咨询与建议

限定检索结果

文献类型

  • 544 篇 会议
  • 243 篇 期刊文献

馆藏范围

  • 787 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 554 篇 工学
    • 391 篇 计算机科学与技术...
    • 329 篇 软件工程
    • 159 篇 电气工程
    • 118 篇 信息与通信工程
    • 79 篇 控制科学与工程
    • 69 篇 电子科学与技术(可...
    • 54 篇 网络空间安全
    • 44 篇 安全科学与工程
    • 27 篇 生物工程
    • 26 篇 动力工程及工程热...
    • 21 篇 仪器科学与技术
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 17 篇 交通运输工程
    • 16 篇 土木工程
    • 15 篇 建筑学
    • 14 篇 化学工程与技术
  • 229 篇 理学
    • 131 篇 数学
    • 56 篇 物理学
    • 43 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 系统科学
    • 20 篇 化学
  • 136 篇 管理学
    • 102 篇 管理科学与工程(可...
    • 46 篇 工商管理
    • 44 篇 图书情报与档案管...
  • 30 篇 法学
    • 18 篇 社会学
    • 12 篇 法学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 13 篇 军事学
    • 11 篇 军队指挥学
  • 8 篇 农学
  • 5 篇 医学
  • 5 篇 艺术学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 34 篇 authentication
  • 29 篇 internet of thin...
  • 25 篇 cryptography
  • 24 篇 network security
  • 21 篇 security
  • 17 篇 access control
  • 14 篇 information secu...
  • 13 篇 data models
  • 12 篇 wireless communi...
  • 12 篇 accuracy
  • 11 篇 data privacy
  • 11 篇 anomaly detectio...
  • 11 篇 training
  • 10 篇 power grids
  • 10 篇 automation
  • 10 篇 laboratories
  • 10 篇 computational mo...
  • 9 篇 containers
  • 9 篇 network topology
  • 9 篇 blockchain

机构

  • 68 篇 state grid key l...
  • 63 篇 information secu...
  • 44 篇 state grid key l...
  • 36 篇 state key labora...
  • 28 篇 key laboratory o...
  • 26 篇 global energy in...
  • 24 篇 global energy in...
  • 19 篇 state grid smart...
  • 19 篇 national enginee...
  • 17 篇 global energy in...
  • 16 篇 state key labora...
  • 14 篇 state grid smart...
  • 12 篇 state grid corpo...
  • 11 篇 shandong provinc...
  • 11 篇 school of cyber ...
  • 11 篇 institute of inf...
  • 10 篇 state key labora...
  • 10 篇 institute of inf...
  • 10 篇 national enginee...
  • 10 篇 state grid zheji...

作者

  • 26 篇 yixian yang
  • 26 篇 xi zesheng
  • 25 篇 zhang bo
  • 25 篇 yang yixian
  • 21 篇 peng lin
  • 20 篇 lin peng
  • 17 篇 he chuan
  • 17 篇 lu chen
  • 17 篇 wang gang
  • 15 篇 xu min
  • 15 篇 chen mu
  • 15 篇 wang yunfan
  • 15 篇 shao zhipeng
  • 14 篇 wang he
  • 14 篇 yang ruxia
  • 14 篇 min xu
  • 13 篇 gang wang
  • 13 篇 yu hai
  • 13 篇 ruxia yang
  • 13 篇 chen lu

