咨询与建议

限定检索结果

文献类型

  • 1,770 篇 期刊文献
  • 1,514 篇 会议
  • 1 册 图书

馆藏范围

  • 3,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,148 篇 工学
    • 1,061 篇 计算机科学与技术...
    • 828 篇 软件工程
    • 428 篇 信息与通信工程
    • 384 篇 电子科学与技术(可...
    • 361 篇 电气工程
    • 256 篇 控制科学与工程
    • 171 篇 化学工程与技术
    • 163 篇 机械工程
    • 155 篇 材料科学与工程(可...
    • 147 篇 仪器科学与技术
    • 129 篇 生物工程
    • 125 篇 光学工程
    • 122 篇 网络空间安全
    • 115 篇 动力工程及工程热...
    • 69 篇 交通运输工程
    • 66 篇 安全科学与工程
    • 65 篇 环境科学与工程(可...
    • 57 篇 生物医学工程(可授...
    • 56 篇 建筑学
  • 1,286 篇 理学
    • 484 篇 数学
    • 472 篇 物理学
    • 168 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 150 篇 大气科学
    • 144 篇 化学
    • 92 篇 系统科学
  • 404 篇 管理学
    • 271 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 79 篇 法学
  • 78 篇 医学
    • 56 篇 临床医学
  • 57 篇 农学
  • 54 篇 军事学
  • 39 篇 经济学
  • 8 篇 教育学
  • 7 篇 艺术学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 50 篇 authentication
  • 47 篇 semantics
  • 45 篇 security
  • 44 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 quantum cryptogr...
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 24 篇 data mining
  • 24 篇 machine learning
  • 24 篇 network security

机构

  • 174 篇 state key labora...
  • 151 篇 national key lab...
  • 111 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 71 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 34 篇 state key labora...
  • 31 篇 science and tech...
  • 31 篇 shandong provinc...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 29 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 25 篇 ai bo
  • 24 篇 wang wei
  • 24 篇 zhao jinjing
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 17 篇 gang xu
  • 17 篇 xiaohui kuang
  • 16 篇 guo hong

