咨询与建议

限定检索结果

文献类型

  • 1,806 篇 期刊文献
  • 1,515 篇 会议
  • 1 册 图书

馆藏范围

  • 3,322 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,188 篇 工学
    • 1,069 篇 计算机科学与技术...
    • 829 篇 软件工程
    • 439 篇 信息与通信工程
    • 397 篇 电子科学与技术(可...
    • 387 篇 电气工程
    • 265 篇 控制科学与工程
    • 174 篇 化学工程与技术
    • 165 篇 机械工程
    • 157 篇 材料科学与工程(可...
    • 148 篇 仪器科学与技术
    • 130 篇 光学工程
    • 126 篇 生物工程
    • 126 篇 网络空间安全
    • 116 篇 动力工程及工程热...
    • 70 篇 环境科学与工程(可...
    • 69 篇 交通运输工程
    • 66 篇 安全科学与工程
    • 60 篇 建筑学
    • 60 篇 土木工程
    • 57 篇 生物医学工程(可授...
  • 1,309 篇 理学
    • 489 篇 数学
    • 484 篇 物理学
    • 165 篇 生物学
    • 158 篇 统计学(可授理学、...
    • 157 篇 大气科学
    • 144 篇 化学
    • 92 篇 系统科学
  • 407 篇 管理学
    • 274 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 82 篇 法学
  • 78 篇 医学
  • 58 篇 农学
  • 54 篇 军事学
  • 41 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 deep learning
  • 46 篇 semantics
  • 45 篇 security
  • 41 篇 privacy
  • 40 篇 information secu...
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 39 篇 training
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 33 篇 quantum cryptogr...
  • 32 篇 protocols
  • 28 篇 blockchain
  • 26 篇 neural networks
  • 26 篇 machine learning
  • 24 篇 data mining
  • 24 篇 network security

机构

  • 173 篇 state key labora...
  • 151 篇 national key lab...
  • 115 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 69 篇 information secu...
  • 66 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 state key labora...
  • 37 篇 key laboratory f...
  • 37 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 32 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 26 篇 ai bo
  • 25 篇 wang wei
  • 24 篇 zhao jinjing
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 18 篇 xiaohui kuang
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 17 篇 gang xu
  • 16 篇 guo hong

