咨询与建议

限定检索结果

文献类型

  • 1,770 篇 期刊文献
  • 1,519 篇 会议
  • 1 册 图书

馆藏范围

  • 3,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,137 篇 工学
    • 1,051 篇 计算机科学与技术...
    • 819 篇 软件工程
    • 428 篇 信息与通信工程
    • 377 篇 电子科学与技术(可...
    • 355 篇 电气工程
    • 255 篇 控制科学与工程
    • 170 篇 化学工程与技术
    • 159 篇 机械工程
    • 146 篇 材料科学与工程(可...
    • 143 篇 仪器科学与技术
    • 125 篇 光学工程
    • 125 篇 生物工程
    • 120 篇 网络空间安全
    • 109 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 63 篇 安全科学与工程
    • 57 篇 建筑学
    • 55 篇 生物医学工程(可授...
  • 1,281 篇 理学
    • 488 篇 数学
    • 473 篇 物理学
    • 164 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 150 篇 大气科学
    • 142 篇 化学
    • 92 篇 系统科学
  • 400 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 82 篇 法学
  • 78 篇 医学
    • 56 篇 临床医学
  • 58 篇 农学
  • 54 篇 军事学
  • 38 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 35 篇 optimization
  • 35 篇 computational mo...
  • 33 篇 quantum cryptogr...
  • 32 篇 protocols
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 26 篇 machine learning
  • 24 篇 data mining
  • 23 篇 predictive model...

机构

  • 173 篇 state key labora...
  • 150 篇 national key lab...
  • 117 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 69 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 28 篇 state key labora...
  • 28 篇 key laboratory o...
  • 26 篇 beijing institut...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 26 篇 ai bo
  • 24 篇 wang wei
  • 23 篇 zhao jinjing
  • 22 篇 li yang
  • 19 篇 xiaochun cao
  • 19 篇 xiu-bo chen
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xiaohui kuang
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 li jin
  • 17 篇 yang yang
  • 17 篇 gang xu

