咨询与建议

限定检索结果

文献类型

  • 1,774 篇 期刊文献
  • 1,515 篇 会议
  • 1 册 图书

馆藏范围

  • 3,290 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,153 篇 工学
    • 1,059 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 429 篇 信息与通信工程
    • 386 篇 电子科学与技术(可...
    • 369 篇 电气工程
    • 259 篇 控制科学与工程
    • 173 篇 化学工程与技术
    • 165 篇 机械工程
    • 159 篇 材料科学与工程(可...
    • 147 篇 仪器科学与技术
    • 125 篇 生物工程
    • 123 篇 光学工程
    • 121 篇 网络空间安全
    • 115 篇 动力工程及工程热...
    • 68 篇 交通运输工程
    • 65 篇 环境科学与工程(可...
    • 65 篇 安全科学与工程
    • 61 篇 建筑学
    • 59 篇 土木工程
    • 55 篇 生物医学工程(可授...
  • 1,291 篇 理学
    • 489 篇 数学
    • 480 篇 物理学
    • 163 篇 生物学
    • 159 篇 统计学(可授理学、...
    • 152 篇 大气科学
    • 143 篇 化学
    • 92 篇 系统科学
  • 400 篇 管理学
    • 267 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 84 篇 法学
  • 76 篇 医学
  • 58 篇 农学
  • 54 篇 军事学
  • 40 篇 经济学
  • 7 篇 艺术学
  • 6 篇 教育学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 68 篇 cryptography
  • 55 篇 feature extracti...
  • 49 篇 authentication
  • 46 篇 semantics
  • 45 篇 security
  • 44 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 39 篇 training
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 quantum cryptogr...
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 24 篇 data mining
  • 24 篇 machine learning
  • 24 篇 network security

机构

  • 178 篇 state key labora...
  • 153 篇 national key lab...
  • 113 篇 university of ch...
  • 84 篇 department of co...
  • 82 篇 school of softwa...
  • 69 篇 information secu...
  • 68 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 45 篇 state key labora...
  • 37 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 32 篇 shandong provinc...
  • 31 篇 science and tech...
  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 27 篇 key laboratory o...

作者

  • 34 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 30 篇 yuan yuan
  • 27 篇 zhang yichen
  • 25 篇 wang wei
  • 25 篇 huang wei
  • 24 篇 zhao jinjing
  • 24 篇 ai bo
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 20 篇 xu bingjie
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 18 篇 wang qing
  • 18 篇 gang xu
  • 18 篇 xiaohui kuang
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 16 篇 guo hong