语言

  • 3,056 篇 英文
  • 153 篇 中文
  • 110 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3322 条 记 录,以下是41-50 订阅
排序:
Sequential Indifferentiability of 7-Round Misty Structures
Sequential Indifferentiability of 7-Round Misty Structures
收藏 引用
Cryptographers’ Track at the RSA Conference, CT-RSA 2025
作者: Ai, Jiayi Guo, Chun School of Cyber Science and Technology Shandong University Qingdao China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education Shandong University Shandong Qingdao266237 China Shandong Research Institute of Industrial Technology Shandong Jinan250102 China
We investigate the Misty structure with respect to the security notion of sequential indifferentiability of Mandal et al. (TCC 2012). As our main result, we prove sequential indifferentiability for 7-round Misty struc...
来源: 评论
Deep Learning and Projection Neural Network With Finite-Time Convergence for Energy Management of Multi-Energy system
收藏 引用
IEEE Transactions on Smart Grid 2025年 第3期16卷 2156-2168页
作者: Liu, Xueying He, Xing Li, Chaojie Huang, Tingwen Southwest University Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing College of Electronic and Information Engineering Chongqing400715 China North China Electric Power University State Key Laboratory of Alternate Electrical Power System With Renewable Energy Sources Beijing102206 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
In this paper, an approach based on projection neural network (PNN), sliding mode control technique, and deep learning is proposed to solve the energy management problem of multi-energy systems (MES) containing dynami... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
An efficient formal verification method for concurrent programs  4
An efficient formal verification method for concurrent progr...
收藏 引用
4th International Conference on Network Communication and information security, ICNCIS 2024
作者: Zhang, Jianyu Zhang, Long Zhang, Jingjing Yang, Feng University of Electronic Science and Technology of China 2006 Xiyuan Avenue Western District High-Tech Zone Chengdu611731 China National Key Laboratory of Science and Technology on Information System Security No. 13 Dachen Road Fengtai District Beijing100141 China
Formal methods (FM) are a pivotal technology for ensuring the safety and reliability of software systems. These methods are centered around the application of precise mathematical principles to verify the security and... 详细信息
来源: 评论
Validation of Sea Surface Winds from the Space-borne Radiometer COWVR
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12241-12247页
作者: Zhou, Luo Wang, Zhixiong Zhang, Naiqiang Qu, Jianhua State Key Laboratory of Climate System Prediction and Risk Management Nanjing210044 China Nanjing University of Information Science and Technology School of Marine Sciences Nanjing210044 China Beijng Huayun Shinetek Science and Technology Co. Ltd Beijing China
This study aims to validate sea surface wind data derived from the Compact Ocean Wind Vector Radiometer (COWVR) onboard the International Space Station (ISS). The COWVR, a fully polarimetric and two-look microwave rad... 详细信息
来源: 评论
Few-Shot Source Separation for IoT Anti-Jamming via Multi-Task Learning and Meta-Learning
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16761-16776页
作者: Guo, Pengcheng Yu, Miao Li, Cheng An, Kang Sun, Yifu Chatzinotas, Symeon Niyato, Dusit National University of Defense Technology Sixty-Third Research Institute China State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System China Kyung Hee University College of Electronics and Information Yongin-si17104 Korea Republic of Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore
Malicious jamming attacks pose a significant threat to the integrity and performance of Internet of Things (IoT) networks. However, many jamming patterns are rare or infrequent, which makes them difficult to counter e... 详细信息
来源: 评论
CRFENet: Cross-Spectral Stereo Matching Network Exploiting Reciprocal Feature Evolution  2nd
CRFENet: Cross-Spectral Stereo Matching Network Exploiting R...
收藏 引用
2nd International Conference on the Frontiers of Robotics and Software Engineering, FRSE 2024
作者: Li, Yangqin Zhang, Guanghui Zhu, Dongchen Shi, Wenjun Wang, Lei Zhang, Xiaolin Shanghai Institute of Microsystem and Information Technology Bionic Vision System Laboratory State Key Laboratory of Transducer Technology Chinese Academy of Sciences Shanghai200050 China University of Chinese Academy of Sciences Beijing100049 China School of Information Science and Technology ShanghaiTech University Shanghai201210 China
Cross-spectral stereo matching opens up a new route for disparity estimation in low-light scenes. However, the variations in light absorption and reflection properties for objects at different wavelengths create subst... 详细信息
来源: 评论
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme with Fast Encryption and Outsourced Decryption for IoT  24th
BAV-DSS: Blockchain Assisted Verifiable Data Sharing Scheme ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Huang, Yao Yu, Zhongyuan Wang, Guijuan Chai, Baobao Zhang, Hongliang Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250353 China School of Information Science and Engineering Lanzhou University Lanzhou730000 China School of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Many sophisticated cloud platforms are available to provide services such as storage and computation for Internet of Things (IoT) applications. However, with the concerns about the semi-trusted nature of cloud platfor... 详细信息
来源: 评论
Fast resistivity imaging of transient electromagnetic using an extreme learning machine
收藏 引用
Soft Computing 2025年 第2期29卷 1121-1131页
作者: Li, Ruiyou Zhang, Yong Li, Guang Li, Ruiheng Hu, Jia Li, Min School of Software and Internet of Things Engineering Jiangxi University of Finance and Economics NanChang330013 China School of Geophysics and Measurement Control Technology East China University of Technology NanChang330013 China School of Information Engineering Hubei University of Economics Wuhan430205 China The State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing400044 China
The transient electromagnetic method (TEM) is widely used in geophysical exploration. In TEM data interpretation, nonlinear inversion plays an important role. However, traditional TEM nonlinear inversion adopts the OC... 详细信息
来源: 评论
Tunable Synaptic Transistor With Volatile and Non-Volatile Switching Capabilities for Hierarchical Data Processing
IEEE Electron Device Letters
收藏 引用
IEEE Electron Device Letters 2025年 第5期46卷 789-792页
作者: Zhang, Guocheng Wang, Hongyu Qin, Shixian Tang, Jianchuan Zeng, Zili Su, Changqiang Yi, Xin Zhang, Xianghong Chen, Huipeng Fujian University of Technology Research Center for Microelectronics Technology Fuzhou350108 China Institute of Optoelectronic Display Fuzhou University Fuzhou350002 China Fudan University State Key Laboratory of Asic and System School of Microelectronics Shanghai200433 China Institute of Optoelectronic Display and Fujian Science and Technology Innovation Laboratory for Optoelectronic Information Fuzhou University Fuzhou350002 China
The hierarchical processing capabilities of the human visual system can significantly enhance the efficiency of data processing in the central nervous system. Volatile and non-volatile devices are key components in si... 详细信息
来源: 评论