语言

  • 755 篇 英文
  • 19 篇 中文
  • 13 篇 其他
  • 2 篇 斯洛文尼亚文
检索条件"机构=State Grid Key Laboratory of Information and Network Security"
787 条 记 录,以下是31-40 订阅
排序:
Autocorrelation of two Legendre-Sidelnikov sequences
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2014年 第5期21卷 83-88,93页
作者: XIE Jia GAO Jun-tao YUE Zhao LI Xue-lian The State Key Laboratory of Integrated Services Network Xidian University Department of Mathematics Xidian University State Key Laboratory of Information Security Chinese Academy of Sciences
Sequences with nice pseudo-randomness play an important role in not only communication system but also cryptography system. Based on the Legendre-Sidelnikov sequence, a modified Legendre-Sidelnikov sequence was introd... 详细信息
来源: 评论
A User-Centric Data Secure Creation Scheme in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 753-760页
作者: SU Mang LI Fenghua SHI Guozhen GENG Kui XIONG Jinbo School of Computer Science and Engineering Nanjing University of Science and Technology State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Department of Information Security Beijing Electronic Science and Technology Institute State Key Laboratory of Integrated Services Network Xidian University
Due to the use of the cloud computing technology,the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds,which would bring new challenges ... 详细信息
来源: 评论
Electronic band structures of topological kagome materials
arXiv
收藏 引用
arXiv 2025年
作者: Li, Man Ma, Huan Lou, Rui Wang, Shancai School of Information Network Security People’s Public Security University of China Beijing100038 China Beijing Key Laboratory of Opto-electronic Functional Materials & Micronano Devices Renmin University of China Beijing100872 China Leibniz Institute for Solid State and Materials Research IFW Dresden Dresden01069 Germany Helmholtz-Zentrum Berlin für Materialien und Energie Albert-Einstein-Straße 15 Berlin12489 Germany Joint Laboratory "Functional Quantum Materials" BESSY II Berlin12489 Germany
The kagome lattice has garnered significant attention due to its ability to host quantum spin Fermi liquid states. Recently, the combination of unique lattice geometry, electron-electron correlations, and adjustable m... 详细信息
来源: 评论
DFMC:Feature-Driven Data-Free Knowledge Distillation
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年
作者: Zhang, Zherui Xu, Rongtao Wang, Changwei Xu, Wenhao Chen, Shunpeng Xu, Shibiao Xu, Guangyuan Guo, Li Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Data-Free Knowledge Distillation (DFKD) enables knowledge transfer from teacher networks without access to the real dataset. However, generator-based DFKD methods often suffer from insufficient diversity or low-confid... 详细信息
来源: 评论
Universal quantum computation with qudits
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2014年 第9期57卷 1712-1717页
作者: LUO MingXing WANG XiaoJun Information Security and National Computing Grid Laboratory Southwest Jiaotong University State Key Laboratory of Information Security (Institute of Information Engineering Chinese Academy of Sciences) School of Electronic Engineering Dublin City University
Quantum circuit model has been widely explored for various quantum applications such as Shors algorithm and Grovers searching *** of previous algorithms are based on the qubit *** a proposal for a universal circuit is... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
A Provably Secure General Construction for key Exchange Protocols Using Smart Card and Password
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 271-278页
作者: ZHANG Gefei FAN Dan ZHANG Yuqing LI Xiaowei National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a *** of these protocols are often limited to s... 详细信息
来源: 评论
ATEDU-NET: An Attention-Embedded Deep Unet for multi-disease diagnosis in chest X-ray images, breast ultrasound, and retina fundus
收藏 引用
Computers in Biology and Medicine 2025年 186卷 109708-109708页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Agbesi, Victor K. Ejiyi, Makuachukwu Bennedith Chikwendu, Ijeoma A. Bamisile, Oluwatoyosi F. Onyekwere, Favour Ezinne Bamisile, Olusola O. College of Nuclear Technology and Automation Engineering Chengdu University of Technology Sichuan 610059 China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
In image segmentation for medical image analysis, effective upsampling is crucial for recovering spatial information lost during downsampling. This challenge becomes more pronounced when dealing with diverse medical i... 详细信息
来源: 评论
Computing Power in the Sky: Digital Twin-assisted Collaborative Computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
Sensitive Data Comparison Algorithm Based Spatio-temporal Label Distribution Fusion  2
Sensitive Data Comparison Algorithm Based Spatio-temporal La...
收藏 引用
2nd International Conference on Algorithms, High Performance Computing and Artificial Intelligence, AHPCAI 2022
作者: Yu, Pengfei Shi, Congcong State Grid Smart Grid Research Institute Co. Ltd State Grid Key Laboratory of Information & Network Security Nanjing China
While the IoT cooperates with big data to deeply reconstruct all walks of life, it also poses more severe challenges to data security. Accurate identification of sensitive data is a prerequisite for data security. Com... 详细信息
来源: 评论