咨询与建议

限定检索结果

文献类型

  • 19,366 篇 会议
  • 18,660 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 38,049 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,453 篇 工学
    • 10,561 篇 计算机科学与技术...
    • 8,331 篇 软件工程
    • 5,332 篇 电子科学与技术(可...
    • 5,320 篇 信息与通信工程
    • 4,643 篇 电气工程
    • 2,856 篇 控制科学与工程
    • 2,813 篇 化学工程与技术
    • 2,748 篇 材料科学与工程(可...
    • 2,665 篇 光学工程
    • 2,268 篇 仪器科学与技术
    • 2,038 篇 机械工程
    • 1,412 篇 生物工程
    • 1,336 篇 动力工程及工程热...
    • 988 篇 网络空间安全
    • 959 篇 环境科学与工程(可...
    • 895 篇 土木工程
    • 858 篇 交通运输工程
    • 845 篇 冶金工程
    • 839 篇 建筑学
    • 803 篇 生物医学工程(可授...
  • 15,379 篇 理学
    • 7,152 篇 物理学
    • 5,589 篇 数学
    • 2,568 篇 化学
    • 1,744 篇 生物学
    • 1,722 篇 统计学(可授理学、...
    • 1,046 篇 系统科学
  • 4,187 篇 管理学
    • 2,833 篇 管理科学与工程(可...
    • 1,460 篇 图书情报与档案管...
    • 971 篇 工商管理
  • 813 篇 医学
  • 701 篇 法学
  • 690 篇 农学
  • 446 篇 经济学
  • 329 篇 军事学
  • 103 篇 教育学
  • 89 篇 文学
  • 59 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 489 篇 feature extracti...
  • 482 篇 simulation
  • 403 篇 deep learning
  • 330 篇 cryptography
  • 292 篇 accuracy
  • 280 篇 laboratories
  • 277 篇 semantics
  • 276 篇 training
  • 262 篇 remote sensing
  • 255 篇 security
  • 223 篇 wireless communi...
  • 218 篇 internet of thin...
  • 215 篇 optimization
  • 210 篇 computational mo...
  • 193 篇 object detection
  • 191 篇 information secu...
  • 189 篇 authentication
  • 169 篇 conferences
  • 167 篇 reinforcement le...
  • 164 篇 signal to noise ...

机构

  • 1,284 篇 state key labora...
  • 575 篇 university of ch...
  • 557 篇 state key labora...
  • 493 篇 state key labora...
  • 372 篇 school of cyber ...
  • 297 篇 center of materi...
  • 288 篇 state key labora...
  • 223 篇 state key labora...
  • 217 篇 school of remote...
  • 211 篇 school of electr...
  • 180 篇 college of infor...
  • 179 篇 departamento de ...
  • 174 篇 state key labora...
  • 171 篇 department for p...
  • 170 篇 faculty of scien...
  • 169 篇 department of ph...
  • 165 篇 university of sc...
  • 157 篇 department of ph...
  • 155 篇 department of ph...
  • 155 篇 shandong provinc...

作者

  • 153 篇 j. m. izen
  • 149 篇 c. alexa
  • 149 篇 g. bella
  • 149 篇 j. strandberg
  • 149 篇 d. calvet
  • 149 篇 c. amelung
  • 149 篇 n. orlando
  • 149 篇 y. tayalati
  • 149 篇 g. spigo
  • 146 篇 v. chiarella
  • 145 篇 f. siegert
  • 144 篇 h. a. gordon
  • 140 篇 a. c. könig
  • 138 篇 a. dimitrievska
  • 136 篇 f. deliot
  • 136 篇 m. klein
  • 135 篇 r. ströhmer
  • 132 篇 h. sakamoto
  • 130 篇 m. rijssenbeek
  • 124 篇 s. veneziano

