咨询与建议

限定检索结果

文献类型

  • 19,338 篇 会议
  • 18,599 篇 期刊文献
  • 26 册 图书

馆藏范围

  • 37,963 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,272 篇 工学
    • 10,516 篇 计算机科学与技术...
    • 8,315 篇 软件工程
    • 5,289 篇 信息与通信工程
    • 5,229 篇 电子科学与技术(可...
    • 4,572 篇 电气工程
    • 2,823 篇 控制科学与工程
    • 2,809 篇 化学工程与技术
    • 2,738 篇 光学工程
    • 2,630 篇 材料科学与工程(可...
    • 2,269 篇 仪器科学与技术
    • 2,034 篇 机械工程
    • 1,414 篇 生物工程
    • 1,328 篇 动力工程及工程热...
    • 979 篇 网络空间安全
    • 942 篇 环境科学与工程(可...
    • 882 篇 土木工程
    • 858 篇 交通运输工程
    • 845 篇 冶金工程
    • 806 篇 建筑学
    • 801 篇 生物医学工程(可授...
  • 15,325 篇 理学
    • 7,112 篇 物理学
    • 5,557 篇 数学
    • 2,553 篇 化学
    • 1,738 篇 生物学
    • 1,697 篇 统计学(可授理学、...
    • 1,052 篇 系统科学
  • 4,205 篇 管理学
    • 2,858 篇 管理科学与工程(可...
    • 1,452 篇 图书情报与档案管...
    • 966 篇 工商管理
  • 816 篇 医学
  • 688 篇 农学
  • 683 篇 法学
  • 443 篇 经济学
  • 329 篇 军事学
  • 106 篇 教育学
  • 89 篇 文学
  • 60 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 492 篇 feature extracti...
  • 480 篇 simulation
  • 396 篇 deep learning
  • 339 篇 cryptography
  • 292 篇 accuracy
  • 281 篇 training
  • 280 篇 semantics
  • 276 篇 laboratories
  • 266 篇 remote sensing
  • 257 篇 security
  • 219 篇 internet of thin...
  • 218 篇 optimization
  • 218 篇 computational mo...
  • 216 篇 wireless communi...
  • 192 篇 object detection
  • 192 篇 authentication
  • 192 篇 information secu...
  • 169 篇 conferences
  • 165 篇 reinforcement le...
  • 160 篇 signal to noise ...

机构

  • 1,273 篇 state key labora...
  • 572 篇 university of ch...
  • 568 篇 state key labora...
  • 498 篇 state key labora...
  • 374 篇 school of cyber ...
  • 299 篇 center of materi...
  • 292 篇 state key labora...
  • 224 篇 state key labora...
  • 218 篇 school of remote...
  • 216 篇 school of electr...
  • 179 篇 departamento de ...
  • 178 篇 college of infor...
  • 173 篇 department for p...
  • 170 篇 faculty of scien...
  • 168 篇 state key labora...
  • 167 篇 department of ph...
  • 163 篇 university of sc...
  • 155 篇 department of ph...
  • 155 篇 shandong provinc...
  • 153 篇 faculté des scie...

作者

  • 155 篇 j. m. izen
  • 151 篇 c. alexa
  • 151 篇 g. bella
  • 151 篇 j. strandberg
  • 151 篇 d. calvet
  • 151 篇 c. amelung
  • 151 篇 n. orlando
  • 151 篇 y. tayalati
  • 151 篇 g. spigo
  • 149 篇 v. chiarella
  • 148 篇 f. siegert
  • 146 篇 h. a. gordon
  • 144 篇 a. c. könig
  • 142 篇 a. dimitrievska
  • 137 篇 f. deliot
  • 137 篇 m. klein
  • 136 篇 r. ströhmer
  • 133 篇 h. sakamoto
  • 131 篇 m. rijssenbeek
  • 126 篇 s. veneziano

