咨询与建议

限定检索结果

文献类型

  • 1,773 篇 期刊文献
  • 1,514 篇 会议
  • 1 册 图书

馆藏范围

  • 3,288 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,148 篇 工学
    • 1,060 篇 计算机科学与技术...
    • 830 篇 软件工程
    • 425 篇 信息与通信工程
    • 380 篇 电子科学与技术(可...
    • 364 篇 电气工程
    • 257 篇 控制科学与工程
    • 171 篇 化学工程与技术
    • 164 篇 机械工程
    • 155 篇 材料科学与工程(可...
    • 149 篇 仪器科学与技术
    • 128 篇 生物工程
    • 126 篇 光学工程
    • 120 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 68 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 65 篇 安全科学与工程
    • 57 篇 建筑学
    • 57 篇 土木工程
    • 56 篇 生物医学工程(可授...
  • 1,285 篇 理学
    • 487 篇 数学
    • 473 篇 物理学
    • 167 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 151 篇 大气科学
    • 141 篇 化学
    • 93 篇 系统科学
  • 406 篇 管理学
    • 273 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 79 篇 法学
  • 78 篇 医学
  • 57 篇 农学
  • 54 篇 军事学
  • 40 篇 经济学
  • 8 篇 教育学
  • 7 篇 艺术学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 47 篇 semantics
  • 45 篇 security
  • 44 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 quantum cryptogr...
  • 26 篇 neural networks
  • 26 篇 blockchain
  • 24 篇 data mining
  • 24 篇 machine learning
  • 24 篇 network security

机构

  • 174 篇 state key labora...
  • 151 篇 national key lab...
  • 111 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 71 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 35 篇 state key labora...
  • 34 篇 state key labora...
  • 31 篇 science and tech...
  • 31 篇 shandong provinc...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 29 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 25 篇 ai bo
  • 24 篇 wang wei
  • 24 篇 zhao jinjing
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 17 篇 gang xu
  • 17 篇 xiaohui kuang
  • 16 篇 guo hong