语言

  • 3,031 篇 英文
  • 151 篇 中文
  • 106 篇 其他
  • 4 篇 法文
  • 3 篇 德文
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3285 条 记 录,以下是51-60 订阅
排序:
CL-TAP: An Efficient Certificateless Based Trusted Access Protocol for WLAN
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 142-146页
作者: Zhuo Ma Fenghua Li Jianfeng Ma Wenjiang Ji School of Computer Science and Technology Xidian University Xi'an Shannxi China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China
Based on the certificateless public key cryptography and the trusted computing technologies, a certificateless based trusted access protocol for WLAN (Wireless local area networks) is proposed. Such protocol realizes ... 详细信息
来源: 评论
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detection
Semantic-Aware Prompt Learning for Multimodal Sarcasm Detect...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Wang, Guangjin Wang, Bao Xu, Fuyong Zhu, Zhenfang Wang, Peipei Wang, Ru Liu, Peiyu School of Information Science and Engineering Shandong Normal University Jinan China School of Information Science and Electrical Engineering Shandong Jiao Tong University Jinan China Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Multimodal sarcasm detection aims to identify whether utterances express sarcastic intentions contrary to their literal meaning based on multimodal information. However, existing methods fail to explore the model'... 详细信息
来源: 评论
Microwave-based continuous variable quantum teleportation in open air
收藏 引用
Physica Scripta 2025年 第5期100卷
作者: Wang, Wanyi Zhou, Tianai Xu, Gang Chen, Xiu-Bo Guo, Ying Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China School of Computer Science Beijing University of Posts and Telecommunications Beijing100876 China
Quantum teleportation has achieved significant progress in the optical frequency domain but faces persistent challenges, including high transmission losses and limited transmittance. In contrast, the microwave frequen... 详细信息
来源: 评论
An integrated modeling, verification, and code generation for uncrewed aerial systems: less cost and more efficiency
收藏 引用
PeerJ Computer science 2025年 11卷 e2575-e2575页
作者: Zhang, Jianyu Zhang, Long Wu, Yixuan Ma, Linru Yang, Feng School of Automation Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Science and Technology on Information System Security AMS Beijing China School of Electronics and Information Northwestern Polytechnical University Xi’an China
Uncrewed Aerial systems (UASs) are widely implemented in safety-critical fields such as industrial production, military operations, and disaster relief. Due to the diversity and complexity of implementation scenarios,... 详细信息
来源: 评论
Cooperative Relaying and Jamming Design for Secure LPWAN Wireless Communication
收藏 引用
China Communications 2025年 第4期22卷 100-116页
作者: Chen Dianxia Ma Xiaoshan Yang Lin Yu Kan Feng Zhiyong Education Tianjin Ren’ai CollegeTianjin 301636China Academy of Military Sciences of PLA Beijing 100091China National Key Laboratory of Science and Technology on Information System Security Systems Engineering InstituteAMSPLABeijing 100091China Key Laboratory of Universal Wireless Communications Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China
Physical layer security methods based on joint relay and jammer selection(JRJS)have been widely investigated in the study of secure wireless *** from current works on JRJS schemes,which assumed that the global channel... 详细信息
来源: 评论
Enhancing Routing Performance Through Trajectory Planning With DRL in UAV-Aided VANETs
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2025年 3卷 517-533页
作者: Chen, Jingxuan Huang, Dianrun Wang, Yijie Yu, Ziping Zhao, Zhongliang Cao, Xianbin Liu, Yang Quek, Tony Q. S. Oliver Wu, Dapeng Beihang University School of Electronic and Information Engineering Beijing100191 China State Key Laboratory of CNS/ATM Beijing100191 China Nanyang Technological University School of Computer Science and Engineering Nanyang Avenue 639798 Singapore Singapore University of Technology and Design Information System Technology and Design Pillar Somapah Rd 487372 Singapore Yonsei University Yonsei Frontier Laboratory Seoul03722 Korea Republic of City University of Hong Kong Department of Computer Science Kowloon Hong Kong
Vehicular Ad-hoc Networks (VANETs) have gained significant attention as a key enabler for intelligent transportation systems, facilitating vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. D... 详细信息
来源: 评论
Random Coefficient-Moving Product Based Wireless key Generation
收藏 引用
China Communications 2025年 第2期22卷 199-212页
作者: Lu Xinjin Lei Jing Li Wei College of Electronic Science and Technology National University of Defense TechnologyChangsha 410073China State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System Luoyang 471003China China South Industries Group Corporation Zhi Yuan Institute310012China
The physical layer key generation technique provides an efficient method,which utilizes the natural dynamics of wireless ***,there are some extremely challenging security scenarios such as static or quasi-static envir... 详细信息
来源: 评论
Robust Watermarking Based on Multi-layer Watermark Feature Fusion
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Wu, Shaowu Lu, Wei Luo, Xiangyang Sun Yat-Sen University School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450002 China
The purpose of robust image watermarking is to embed a watermark into a carrier image in an invisible form and extract the watermark successfully even under noise interference conditions to achieve copyright confirmat... 详细信息
来源: 评论
Adaptive focusing optical coherence tomography for corneal imaging
收藏 引用
Optics Letters 2025年 第3期50卷 896-899页
作者: Shi, Yejiong He, Bin Yin, Zichen Chen, Zhengyu Hu, Zhangwei Xue, Ruizhi Yang, Panqi Zhang, Xiao Zhang, Ning Meng, Zhe Ying, Yuzhe Jing, Linkai Wang, Guihuai Xue, Ping State Key Laboratory of Low-dimensional Quantum Physics Department of Physics Tsinghua University Beijing China Frontier Science Center for Quantum Information Beijing China Beijing Institute of Technology Beijing China Institute of Forensic Science Ministry of Public Security Beijing China Department of Neurosurgery Beijing Tsinghua Changgung Hospital School of Clinical Medicine Institute of Precision Medicine Tsinghua University Beijing China
Optical coherence tomography (OCT) plays a crucial role in diagnosing corneal diseases due to its capacity to provide high-resolution three-dimensional imaging. However, the convex shape of the cornea and the inherent... 详细信息
来源: 评论
Realizing high-speed target tracking by using multi-rate feedforward predictive control for the acquisition, tracking, and pointing system
收藏 引用
Defence technology 2025年
作者: Li, Hang Peng, Gaoliang Shan, Xiaobiao Zhao, Mingyuan Zhang, Wei Wang, Jinghan Cheng, Feng State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin150001 China College of Information Science and Technology Eastern Institute of Technology Ningbo315200 China
The acquisition, tracking, and pointing (ATP) system is widely used in target tracking, counter-UAV operations, and other related fields. As UAV technology develops, there is a growing demand to enhance the tracking c... 详细信息
来源: 评论