咨询与建议

限定检索结果

文献类型

  • 1,773 篇 期刊文献
  • 1,514 篇 会议
  • 1 册 图书

馆藏范围

  • 3,288 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,148 篇 工学
    • 1,060 篇 计算机科学与技术...
    • 830 篇 软件工程
    • 425 篇 信息与通信工程
    • 380 篇 电子科学与技术(可...
    • 364 篇 电气工程
    • 257 篇 控制科学与工程
    • 171 篇 化学工程与技术
    • 164 篇 机械工程
    • 155 篇 材料科学与工程(可...
    • 149 篇 仪器科学与技术
    • 128 篇 生物工程
    • 126 篇 光学工程
    • 120 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 68 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 65 篇 安全科学与工程
    • 57 篇 建筑学
    • 57 篇 土木工程
    • 56 篇 生物医学工程(可授...
  • 1,285 篇 理学
    • 487 篇 数学
    • 473 篇 物理学
    • 167 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 151 篇 大气科学
    • 141 篇 化学
    • 93 篇 系统科学
  • 406 篇 管理学
    • 273 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 79 篇 法学
  • 78 篇 医学
  • 57 篇 农学
  • 54 篇 军事学
  • 40 篇 经济学
  • 8 篇 教育学
  • 7 篇 艺术学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 47 篇 semantics
  • 45 篇 security
  • 44 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 quantum cryptogr...
  • 26 篇 neural networks
  • 26 篇 blockchain
  • 24 篇 data mining
  • 24 篇 machine learning
  • 24 篇 network security

机构

  • 174 篇 state key labora...
  • 151 篇 national key lab...
  • 111 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 71 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 35 篇 state key labora...
  • 34 篇 state key labora...
  • 31 篇 science and tech...
  • 31 篇 shandong provinc...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 29 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 25 篇 ai bo
  • 24 篇 wang wei
  • 24 篇 zhao jinjing
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 17 篇 gang xu
  • 17 篇 xiaohui kuang
  • 16 篇 guo hong

