咨询与建议

限定检索结果

文献类型

  • 1,770 篇 期刊文献
  • 1,519 篇 会议
  • 1 册 图书

馆藏范围

  • 3,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,137 篇 工学
    • 1,051 篇 计算机科学与技术...
    • 819 篇 软件工程
    • 428 篇 信息与通信工程
    • 377 篇 电子科学与技术(可...
    • 355 篇 电气工程
    • 255 篇 控制科学与工程
    • 170 篇 化学工程与技术
    • 159 篇 机械工程
    • 146 篇 材料科学与工程(可...
    • 143 篇 仪器科学与技术
    • 125 篇 光学工程
    • 125 篇 生物工程
    • 120 篇 网络空间安全
    • 109 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 63 篇 安全科学与工程
    • 57 篇 建筑学
    • 55 篇 生物医学工程(可授...
  • 1,281 篇 理学
    • 488 篇 数学
    • 473 篇 物理学
    • 164 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 150 篇 大气科学
    • 142 篇 化学
    • 92 篇 系统科学
  • 400 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 82 篇 法学
  • 78 篇 医学
    • 56 篇 临床医学
  • 58 篇 农学
  • 54 篇 军事学
  • 38 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 35 篇 optimization
  • 35 篇 computational mo...
  • 33 篇 quantum cryptogr...
  • 32 篇 protocols
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 26 篇 machine learning
  • 24 篇 data mining
  • 23 篇 predictive model...

机构

  • 173 篇 state key labora...
  • 150 篇 national key lab...
  • 117 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 69 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 28 篇 state key labora...
  • 28 篇 key laboratory o...
  • 26 篇 beijing institut...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 26 篇 ai bo
  • 24 篇 wang wei
  • 23 篇 zhao jinjing
  • 22 篇 li yang
  • 19 篇 xiaochun cao
  • 19 篇 xiu-bo chen
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xiaohui kuang
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 li jin
  • 17 篇 yang yang
  • 17 篇 gang xu

语言

  • 3,024 篇 英文
  • 154 篇 中文
  • 109 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3290 条 记 录,以下是41-50 订阅
排序:
Cross-modality information Check for Detecting Jailbreaking in Multimodal Large Language Models
Cross-modality Information Check for Detecting Jailbreaking ...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Xu, Yue Qi, Xiuyuan Qin, Zhan Wang, Wenjie School of Information Science and Technology ShanghaiTech University China The State Key Laboratory of Blockchain and Data Security Zhejiang University China
Multimodal Large Language Models (MLLMs) extend the capacity of LLMs to understand multimodal information comprehensively, achieving remarkable performance in many vision-centric tasks. Despite that, recent studies ha...
来源: 评论
An attribute-based access control scheme using blockchain technology for IoT data protection
收藏 引用
High-Confidence Computing 2024年 第3期4卷 41-50页
作者: Zenghui Yang Xiubo Chen Yunfeng He Luxi Liu Yinmei Che Xiao Wang Ke Xiao Gang Xu Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China Information Center of China North Industries Group Corporation Beijing 100089China School of Information Science and Technology North China University of TechnologyBeijing 100144China
With the wide application of the Internet of Things(IoT),storing large amounts of IoT data and protecting data privacy has become a meaningful *** general,the access control mechanism is used to prevent illegal users ... 详细信息
来源: 评论
A Blackbox Fuzzing Based on Automated state Machine Extraction  8
A Blackbox Fuzzing Based on Automated State Machine Extracti...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Zhang, Zhaowei Yu, Wenjing Wang, Zibin Xiang, Youlin National Key Laboratory of Science and Technology on Information System Security Beijing China School of Computer Science Fudan University Shanghai Key Laboratory of Data Science Shanghai China
Currently, protocol fuzzing techniques mainly employ two approaches: greybox fuzzing based on mutation and blackbox fuzzing based on generation. Greybox fuzzing techniques use message exchanges between the protocol se... 详细信息
来源: 评论
Driving into Danger: Adversarial Patch Attack on End-To-End Autonomous Driving systems Using Deep Learning  28
Driving into Danger: Adversarial Patch Attack on End-To-End ...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Wang, Tong Kuang, Xiaohui Li, Hu Du, Qianjin Hu, Zhanhao Deng, Huan Zhao, Gang Institute of System Engineering Academy of Military Sciences Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Deep learning-based autonomous driving systems have been extensively researched due to their superior performance compared to traditional methods. Specifically, end-To-end deep learning systems have been developed, wh... 详细信息
来源: 评论
Health monitoring by optical fiber sensing technology for rechargeable batteries
收藏 引用
escience 2024年 第1期4卷 79-95页
作者: Yi Zhang Yanpeng Li Zezhou Guo Jianbo Li Xiaoyu Ge Qizhen Sun Zhijun Yan Zhen Li Yunhui Huang State Key Laboratory of Material Processing and Die&Mould Technology School of Materials Science and EngineeringHuazhong University of Science and TechnologyWuhanHubei430074China School of Optical and Electronic Information National Engineering Laboratory for Next Generation Internet Access SystemWuhan National Laboratory for OptoelectronicsHuazhong University of Science and TechnologyWuhanHubei430074China Henan Key Laboratory of Laser and Opto-electric Information Technology School of Electrical and Information EngineeringZhengzhou UniversityZhengzhouHenan45001China
With the proposal of a“smart battery,”real-time sensing by rechargeable batteries has become progressively more important in both fundamental research and practical ***,many traditional sensing technologies suffer f... 详细信息
来源: 评论
An Uncertainty Quantization-Based Method for Anti-UAV Detection in Infrared Images
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 1439-1458页
作者: Can Wu Wenyi Tang Yunbo Rao Yinjie Chen Hui Ding Shuzhen Zhu Yuanyuan Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu610054China State Key Laboratory of Air Traffic Management System Nanjing210000China National Airspace Management Center Beijing100094China
Infrared unmanned aerial vehicle(UAV)target detection presents significant challenges due to the inter-play between small targets and complex *** methods,while effective in controlled environments,often fail in scenar... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
A Survey of Human-machine Collaboration in Fuzzing  7
A Survey of Human-machine Collaboration in Fuzzing
收藏 引用
7th IEEE International Conference on Data science in Cyberspace, DSC 2022
作者: Yan, Qian Huang, Minhuan Cao, Huayang National Key Laboratory of Science and Technology on Information System Security Beijing China
security vulnerabilities are a major threat to network security, and fuzzing is one of the most widely used vulnerability mining techniques. Traditional fuzzing consists of three phases, where security experts perform... 详细信息
来源: 评论
Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2815-2837页
作者: Mengmeng Zhao Haipeng Peng Lixiang Li Yeqing Ren Information Security Center State Key Laboratory ofNetworking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and TelecommunicationsBeijing100876China Department of Information Science and Engineering Zaozhuang UniversityZaozhuang277160China
In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working *** the systems are attacked,timely identification of outliers in time series is critical to ensure *** many anomaly ... 详细信息
来源: 评论
Adversarial Attacks and Defenses in Image Classification: A Practical Perspective  7
Adversarial Attacks and Defenses in Image Classification: A ...
收藏 引用
7th International Conference on Image, Vision and Computing, ICIVC 2022
作者: Chen, Yongkang Zhang, Ming Li, Jin Kuang, Xiaohui National Key Laboratory of Science and Technology on Information System Security Beijing China
The rapid and steady development of machine learning, especially deep learning, has promoted significant progress in the field of image classification. However, Machine learning models are demonstrated to be vulnerabl... 详细信息
来源: 评论