咨询与建议

限定检索结果

文献类型

  • 1,770 篇 期刊文献
  • 1,514 篇 会议
  • 1 册 图书

馆藏范围

  • 3,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,148 篇 工学
    • 1,061 篇 计算机科学与技术...
    • 828 篇 软件工程
    • 428 篇 信息与通信工程
    • 384 篇 电子科学与技术(可...
    • 361 篇 电气工程
    • 256 篇 控制科学与工程
    • 171 篇 化学工程与技术
    • 163 篇 机械工程
    • 155 篇 材料科学与工程(可...
    • 147 篇 仪器科学与技术
    • 129 篇 生物工程
    • 125 篇 光学工程
    • 122 篇 网络空间安全
    • 115 篇 动力工程及工程热...
    • 69 篇 交通运输工程
    • 66 篇 安全科学与工程
    • 65 篇 环境科学与工程(可...
    • 57 篇 生物医学工程(可授...
    • 56 篇 建筑学
  • 1,286 篇 理学
    • 484 篇 数学
    • 472 篇 物理学
    • 168 篇 生物学
    • 157 篇 统计学(可授理学、...
    • 150 篇 大气科学
    • 144 篇 化学
    • 92 篇 系统科学
  • 404 篇 管理学
    • 271 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 79 篇 法学
  • 78 篇 医学
    • 56 篇 临床医学
  • 57 篇 农学
  • 54 篇 军事学
  • 39 篇 经济学
  • 8 篇 教育学
  • 7 篇 艺术学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 66 篇 cryptography
  • 54 篇 feature extracti...
  • 50 篇 authentication
  • 47 篇 semantics
  • 45 篇 security
  • 44 篇 deep learning
  • 41 篇 privacy
  • 40 篇 information secu...
  • 40 篇 training
  • 39 篇 laboratories
  • 39 篇 accuracy
  • 36 篇 optimization
  • 35 篇 computational mo...
  • 32 篇 protocols
  • 32 篇 quantum cryptogr...
  • 27 篇 blockchain
  • 26 篇 neural networks
  • 24 篇 data mining
  • 24 篇 machine learning
  • 24 篇 network security

机构

  • 174 篇 state key labora...
  • 151 篇 national key lab...
  • 111 篇 university of ch...
  • 84 篇 department of co...
  • 81 篇 school of softwa...
  • 71 篇 information secu...
  • 67 篇 school of cyber ...
  • 64 篇 tsinghua nationa...
  • 45 篇 state key labora...
  • 44 篇 state key labora...
  • 37 篇 key laboratory f...
  • 36 篇 state key labora...
  • 36 篇 state key labora...
  • 34 篇 state key labora...
  • 34 篇 state key labora...
  • 31 篇 science and tech...
  • 31 篇 shandong provinc...
  • 27 篇 state key labora...
  • 26 篇 beijing institut...
  • 26 篇 key laboratory o...

作者

  • 33 篇 cao xiaochun
  • 31 篇 kuang xiaohui
  • 29 篇 yuan yuan
  • 26 篇 huang wei
  • 26 篇 zhang yichen
  • 25 篇 ai bo
  • 24 篇 wang wei
  • 24 篇 zhao jinjing
  • 22 篇 li yang
  • 20 篇 xiu-bo chen
  • 19 篇 xiaochun cao
  • 19 篇 yu song
  • 19 篇 wang dongxia
  • 19 篇 xu bingjie
  • 18 篇 wang qing
  • 17 篇 qing wang
  • 17 篇 yang yang
  • 17 篇 gang xu
  • 17 篇 xiaohui kuang
  • 16 篇 guo hong