语言

  • 3,033 篇 英文
  • 151 篇 中文
  • 107 篇 其他
  • 4 篇 法文
  • 3 篇 德文
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3288 条 记 录,以下是31-40 订阅
排序:
Laser Scribed CNTs/PEEK/TPU Composites Film for High-performance Stretchable Electrodes
收藏 引用
IEEE Sensors Journal 2025年 第10期25卷 16666-16674页
作者: Jiang, Caiyun Tang, Lei Hou, Jian Ding, Guqiao Sheng, Bin University of Shanghai for Science and Technology College of Optical Electrical and Computer Engineering Shanghai200093 China Engineering Research Center of Optical Instruments and System Shanghai Key Laboratory of Modern Optical Systems Shanghai200093 China Chinese Academy of Sciences State Key Laboratory of Materials for Integrated Circuits Shanghai Institute of Microsystem and Information Technology Shanghai200050 China
In this paper, an elastic composite material comprising carbon nanotubes (CNTs), polyether-ether-ketone (PEEK), and thermoplastic polyurethane (TPU) is presented, in which direct laser-induced graphitization was used ... 详细信息
来源: 评论
Sequential Indifferentiability of 7-Round Misty Structures
Sequential Indifferentiability of 7-Round Misty Structures
收藏 引用
Cryptographers’ Track at the RSA Conference, CT-RSA 2025
作者: Ai, Jiayi Guo, Chun School of Cyber Science and Technology Shandong University Qingdao China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education Shandong University Shandong Qingdao266237 China Shandong Research Institute of Industrial Technology Shandong Jinan250102 China
We investigate the Misty structure with respect to the security notion of sequential indifferentiability of Mandal et al. (TCC 2012). As our main result, we prove sequential indifferentiability for 7-round Misty struc...
来源: 评论
Stochastic Trajectory Optimization for Robotic Skill Acquisition From a Suboptimal Demonstration
收藏 引用
IEEE Robotics and Automation Letters 2025年 第6期10卷 6127-6134页
作者: Ming, Chenlin Wang, Zitong Zhang, Boxuan Cao, Zhanxiang Duan, Xiaoming He, Jianping Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Department of Automation Shanghai China School of Computation Information and Technology Germany Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China Shanghai Jiao Tong University State Key Laboratory of Submarine Geoscience the Department of Automation Shanghai200240 China
Learning from Demonstration (LfD) has emerged as a crucial method for robots to acquire new skills. However, when given suboptimal task trajectory demonstrations with shape characteristics reflecting human preferences... 详细信息
来源: 评论
Deep Learning and Projection Neural Network With Finite-Time Convergence for Energy Management of Multi-Energy system
收藏 引用
IEEE Transactions on Smart Grid 2025年 第3期16卷 2156-2168页
作者: Liu, Xueying He, Xing Li, Chaojie Huang, Tingwen Southwest University Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing College of Electronic and Information Engineering Chongqing400715 China North China Electric Power University State Key Laboratory of Alternate Electrical Power System With Renewable Energy Sources Beijing102206 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
In this paper, an approach based on projection neural network (PNN), sliding mode control technique, and deep learning is proposed to solve the energy management problem of multi-energy systems (MES) containing dynami... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ni, Jinghui Cui, Hui Zhao, Lihai Li, Fengling Han, Xiaohui Xu, Lijuan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China Quan Cheng Laboratory China Shandong Open University China University of Technology Sydney Australia
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论
An efficient formal verification method for concurrent programs  4
An efficient formal verification method for concurrent progr...
收藏 引用
4th International Conference on Network Communication and information security, ICNCIS 2024
作者: Zhang, Jianyu Zhang, Long Zhang, Jingjing Yang, Feng University of Electronic Science and Technology of China 2006 Xiyuan Avenue Western District High-Tech Zone Chengdu611731 China National Key Laboratory of Science and Technology on Information System Security No. 13 Dachen Road Fengtai District Beijing100141 China
Formal methods (FM) are a pivotal technology for ensuring the safety and reliability of software systems. These methods are centered around the application of precise mathematical principles to verify the security and... 详细信息
来源: 评论
CRFENet: Cross-Spectral Stereo Matching Network Exploiting Reciprocal Feature Evolution  2nd
CRFENet: Cross-Spectral Stereo Matching Network Exploiting R...
收藏 引用
2nd International Conference on the Frontiers of Robotics and Software Engineering, FRSE 2024
作者: Li, Yangqin Zhang, Guanghui Zhu, Dongchen Shi, Wenjun Wang, Lei Zhang, Xiaolin Shanghai Institute of Microsystem and Information Technology Bionic Vision System Laboratory State Key Laboratory of Transducer Technology Chinese Academy of Sciences Shanghai200050 China University of Chinese Academy of Sciences Beijing100049 China School of Information Science and Technology ShanghaiTech University Shanghai201210 China
Cross-spectral stereo matching opens up a new route for disparity estimation in low-light scenes. However, the variations in light absorption and reflection properties for objects at different wavelengths create subst... 详细信息
来源: 评论
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
Fast resistivity imaging of transient electromagnetic using an extreme learning machine
收藏 引用
Soft Computing 2025年 第2期29卷 1121-1131页
作者: Li, Ruiyou Zhang, Yong Li, Guang Li, Ruiheng Hu, Jia Li, Min School of Software and Internet of Things Engineering Jiangxi University of Finance and Economics NanChang330013 China School of Geophysics and Measurement Control Technology East China University of Technology NanChang330013 China School of Information Engineering Hubei University of Economics Wuhan430205 China The State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing400044 China
The transient electromagnetic method (TEM) is widely used in geophysical exploration. In TEM data interpretation, nonlinear inversion plays an important role. However, traditional TEM nonlinear inversion adopts the OC... 详细信息
来源: 评论