 IEEE 2nd information Technology, networking, Electronic and Automation Control Conference (ITNEC 2017)
作者: Xiaojuan Guan Yuanyuan Ma Ye Hua State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute
With the increasing scale of the network, the power information system has many characteristics, such as large number of nodes, complicated structure, diverse network protocols and abundant data, which make the networ... 详细信息
来源: 评论
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
收藏 引用
Chinese Physics B 2013年 第6期22卷 199-202页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information EngineeringChinese Academy of Sciences)
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... 详细信息
来源: 评论
Cross-Layer security for Semantic Communications: Metrics and Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui College of Science Nanjing University of Posts and Telecommunications Nanjing210003 China College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing210000 China Department of Electronic Engineering Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China The State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
High-efficiency quantum steganography based on the tensor product of Bell states
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2013年 第9期56卷 1745-1754页
作者: XU ShuJiang CHEN XiuBo NIU XinXin YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa... 详细信息
来源: 评论
A Novel Quantum Covert Channel Protocol Based on Any Quantum Secure Direct Communication Scheme
收藏 引用
Communications in Theoretical Physics 2013年 第5期59卷 547-553页
作者: 徐淑奖 陈秀波 钮心忻 杨义先 Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center State Key Laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences)
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e... 详细信息
来源: 评论