咨询与建议

限定检索结果

文献类型

  • 1,773 篇 期刊文献
  • 1,514 篇 会议
  • 1 册 图书

馆藏范围

  • 3,288 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,148 篇 工学
    • 1,060 篇 计算机科学与技术...
    • 830 篇 软件工程
    • 425 篇 信息与通信工程
    • 380 篇 电子科学与技术(可...
    • 364 篇 电气工程
    • 257 篇 控制科学与工程
    • 171 篇 化学工程与技术
    • 164 篇 机械工程
    • 155 篇 材料科学与工程(可...
    • 149 篇 仪器科学与技术
    • 128 篇 生物工程
    • 126 篇 光学工程
    • 120 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 68 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 65 篇 安全科学与工程
    • 57 篇 建筑学
    • 57 篇 土木工程
    • 56 篇 生物医学工程(可授...
  • 1,285 篇 理学
    • 487 篇 数学
    • 473 篇 物理学
    • 167 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 151 篇 大气科学
    • 141 篇 化学
    • 93 篇 系统科学
  • 406 篇 管理学
    • 273 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 79 篇 法学
  • 78 篇 医学
  • 57 篇 农学
  • 54 篇 军事学
  • 40 篇 经济学
  • 8 篇 教育学
  • 7 篇 艺术学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 47 篇 semantics
  • 45 篇 security
  • 44 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 quantum cryptogr...
  • 26 篇 neural networks
  • 26 篇 blockchain
  • 24 篇 data mining
  • 24 篇 machine learning
  • 24 篇 network security

机构

  • 174 篇 state key labora...
  • 151 篇 national key lab...
  • 111 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 71 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 35 篇 state key labora...
  • 34 篇 state key labora...
  • 31 篇 science and tech...
  • 31 篇 shandong provinc...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 29 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 25 篇 ai bo
  • 24 篇 wang wei
  • 24 篇 zhao jinjing
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 17 篇 gang xu
  • 17 篇 xiaohui kuang
  • 16 篇 guo hong