语言

  • 3,033 篇 英文
  • 151 篇 中文
  • 107 篇 其他
  • 4 篇 法文
  • 3 篇 德文
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3288 条 记 录,以下是41-50 订阅
排序:
Tunable Synaptic Transistor With Volatile and Non-Volatile Switching Capabilities for Hierarchical Data Processing
IEEE Electron Device Letters
收藏 引用
IEEE Electron Device Letters 2025年 第5期46卷 789-792页
作者: Zhang, Guocheng Wang, Hongyu Qin, Shixian Tang, Jianchuan Zeng, Zili Su, Changqiang Yi, Xin Zhang, Xianghong Chen, Huipeng Fujian University of Technology Research Center for Microelectronics Technology Fuzhou350108 China Institute of Optoelectronic Display Fuzhou University Fuzhou350002 China Fudan University State Key Laboratory of Asic and System School of Microelectronics Shanghai200433 China Institute of Optoelectronic Display and Fujian Science and Technology Innovation Laboratory for Optoelectronic Information Fuzhou University Fuzhou350002 China
The hierarchical processing capabilities of the human visual system can significantly enhance the efficiency of data processing in the central nervous system. Volatile and non-volatile devices are key components in si... 详细信息
来源: 评论
security-Enhanced Data Sharing Via Efficient Sanitization for VANETs
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4925-4938页
作者: Zhong, Hong Zhou, Dan Cui, Jie Wang, Li Zhang, Jing Bolodurina, Irina He, Debiao Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education School of Computer Science and Technology Hefei230039 China Anhui University Anhui Engineering Laboratory of IoT Security Technologies Hefei230039 China Orenburg State University Faculty of Mathematics and Information Technologies Orenburg460018 Russia Wuhan University School of Cyber Science and Engineering Wuhan430072 China MatrixElements Technologies Shanghai Key Laboratory of Privacy Preserving Computation Shanghai201204 China
With the widespread deployment of vehicular ad-hoc networks (VANETs), data sharing has garnered considerable attention as a core feature of VANETs. Attribute-based proxy re-encryption (ABPRE) enables fine-grained acce... 详细信息
来源: 评论
Moving Target Defense Meets Artificial Intelligence-Driven Network: A Comprehensive Survey
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 13384-13397页
作者: Zhang, Tao Kong, Fanyu Deng, Dongshang Tang, Xiangyun Wu, Xuangou Xu, Changqiao Zhu, Liehuang Liu, Jiqiang Ai, Bo Han, Zhu Deng, Robert H. Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet Anhui243002 China Minzu University of China School of Information Engineering Beijing100081 China Chongqing University College of Computer Science Chongqing400044 China Anhui University of Technology School of Computer Science and Technology Anhui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui243002 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing Jiaotong University School of Electronic and Information Engineering Frontiers Science Center for Smart High-speed Railway System Beijing100044 China University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Singapore Management University Department of Information Systems Singapore Singapore
Based on emerging Artificial Intelligence (AI) tasks, cloud-edge-terminal architecture can provide powerful computing, intelligent interconnection, and real-time response, which can also be regarded as AI-driven netwo... 详细信息
来源: 评论
Probing links between climate change and solar variability using wavelet analyses
收藏 引用
Frontiers of Earth science 2025年 1-18页
作者: Wang, Dong Jia, Wenjing State Key Laboratory of Climate System Prediction and Risk Management Nanjing University of Information Science and Technology Nanjing China
Possible links between the Earth’s surface temperature and solar variability are investigated using uni- and bivariate wavelet methods, in an attempt to attribute the fluctuations of the global mean surface temperatu...
来源: 评论
Efficient Design Optimization for Diffractive Deep Neural Networks
收藏 引用
IEEE Transactions on Computer-Aided Design of Integrated Circuits and systems 2025年 第3期44卷 1199-1203页
作者: Wu, Kun Liu, Yuncheng Gao, Hui Tao, Jun Xiong, Wei Li, Xin Wuhan University School of Electronic Information Wuhan430072 China Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics The School of Optical and Electronic Information Wuhan430074 China Optics Valley Laboratory of Hubei Wuhan430074 China Fudan University State Key Laboratory of Integrated Chips and System School of Microelectronics Shanghai200433 China Duke Kunshan University Data Science Research Center Jiangsu Kunshan215316 China
Since diffractive deep neural network (D2NN) provides a full optical solution to implement deep neural networks (DNNs), it offers ultrafast operation speed and virtually unlimited bandwidth, yielding an alternative-ye... 详细信息
来源: 评论
A MIMO Neural Network Integrated with Maximum Likelihood Phase Recovery for Transoceanic Coherent Transmission
收藏 引用
Journal of Lightwave technology 2025年
作者: Wang, Kaihui Wang, Chen Zheng, Tianqi Long, Jianyu Sang, Bohan Zhou, Wen Yu, Jianjun Fudan University State Key Laboratory of ASIC and System School of Information Science and Technology Shanghai200433 China
We proposed a low-complexity multi-input multi-output neural network integrated with a maximum likelihood phase recovery algorithm (MIMO-NN-BMLPR), which is adopted in long-haul coherent optical communication. Neural ... 详细信息
来源: 评论
High-frequency enhanced ultrafast compressed active photography
收藏 引用
Opto-Electronic Advances 2025年 第1期8卷 32-43页
作者: Yizhao Meng Yu Lu Pengfei Zhang Yi Liu Fei Yin Lin Kai Qing Yang Feng Chen State Key Laboratory for Manufacturing System Engineering and Shaanxi Key Laboratory of Photonics Technology for Information School of Electronic Science and EngineeringXi’an Jiaotong UniversityXi’an 710049China School of Mechanical Engineering Xi’an Jiaotong UniversityXi’an 710049China
Single-shot ultrafast compressed imaging(UCI)is an effective tool for studying ultrafast dynamics in physics,chemistry,or material science because of its excellent high frame rate and large frame ***,the random code(R... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Fake News Detection Across Multiple Domains Using Fuzzy Association Rules  24th
Fake News Detection Across Multiple Domains Using Fuzzy Asso...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Xiaofeng Zhang, Weisha Huang, Yuanyuan Lu, Hongyu Lu, Jiazhong School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China SUGON Industrial Control and Security Center Chengdu610225 China School of Foreign Languages University of Electronic Science and Technology of China Chengdu611731 China
The detection of fake news is not confined to a single domain, and due to domain transfer, the reliance on detection methods specific to a single domain becomes inadequate when dealing with multi-domain issues. When a... 详细信息
来源: 评论
Mining User–Item Interactions via Knowledge Graph for Recommendation
收藏 引用
ACM Transactions on Recommender systems 2025年 第3期3卷 1-19页
作者: Shenghao Liu Lingyun Lu Bang Wang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Smart Internet Technology School of Electronic Information and Communications Huazhong University of Science and Technology (HUST) Wuhan China
Introducing a Knowledge Graph (KG) to facilitate a recommender system has become a tendency in recent years. Many existing methods leverage KGs to obtain side information of items to promote item representation learni... 详细信息
来源: 评论