语言

  • 35,134 篇 英文
  • 1,712 篇 中文
  • 1,142 篇 其他
  • 9 篇 法文
  • 6 篇 德文
  • 2 篇 斯洛文尼亚文
检索条件"机构=State Key Laboratory of Information Security(Institute of Information Engineering)"
38049 条 记 录,以下是41-50 订阅
排序:
ROBIN: A Novel Framework for Accelerating Robust Multi-Variant Training  25
ROBIN: A Novel Framework for Accelerating Robust Multi-Varia...
收藏 引用
30th Asia and South Pacific Design Automation Conference, ASP-DAC 2025
作者: Wang, Yan Wang, Xingbin Su, Yulan Zhang, Sisi Lin, Zechao Meng, Dan Hou, Rui Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Cas China School of Cyber Security University of Chinese Academy of Sciences China
Robust variants represent a promising method to enhance model robustness against adversarial attacks through exploring diverse neural network architectures. However, the significant computational demand of training mu... 详细信息
来源: 评论
InSAR-Based Coseismic Deformation, Fault Slip Distribution, and Coulomb Stress Propagation of the 2023 Herat Earthquake Sequence
收藏 引用
Seismological Research Letters 2025年 第3期96卷 1491-1503页
作者: Liang, Hongwei Sun, Guangtong Zhang, Guohong Fan, Xiaoran Chen, Han Wang, Jiaqing Shan, Xinjian Institute of Disaster Prevention Sanhe City China State Key Laboratory of Earthquake Dynamics Institute of Geology China Earthquake Administration Beijing China Beijing Key Laboratory of Urban Spatial Information Engineering Beijing China
From 7 to 15 October 2023, four Mw 6.3 earthquakes occurred in northwestern Afghanistan. These earthquakes occurred on the northeastern edge of the Arabia–Eurasia collision zone, within the fault transition zone form... 详细信息
来源: 评论
An Efficient Coherent Integration Method for Highly Maneuvering Target Detection by Exploiting Range-Azimuth Coupling Relationships Between Subsegments
收藏 引用
IEEE Sensors Journal 2025年 第9期25卷 15456-15476页
作者: Wan, Jun Jiang, Xinyu Liu, Chengyuan Li, Dong Xie, Xiaoran Sang, Qinglin Chen, Zhanye Chongqing University School of Microelectronics and Communication Engineering Chongqing Key Laboratory of Space Information Network and Intelligent Information Fusion Chongqing400044 China China Academy of Electronics and Information Technology Beijing100041 China State Key Laboratory of Millimeter Waves Institute of Electromagnetic Space Southeast University Nanjing210096 China
Arbitrary-order range migrations (RMs) and Doppler frequency migrations (DFMs) caused by complicated motions of highly maneuvering targets (HMTs) pose challenges for coherent integration (CI) in radar remote sensing a... 详细信息
来源: 评论
An Efficient and Secure Data Audit Scheme for Cloud-Based EHRs with Recoverable and Batch Auditing
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1533-1553页
作者: Yuanhang Zhang Xu An Wang Weiwei Jiang Mingyu Zhou Xiaoxuan Xu Hao Liu College of Cryptography Engineering Engineering University of People’s Armed PoliceXi’an710086China Key Laboratory of Network and Information Security Engineering University of People’s Armed PoliceXi’an710086China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing100876China
Cloud storage,a core component of cloud computing,plays a vital role in the storage and management of *** Health Records(EHRs),which document users’health information,are typically stored on cloud ***,users’sensitiv... 详细信息
来源: 评论
Spatial-transformation-based wave manipulations in electromagnetics and acoustics:From theory to applications
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第5期68卷 3-15页
作者: Zheng Zhang Qian Zhu Chao Song Weixiang Jiang State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast UniversityNanjing 210096China Purple Mountain Laboratories Nanjing 211111China
Transformation optics(TO)or transformation acoustics(TA)theory provides an elegant framework for designing intricate wavematerial interaction *** TO or TA with emerging metamaterial technology,the propagating waves in... 详细信息
来源: 评论
Efficient Multi-keyword Searchable and Verifiable Data Sharing for Cloud-Edge Collaboration Intelligent Transportation Systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15869-15882页
作者: Liu, Peng He, Qian Chen, Yiting Jiang, Shan Guilin University of Electronic Technology Department of Guangxi Key Laboratory of Cryptograph and Information Security Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Cryptograph and Information Security Guilin541004 China The Hong Kong Polytechnic University Department of Computing Hong Kong
Intelligent transportation systems (ITS) are essential for the development of future smart cities. They can improve traffic management, mitigate urban congestion, and provide extensive social services by disseminating... 详细信息
来源: 评论
Improved Algebraic Attacks on Round-Reduced LowMC with Single-Data Complexity  31st
Improved Algebraic Attacks on Round-Reduced LowMC with Sin...
收藏 引用
31st International Conference on Selected Areas in Cryptography, SAC 2024
作者: Ren, Xingwei Li, Yongqiang Wang, Mingsheng State Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Recently, Picnic3 has introduced several alternative LowMC instances, which prompts the cryptanalysis competition for LowMC. In this paper, we provide new solutions to the competition with full S-box layers under sing... 详细信息
来源: 评论
Transferable and Robust Dynamic Adversarial Attack against Object Detection Models
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16171-16180页
作者: Wang, Xinxin Chen, Jing Zhang, Zijun He, Kun Wu, Zongru Du, Ruiying Li, Qiao Liu, Gongshen Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Shanghai Jiao Tong University Department of Electronic Information and Electrical Engineering Shanghai201100 China
Object detection models have been widely deployed in physical world applications, and they are vulnerable to adversarial attacks. However, most adversarial attacks are implemented in a white-box setting, and under ide... 详细信息
来源: 评论
Polar code‑based secure transmission with higher message rate combining channel entropy and computational entropy
收藏 引用
Cybersecurity 2025年 第2期8卷 306-322页
作者: Chen An Mengjie Huang Xianhui Lu Lei Bi Weijie Li Key Laboratory of Cyberspace Security Defense Institute of Information EngineeringCASNo.19 Shucun RoadHaidian DistrictBeijing 100085China School of Cyber Security University of Chinese Academy of SciencesNo.19 Yuquan RoadShijingshan DistrictBeijing 100049China
The existing physical layer security schemes,which are based on the key generation model and the wire-tap channel model,achieve security by utilizing channel reciprocity entropy and noise entropy,*** contrast,we propo... 详细信息
来源: 评论
FPGA Real-Time Deployment of Low-Complexity Volterra Equalizer Based on Pruning and Non-Uniform Quantization
收藏 引用
Journal of Lightwave Technology 2025年 第9期43卷 4183-4192页
作者: Sun, Xinda Wang, Kaihui Zhu, Zonghui Zhang, Long Gou, Yumeng Meng, Yuanxiao Chen, Yun Yu, Jianjun Fudan University Department of Communication Science and Engineering State Key Laboratory of ASIC and System Key Laboratory for Information Science of Electromagnetic Waves School of Information Science and Technology Shanghai 200433 China Fudan University Shanghai200433 China
Electronic nonlinear equalization technology is a promising signal impairments compensation technique with great development potential and wide application scenarios. However, its high complexity makes it challenging ... 详细信息
来源: 评论