语言

  • 3,033 篇 英文
  • 151 篇 中文
  • 107 篇 其他
  • 4 篇 法文
  • 3 篇 德文
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3288 条 记 录,以下是191-200 订阅
排序:
Cross-Domain Animal Pose Estimation with Skeleton Anomaly-Aware Learning
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年
作者: Han, Le Chen, Kaixuan Zhao, Lei Jiang, Yangbo Wang, Pengfei Zheng, Nenggan Zhejiang Hangzhou310007 China Zhejiang University College of Computer Science and Technology Zhejiang Hangzhou310007 China Zhejiang University State Key Laboratory of Blockchain and Data Security Zhejiang Hangzhou310007 China Institute of Blockchain and Data Security. China Zhejiang University School of Software Technology Ningbo China Zhejiang University State Key Lab of Brain-Machine Intelligence Hangzhou310007 China Zhejiang Provincial Government ZJU Collaborative Innovation Center for Artificial Intelligence by MOE Hangzhou310007 China Bengbu University School of Computer and Information Engineering Bengbu233030 China
Animal pose estimation is often constrained by the scarcity of annotations and the diversity of scenarios and species. The pseudo-label generation based unsupervised domain adaptation paradigm, which discriminates the... 详细信息
来源: 评论
Advanced Operation and Control Schemes of Retired Batteries in DC Microgrid for Secondary Usage
收藏 引用
IEEE Transactions on Smart Grid 2025年
作者: Wang, Ning Jiang, Yongbin Wang, Yanbo Mou, Di Liu, Yonghui Hu, Weihao Chen, Zhe Aalborg University Department of Energy Technology Aalborg9220 Denmark Nanyang Technological University School of Electrical and Electronic Engineering Singapore639798 Singapore Chongqing University State Key Laboratory of Power Transmission Equipment System Security and New Technology School of Electrical Engineering Chongqing400044 China Xi'an Jiaotong University School of Electrical Engineering Xi'an710049 China University of Electronic Science and Technology of China School of Mechanical and Electrical Engineering Chengdu610056 China
The utilization of repurposed second-life batteries from electric vehicles in DC microgrids presents a sustainable and cost-effective solution. However, efficiently integrating these batteries within DC microgrids pos... 详细信息
来源: 评论
Global Variability and Future Projections of Marine Heatwave Onset and Decline Rates
收藏 引用
Remote Sensing 2025年 第8期17卷 1362-1362页
作者: Pan, Yongyan Sun, Wenjin Bao, Senliang Xie, Mingshen Jiang, Lei Ji, Jinlin Yu, Yang Dong, Changming State Key Laboratory of Climate System Prediction and Risk Management Nanjing210044 China International Geophysical Fluid Research Center Nanjing210044 China School of Marine Sciences Nanjing University of Information Science and Technology Nanjing210044 China Zhuhai519000 China College of Meteorology and Oceanography National University of Defense Technology Changsha410073 China Fujian Provincial Meteorological Observatory Fuzhou350007 China Key Laboratory of Straits Severe Weather China Meteorological Administration Fuzhou350007 China
Marine heatwaves (MHWs) can significantly impact marine ecosystems and socio-economic systems, and their severity may increase with global warming. Nevertheless, research on the onset and decline rates of MHWs remains... 详细信息
来源: 评论
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers
收藏 引用
science China(information sciences) 2017年 第5期60卷 84-95页
作者: Yupeng JIANG Qun-Xiong ZHENG Dongdai LIN State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficien... 详细信息
来源: 评论
A User-Centric Data Secure Creation Scheme in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2016年 第4期25卷 753-760页
作者: SU Mang LI Fenghua SHI Guozhen GENG Kui XIONG Jinbo School of Computer Science and Engineering Nanjing University of Science and Technology State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Department of Information Security Beijing Electronic Science and Technology Institute State Key Laboratory of Integrated Services Network Xidian University
Due to the use of the cloud computing technology,the ownership is separated from the administration of the data in cloud and the shared data might be migrated between different clouds,which would bring new challenges ... 详细信息
来源: 评论
Minimizing Data Collection Latency for Coexisting Time-Critical Wireless Networks with Tree Topologies
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Zhang, Jialin Liang, Wei Yang, Bo Shi, Huaguang Liang, Ying-Chang Chinese Academy of Sciences State Key Laboratory of Robotics Shenyang Institute of Automation Shenyang110016 China Chinese Academy of Sciences Key Laboratory of Networked Control System Shenyang Institute of Automation Shenyang110016 China Northwest A and F University College of Information Engineering Yangling712100 China Henan University School of Artificial Intelligence Zhengzhou450046 China University of Electronic Science and Technology of China Center for Intelligent Networking and Communications Chengdu611731 China
Time-Critical Wireless Network (TCWN) is a promising communication technology that can satisfy the low latency, high reliability, and deterministic requirements of mission-critical applications. Multiple TCWNs require... 详细信息
来源: 评论
Open Set RF Fingerprinting Identification: A Joint Prediction and Siamese Comparison Framework
arXiv
收藏 引用
arXiv 2025年
作者: Cai, Donghong Shan, Jiahao Gao, Ning He, Bingtao Chen, Yingyang Jin, Shi Fan, Pingzhi College of Cyber Security College of Information Science and Technology Jinan University Guangzhou510632 China The School of Cyber Science and Engineering Southeast University Nanjing210096 China The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Institute of Mobile Communications Southwest Jiaotong University Chengdu611756 China
Radio Frequency Fingerprinting Identification (RFFI) is a lightweight physical layer identity authentication technique. It identifies the radio-frequency device by analyzing the signal feature differences caused by th... 详细信息
来源: 评论
Adaptive Perception for Unified Visual Multi-modal Object Tracking
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Hu, Xiantao Zhong, Bineng Liang, Qihua Shi, Liangtao Mo, Zhiyi Tai, Ying Yang, Jian Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Guilin541004 China Guangxi Normal University Security Guilin541004 China Guangxi Normal University Intelligent Technology Guilin541004 China Guangxi Normal University Ministry of Education Guilin541004 China Wuzhou University School of Data Science Wuzhou543002 China Wuzhou University Software Engineering Wuzhou543002 China Nanjing University State Key Laboratory for Novel Software Technology Suzhou215163 China Nanjing University of Science and Technology School of Computer Science Nanjing210094 China Nanjing University of Science and Technology Engineering Nanjing210094 China
Recently, many multi-modal trackers prioritize RGB as the dominant modality, treating other modalities as auxiliary, and fine-tuning separately various multi-modal tasks. This imbalance in modality dependence limits t... 详细信息
来源: 评论
Generative AI-driven Cross-layer Covert Communication: Fundamentals, Framework and Case Study
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Tianhao Liu, Jiqiang Zhang, Tao Wang, Jian Wang, Jiacheng Kang, Jiawen Niyato, Dusit Mao, Shiwen School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100045 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Automation Guangdong University of Technology Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
Ensuring end-to-end cross-layer communication security in military networks by selecting covert schemes between nodes is a key solution for military communication security. With the development of communication techno... 详细信息
来源: 评论
Effectiveness Evaluation for Clinical Depression Detection Using Deep Learning Based Synthetic House-Tree-Person Test
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Chen, Zhuolong Yin, Xiaoqing Yang, Fan Li, Xiaofan Zhao, Zixuan Li, Xueying Liu, Jianghu Zhao, Yubin Xu, Cheng-Zhong Zheng, Fangfang Lin, Yong Sun Yat-Sen University School of Microelectronics Science and Technology 0000 China The Fifth Affiliated Hospital of Sun Yat-Sen University Department of Psychiatry 0000 China The Fifth Affiliated Hospital of Sun Yat-Sen University Pediatrics Department 0000 China Jinan University School of Intelligent System Science and Engineering 0000 China University of Macau State Key Laboratory of IoTSC Department of Computer and Information Science Macau0000 China
Depression is one of the most common mood disorders and the number of patients increases significantly in recent years. Due to the lack of biomarkers, conversation between patients and psychiatrists is still the main ... 详细信息
来源: 评论