语言

  • 35,154 篇 英文
  • 1,726 篇 中文
  • 1,096 篇 其他
  • 52 篇 法文
  • 48 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=State Key Laboratory of Information Security(Institute of Information Engineering)"
37963 条 记 录,以下是1-10 订阅
排序:
Full-round impossible diferential attack on shadow block cipher
收藏 引用
Cybersecurity 2025年 第1期8卷 247-261页
作者: Yuting Liu Yongqiang Li Huiqin Chen Mingsheng Wang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Lightweight block ciphers are the essential encryption algorithm for devices with limited *** goal is to ensure the security of data transmission through resource-constrained *** diferential cryptanalysis is one of th... 详细信息
来源: 评论
Malicious Document Detection Based on GGE Visualization
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1233-1254页
作者: Youhe Wang Yi Sun Yujie Li Chuanqi Zhou Henan Province Key Laboratory of Information Security Information Engineering UniversityZhengzhou450000China
With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers ... 详细信息
来源: 评论
Institution Attribute Mining Technology for Access Control Based on Hybrid Capsule Network
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1495-1513页
作者: Aodi Liu Xuehui Du Na Wang Xiangyu Wu Henan Province Key Laboratory of Information Security Information Engineering UniversityZhengzhou450000China
security attributes are the premise and foundation for implementing Attribute-Based Access Control(ABAC)***,when dealing with massive volumes of unstructured text big data resources,the current attribute management me... 详细信息
来源: 评论
BRITD:behavior rhythm insider threat detection with time awareness and user adaptation
收藏 引用
Cybersecurity 2025年 第1期8卷 227-246页
作者: Shuang Song Neng Gao Yifei Zhang Cunqing Ma Institute of Information Engineering Chinese Academy of SciencesBeijingChina State Key of Laboratory of Information Security Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Researchers usually detect insider threats by analyzing user *** time information of user behavior is an important concern in internal threat *** works on insider threat detection fail to make full use of the time inf... 详细信息
来源: 评论
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
Cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
SeaFlame: Communication-Efficient Secure Aggregation for Federated Learning against Malicious Entities
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2025年 第2期2025卷 69-93页
作者: Tang, Jinling Xu, Haixia Liao, Huimei Zhou, Yinchang Key Laboratory of Cyberspace Security Defense Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Secure aggregation is a popular solution to ensuring privacy for federated learning. However, when considering malicious participants in secure aggregation, it is difficult to achieve both privacy and high efficiency.... 详细信息
来源: 评论
High Capacity Reversible Data Hiding Algorithm in Encrypted Images Based on Image Adaptive MSB Prediction and Secret Sharing
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1139-1156页
作者: Kaili Qi Minqing Zhang Fuqiang Di Chao Jiang Key Laboratory of Network & Information Security under PAP Engineering University of PAPXi'an 710086China
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding ***,this paper innovatively proposes a... 详细信息
来源: 评论
On-orbit attitude planning for Earth observation imaging with star-based geometric calibration
收藏 引用
Science China(Technological Sciences) 2025年 第2期68卷 243-256页
作者: Di HUANG Zhifu WANG Jianya GONG Haoran JI Institute of Aerospace Science and Technology School of Remote Sensing and Information EngineeringWuhan UniversityWuhan 430072China State Key Laboratory of Information Engineering in Surveying Mapping and Remote SensingSchool of Remote Sensing and Information EngineeringWuhan UniversityWuhan 430072China National Key Laboratory of Air-based Information Perception and Fusion Luoyang 471009China Intelligent Game and Decision Laboratory Beijing 100071China
To improve the quality of remote sensing images,a novel on-orbit attitude planning method for Earth observation imaging with star-based geometric calibration is presented in this *** traditional imaging processes,the ... 详细信息
来源: 评论
Fairness is essential for robustness:fair adversarial training by identifying and augmenting hard examples
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 1-13页
作者: Ningping MOU Xinli YUE Lingchen ZHAO Qian WANG Key Laboratory of Aerospace Information Security and Trusted Computing(Ministry of Education) School of Cyber Science and EngineeringWuhan UniversityWuhan 430072China
Adversarial training has been widely considered the most effective defense against adversarial ***,recent studies have demonstrated that a large discrepancy exists in the class-wise robustness of adversarial training,... 详细信息
来源: 评论