语言

  • 3,031 篇 英文
  • 151 篇 中文
  • 106 篇 其他
  • 4 篇 法文
  • 3 篇 德文
检索条件"机构=State Key Laboratory of Science and Technology on Information System Security"
3285 条 记 录,以下是81-90 订阅
排序:
BAST: Blockchain-Assisted Secure and Traceable Data Sharing Scheme for Vehicular Networks
收藏 引用
IEEE Transactions on information Forensics and security 2025年 20卷 4664-4678页
作者: Liu, Xinzhong Cui, Jie Zhang, Jing Yin, Rongwang Zhong, Hong Wei, Lu Bolodurina, Irina He, Debiao School of Computer Science and Technology Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Hefei 230039 China Anhui University Anhui Engineering Laboratory of IoT Security Technologies Hefei 230039 China Hefei University Department of Basic Experiment and Training Hefei 230601 China Orenburg State University Faculty of Mathematics and Information Technologies Orenburg 460018 Russian Federation Wuhan University School of Cyber Science and Engineering 430072 China MatrixElements Technologies Shanghai Key Laboratory of Privacy Preserving Computation Shanghai 201204 China
In vehicular networks, caching service content on edge servers (ESs) is a widely accepted strategy for promptly responding to vehicle requests, reducing communication overhead, and improving service experience. Howeve... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Studies on the Droplet Impact Behavior and Anti-Icing Properties on the Slippery Lubricant-Infused Porous Surface (SLIPS) of Al Conductors  11th
Studies on the Droplet Impact Behavior and Anti-Icing Proper...
收藏 引用
11th Frontier Academic Forum of Electrical Engineering, FAFEE 2024
作者: Li, Bo Bai, Jie Yang, Liuqing Dai, Xu Xiao, Jie Xiang, Huiying Zhao, Yingying Zheng, Hanwen Liao, Ruijin Yuan, Yuan Institute of Electric Power Science of Guizhou Power Grid Co. Ltd. Guiyang550002 China China Southern Power Grid Laboratory of Anti-Icing and Disaster Reduction Liupanshui553002 China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing400044 China College of Materials Science and Engineering Chongqing University Chongqing400030 China
Slippery lubricant-infused porous surface (SLIPS) has been widely studied as a promising anti-icing surface treatment. However, the research on the lubricant effect of impact droplets and anti-icing behavior on Al con... 详细信息
来源: 评论
New Coefficient Grouping for Complex Affine Layers
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 520-532页
作者: Wenxiao Qiao Siwei Sun Ying Chen Lei Hu Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cryptology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Cryptology Beijing China Department of Cryptology Science & Technology Beijing Electronic Science & Technology Institute Beijing China
Recently, designing symmetric primitives for applications in cryptographic protocols including multi-party computation, fully homomorphic encryption, and zero-knowledge proofs has become an important research topic. A... 详细信息
来源: 评论
The Enhancing Effect of the East Asian Subtropical Westerly Jet on Summer Extreme High-Temperature Events over Central-Eastern China Since the Late 1990s
收藏 引用
Advances in Atmospheric sciences 2025年 第3期42卷 453-466页
作者: Chujie GAO Yuyu NIU Gen LI Shanlei SUN Bo LU Chaofan LI Bei XU Jinglong HUANG Xiubao SUN College of Oceanography&Key Laboratory of Marine Hazards Forecasting Ministry of Natural ResourcesHohai UniversityNanjing 210098China Key Laboratory of Meteorological Disaster Ministry of Education(KLME)&Collaborative Innovation Center on Forecast and Evaluation of Meteorological Disasters(CIC-FEMD)Nanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Tropical Oceanography South China Sea Institute of OceanologyChinese Academy of SciencesGuangzhou 510301China Laboratory for Climate Studies and CMA-NJU Joint Laboratory for Climate Prediction Studies National Climate CenterChina Meteorological AdministrationBeijing 100081China Xiong’an Institute of Meteorological Artificial Intellegence Xiong'an 071708China Center for Monsoon System Research Institute of Atmospheric PhysicsChinese Academy of SciencesBeijing 100029China College of Earth and Planetary Sciences University of the Chinese Academy of SciencesBeijing 100049China College of Intelligent Science and Control Engineering Jinling Institute of TechnologyNanjing 211169China
The increase in frequency and intensity of Extreme High-temperature Events(EHEs)over Central-Eastern China(CEC)in recent decades has severely impacted social development and *** observation and reanalysis datasets,thi... 详细信息
来源: 评论
MAGIC: detecting advanced persistent threats via masked graph representation learning  24
MAGIC: detecting advanced persistent threats via masked grap...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Zian Jia Yun Xiong Yuhong Nan Yao Zhang Jinjing Zhao Mi Wen Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Software Engineering Sun Yat-sen University China National Key Laboratory of Science and Technology on Information System Security China Shanghai University of Electric Power China
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on provenance graphs has em...
来源: 评论
DCCT-Net: A Network Combined Dynamic CNN and Transformer for Image Compressive Sensing
DCCT-Net: A Network Combined Dynamic CNN and Transformer for...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Lijuan Xu Haixiao Mei Fenghua Tong Dawei Zhao Fuqiang Yu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Recent end-to-end image compressive sensing networks primarily use Convolutional Neural Networks (CNNs) and Transformers, each with distinct limitations: CNNs struggle with global feature capture, while Transformers l... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Near Optimal Probabilistic Constructions of Frameproof Codes
收藏 引用
IEEE Transactions on information Theory 2025年
作者: Liu, Miao Ma, Zengjiao Shangguan, Chong Shandong University Research Center for Mathematics and Interdisciplinary Sciences Qingdao266237 China Shandong University State Key Laboratory of Cryptography and Digital Economy Security Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education School of Cyber Science and Technology Shandong Qingdao266237 China Ministry of Education Frontiers Science Center for Nonlinear Expectations Qingdao266237 China
Frameproof codes are a class of secure codes that were originally introduced in the pioneering work of Boneh and Shaw in the context of digital fingerprinting. They can be used to enhance the security and credibility ... 详细信息
来源: 评论
New Constructions of Binary Cyclic Codes with Both Relatively Large Minimum Distance and Dual Distance
arXiv
收藏 引用
arXiv 2025年
作者: Zheng, Lingqi Fang, Weijun Qiu, Rongxing State Key Laboratory of Cryptography and Digital Economy Security Shandong University Qingdao266237 China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Qingdao266237 China School of Cyber Science and Technology Shandong University Qingdao266237 China
Binary cyclic codes are worth studying due to their applications and theoretical importance. It is an important problem to construct an infinite family of cyclic codes with large minimum distance d and dual distance d... 详细信息
来源: 评论