语言

  • 3,024 篇 英文
  • 154 篇 中文
  • 109 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3290 条 记 录,以下是21-30 订阅
排序:
Influence of different anodised nanoporous structures on the anti-icing and electrical properties of transmission Al lines
收藏 引用
High Voltage 2025年 第1期10卷 167-177页
作者: Xu Dai Yuan Yuan Jie Xiao Chenghao Jiang Xujiang Hua Huiying Xiang Tao Zhu Guoyong Liu Jiang Zhou Ruijin Liao State Key Laboratory of Power Transmission Equipment&System Security and New Technology Chongqing UniversityChongqingChina College of Materials Science and Engineering Chongqing UniversityChongqingChina Dongfang Electric Machinery Co. LtdDeyangChina
Ice accumulation of overhead transmission lines can lead to serious damage to power *** nanostructured Al conductors are proposed to replace the de-icing or ice-melting equipment for economic advantages,good anti-icin... 详细信息
来源: 评论
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2813-2827页
作者: Yi-Bo Cao Xiu-Bo Chen Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen Information Security Center State Key Laboratory ofNetworking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Information Center of China North Industries Group Corporation Beijing100089China School of Information Science and Technology North China University of TechnologyBeijing100144China
Due to the rapid advancements in network technology,blockchain is being employed for distributed data *** the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different tru... 详细信息
来源: 评论
Clock Bias Gross Error Detection Method Based on WS-MAD
收藏 引用
Gyroscopy and Navigation 2024年 第1期15卷 68-82页
作者: Jia Su Gao, Mengjia Yi, Qingwu Wang, Binbin Ma, Zhiwei College of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang China State Key Laboratory of Satellite Navigation System and Equipment Technology Shijiazhuang China Henan University of Economics and Law Zhengzhou China
Abstract: This paper proposes a clock bias gross error detection method, which combines weighted support vector data description (SVDD) with modified median absolute deviation (MAD) to address the limitations of the t... 详细信息
来源: 评论
Near Optimal Probabilistic Constructions of Frameproof Codes
收藏 引用
IEEE Transactions on information Theory 2025年 第6期71卷 4137-4144页
作者: Liu, Miao Ma, Zengjiao Shangguan, Chong Shandong University Research Center for Mathematics and Interdisciplinary Sciences Qingdao266237 China Shandong University State Key Laboratory of Cryptography and Digital Economy Security Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education School of Cyber Science and Technology Shandong Qingdao266237 China Ministry of Education Frontiers Science Center for Nonlinear Expectations Qingdao266237 China
Frameproof codes are a class of secure codes that were originally introduced in the pioneering work of Boneh and Shaw in the context of digital fingerprinting. They can be used to enhance the security and credibility ... 详细信息
来源: 评论
A merged machine learning model for seasonal climate prediction in China
收藏 引用
science China Earth sciences 2025年 第5期68卷 1469-1484页
作者: Danwei QIAN Yanyan HUANG Huijun WANG State Key Laboratory of Climate System Prediction and Risk Management/Key Laboratory of Meteorological Disaster Ministry of Education/Collaborative Innovation Center on Forecast and Evaluation of Meteorological Disasters Nanjing University of Information Science and Technology Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai) Nansen-Zhu International Research Centre Institute of Atmospheric Physics Chinese Academy of Sciences
Improving the current level of skill in seasonal climate prediction is urgent for achieving sustainable socioeconomic development, and this is especially true in China where meteorological disasters are experienced fr... 详细信息
来源: 评论
Cryptanalysis of Full-Round Magpie Block Cipher
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 217-224页
作者: YANG Yunxiao SUN Bing LIU Guoqiang College of Liberal Arts and Sciences National University of Defense Technology State Key Laboratory of Cryptology Hunan Engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Science
Magpie is a lightweight block cipher proposed by Li et al. in Acta Electronica Sinica volumn 45,issue 10. It adopts an substitution-permutation network(SPN) structure with a block size of 64 bits and the key size of... 详细信息
来源: 评论
Discriminative feature encoding for intrinsic image decomposition
收藏 引用
Computational Visual Media 2023年 第3期9卷 597-618页
作者: Zongji Wang Yunfei Liu Feng Lu Key Laboratory of Network Information System Technology(NIST) Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100190China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Peng Cheng Laboratory Shenzhen 518000China
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution sp... 详细信息
来源: 评论
Effect of the grain boundary character distribution on the sulfur corrosion behaviour and mechanisms of copper windings under different high temperatures
收藏 引用
High Voltage 2024年 第3期9卷 566-580页
作者: Xu Dai Yuan Yuan Jiang Zhou Guoyong Liu Tao Zhu Huiying Xiang Qi Yu Xue Gao Ruijin Liao State Key Laboratory of Power Transmission Equipment&System Security and New Technology Chongqing UniversityChongqingChina College of Materials Science and Engineering Chongqing UniversityChongqingChina Dongfang Electric Machinery Co. LtdDeyangChina
As a typical failure phenomenon in transformers,sulfur corrosion has garnered significant attention in the field of high-voltage *** boundary character distribution(GBCD)copper windings have been introduced to enhance... 详细信息
来源: 评论
Heuristic Search with Cut Point Based Strategy for Critical Node Problem
收藏 引用
Journal of Computer science & technology 2024年 第6期39卷 1328-1340页
作者: Zhi-Han Chen Shao-Wei Cai Jian Gao Shi-Ke Ge Chan-Juan Liu Jin-Kun Lin School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 101408China Key Laboratory of System Software(Chinese Academy of Sciences)and State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China College of Information Science and Technology Northeast Normal UniversityChangchun 130024China School of Computer Science and Technology Dalian University of TechnologyDalian 116024China SeedMath Technology Limited Beijing 100086China
The critical node problem(CNP)aims to deal with critical node identification in a graph,which has extensive applications in many *** CNP is a challenging task due to its computational complexity,and it attracts much a... 详细信息
来源: 评论
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks  35
Fine-Grained Source Code Vulnerability Detection via Graph N...
收藏 引用
35th International Conference on Software Engineering and Knowledge Engineering, SEKE 2023
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanpin Kuang, Xiaohui Li, Xiang Zhong, Wenjing National Key Laboratory of Science and Technology Information System Security Beijing China Xidian University Xi’an China
Although the number of exploitable vulnerabilities in software continues to increase, the speed of bug fixes and software updates have not increased accordingly. It is therefore crucial to analyze the source code and ... 详细信息
来源: 评论