语言

  • 3,025 篇 英文
  • 152 篇 中文
  • 110 篇 其他
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3290 条 记 录,以下是61-70 订阅
排序:
Robust Watermarking Based on Multi-layer Watermark Feature Fusion
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Wu, Shaowu Lu, Wei Luo, Xiangyang Sun Yat-Sen University School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450002 China
The purpose of robust image watermarking is to embed a watermark into a carrier image in an invisible form and extract the watermark successfully even under noise interference conditions to achieve copyright confirmat... 详细信息
来源: 评论
Adaptive focusing optical coherence tomography for corneal imaging
收藏 引用
Optics Letters 2025年 第3期50卷 896-899页
作者: Shi, Yejiong He, Bin Yin, Zichen Chen, Zhengyu Hu, Zhangwei Xue, Ruizhi Yang, Panqi Zhang, Xiao Zhang, Ning Meng, Zhe Ying, Yuzhe Jing, Linkai Wang, Guihuai Xue, Ping State Key Laboratory of Low-dimensional Quantum Physics Department of Physics Tsinghua University Beijing China Frontier Science Center for Quantum Information Beijing China Beijing Institute of Technology Beijing China Institute of Forensic Science Ministry of Public Security Beijing China Department of Neurosurgery Beijing Tsinghua Changgung Hospital School of Clinical Medicine Institute of Precision Medicine Tsinghua University Beijing China
Optical coherence tomography (OCT) plays a crucial role in diagnosing corneal diseases due to its capacity to provide high-resolution three-dimensional imaging. However, the convex shape of the cornea and the inherent... 详细信息
来源: 评论
Resource Allocation for MEC in Ultra-dense Networks
收藏 引用
Journal of Computers (Taiwan) 2025年 第1期36卷 143-162页
作者: Ma, Huan Li, Shuyun Wang, Zhihui Dou, Xubing Zhang, Xinchang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Shandong Normal University Jinan China
In the complex context of 5G ultra-dense networks, the unprecedented growth in traffic and computing demand has made the interaction between edge devices and edge servers extremely intricate due to the time-varying na... 详细信息
来源: 评论
Degree and Classification of Winding Deformation Faults Based on Least-Squares Fitting of Lissajous Trajectory Coefficient Recognition  3rd
Degree and Classification of Winding Deformation Faults Base...
收藏 引用
3rd International Conference on information Control, Electrical Engineering, and Rail Transit, ICEERT 2023
作者: Chen, Jianquan Zhaung, Yi Chen, Ruichuang Ma, Hongde Wu, Zhaoxiao Yunfu Power Supply Bureau of Guangdong Power Grid Co. Guangdong Yunfu527300 China Guangzhou Huali Science and Technology Vocational College Guangdong Guangzhou510000 China State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing400000 China
The power transformer is the most commonly used equipment in the power system, and winding deformation is one of the most frequent transformer faults. The short-circuit impedance method based on ΔU–I to construct th... 详细信息
来源: 评论
Realizing high-speed target tracking by using multi-rate feedforward predictive control for the acquisition, tracking, and pointing system
收藏 引用
Defence technology 2025年
作者: Li, Hang Peng, Gaoliang Shan, Xiaobiao Zhao, Mingyuan Zhang, Wei Wang, Jinghan Cheng, Feng State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin150001 China College of Information Science and Technology Eastern Institute of Technology Ningbo315200 China
The acquisition, tracking, and pointing (ATP) system is widely used in target tracking, counter-UAV operations, and other related fields. As UAV technology develops, there is a growing demand to enhance the tracking c... 详细信息
来源: 评论
Multi-View Incongruity Learning for Multimodal Sarcasm Detection  31
Multi-View Incongruity Learning for Multimodal Sarcasm Detec...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Guo, Diandian Cao, Cong Yuan, Fangfang Liu, Yanbing Zeng, Guangjie Yu, Xiaoyan Peng, Hao Yu, Philip S. Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science University of Illinois Chicago United States
Multimodal sarcasm detection (MSD) is essential for various downstream tasks. Existing MSD methods tend to rely on spurious correlations. These methods often mistakenly prioritize non-essential features yet still make... 详细信息
来源: 评论
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论
Enhancing Geolocation Accuracy of High-Altitude Airborne SAR Through Tropospheric Delay Compensation
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Xiang, Yaobing Sun, Yuli Lei, Lin Ji, Kefeng Kuang, Gangyao National University of Defense Technology State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System College of Electronic Science and Technology Changsha410073 China
Geolocation is a crucial step in the processing of synthetic aperture radar (SAR) images. High-altitude airborne SAR systems present unique geolocation challenges due to travelling long distances through the troposphe... 详细信息
来源: 评论
Query recovery from easy to hard: jigsaw attack against SSE  24
Query recovery from easy to hard: jigsaw attack against SSE
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Hao Nie Wei Wang Peng Xu Xianglong Zhang Laurence T. Yang Kaitai Liang Huazhong University of Science and Technology Huazhong University of Science and Technology and Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering and JinYinHu Laboratory and State Key Laboratory of Cryptology Huazhong University of Science and Technology and St. Francis Xavier University Delft University of Technology
Searchable symmetric encryption schemes often unintentionally disclose certain sensitive information, such as access, volume, and search patterns. Attackers can exploit such leakages and other available knowledge rela...
来源: 评论
Source-free Domain Adaptation with Multiple Alignment for Efficient Image Retrieval
Source-free Domain Adaptation with Multiple Alignment for Ef...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jinghui Ni Hui Cui Lihai Zhao Fengling Li Xiaohui Han Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Quan Cheng Laboratory Shandong Open University University of Technology Sydney
Domain adaptation techniques help models generalize to target domains by addressing domain discrepancies between the source and target domain data distributions. These techniques are particularly valuable for cross-do... 详细信息
来源: 评论