咨询与建议

限定检索结果

文献类型

  • 2,740 篇 期刊文献
  • 59 篇 会议

馆藏范围

  • 2,799 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,346 篇 工学
    • 1,008 篇 计算机科学与技术...
    • 818 篇 网络空间安全
    • 386 篇 电子科学与技术(可...
    • 327 篇 软件工程
    • 285 篇 仪器科学与技术
    • 277 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 216 篇 机械工程
    • 74 篇 光学工程
    • 53 篇 电气工程
    • 48 篇 材料科学与工程(可...
    • 42 篇 航空宇航科学与技...
    • 40 篇 船舶与海洋工程
    • 31 篇 交通运输工程
    • 26 篇 化学工程与技术
    • 22 篇 测绘科学与技术
    • 21 篇 地质资源与地质工...
  • 641 篇 理学
    • 304 篇 物理学
    • 210 篇 数学
    • 40 篇 系统科学
    • 19 篇 化学
    • 18 篇 大气科学
    • 17 篇 生物学
  • 393 篇 管理学
    • 373 篇 管理科学与工程(可...
  • 300 篇 军事学
    • 298 篇 军队指挥学
  • 60 篇 农学
    • 27 篇 作物学
    • 25 篇 农业资源与环境
  • 60 篇 艺术学
    • 59 篇 设计学(可授艺术学...
  • 39 篇 医学
    • 30 篇 临床医学
  • 35 篇 经济学
    • 34 篇 应用经济学
  • 19 篇 法学
  • 9 篇 教育学
  • 9 篇 文学
  • 2 篇 历史学

主题

  • 143 篇 security
  • 136 篇 blockchain
  • 69 篇 cryptography
  • 63 篇 deep learning
  • 60 篇 authentication
  • 53 篇 information secu...
  • 49 篇 encryption
  • 48 篇 internet of thin...
  • 42 篇 quantum
  • 42 篇 quantum key dist...
  • 39 篇 cloud computing
  • 37 篇 machine learning
  • 33 篇 physical layer s...
  • 33 篇 privacy
  • 32 篇 privacy protecti...
  • 30 篇 image encryption
  • 30 篇 network security
  • 26 篇 access control
  • 26 篇 key
  • 26 篇 quantum cryptogr...

机构

  • 45 篇 state key labora...
  • 45 篇 information secu...
  • 31 篇 school of cyber ...
  • 27 篇 information secu...
  • 25 篇 state key labora...
  • 25 篇 department of co...
  • 25 篇 state key labora...
  • 25 篇 institute of inf...
  • 24 篇 university of ch...
  • 22 篇 key laboratory o...
  • 19 篇 school of inform...
  • 19 篇 college of under...
  • 18 篇 state key labora...
  • 18 篇 state key labora...
  • 17 篇 college of under...
  • 17 篇 key laboratory o...
  • 16 篇 key laboratory o...
  • 16 篇 acoustic science...
  • 15 篇 acoustic science...
  • 14 篇 faculty of infor...

作者

  • 25 篇 gang xu
  • 24 篇 xiu-bo chen
  • 21 篇 wei wang
  • 17 篇 温巧燕
  • 16 篇 李宏伟
  • 15 篇 xiubo chen
  • 12 篇 wei li
  • 12 篇 yixian yang
  • 12 篇 yang wang
  • 11 篇 yan chang
  • 11 篇 jianfeng ma
  • 11 篇 鲍皖苏
  • 11 篇 lei zhang
  • 11 篇 xiaoyuan yang
  • 11 篇 shibin zhang
  • 11 篇 jian li
  • 11 篇 kai ye
  • 10 篇 jianwei liu
  • 10 篇 周淳
  • 10 篇 yi-xian yang

语言

  • 2,547 篇 英文
  • 252 篇 中文
检索条件"机构=1. Key Laboratory of Cryptologic Technology and Information Security"
2799 条 记 录,以下是1-10 订阅
排序:
Malicious Document Detection Based on GGE Visualization
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1233-1254页
作者: Youhe Wang Yi Sun Yujie Li Chuanqi Zhou Henan Province key {1. of information security Information Engineering UniversityZhengzhou450000China
With the development of anti-virus technology,malicious documents have gradually become the main pathway of Advanced Persistent Threat(APT)attacks,therefore,the development of effective malicious document classifiers ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Quantum public-key crypto via EPR pairs
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第1期Mechanics & Astronomy) .卷 58-63页
作者: Xiang-Qun Fu Hong-Wei Li Jian-Hong Shi Tan Li Wan-Su Bao Henan key {1. of Quantum information and Cryptography Information Engineering University Synergetic Innovation Center of Quantum information and Quantum Physics University of Science and Technology of China
With the development of quantum computing technology, quantum public-{1. cryptography is gradually becoming an alternative to the existing classical public-{1. cryptography. This paper designs a quantum trapdoor one-w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Cross-Multi-Domain Trust Assessment Authority Delegation Method Based on Automotive Industry Chain
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 407-426页
作者: Binyong Li Liangming Deng Jie Zhang Xianhui Deng School of Cybersecurity(Xin Gu Industrial College) Chengdu University of Information TechnologyChengdu610225China Advanced Cryptography and System security {1. laboratory of Sichuan Province Chengdu610225China SUGON Industrial Control and security Center Chengdu610225China
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of information Engineering Institute of Disaster PreventionLangfang065201China Langfang key {1. of Network Emergency Protection and Network security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural Networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Prospects on mangrove knowledge services in the smart era: From plant atlas to knowledge graphs
收藏 引用
Science China Earth Sciences 2025年 第1期68卷 111-127页
作者: Zhi-Wei HOU Wenlong JING Cheng-Zhi QIN Ji YANG Qing XIA Xiaoling YIN key {1. of Guangdong for Utilization of Remote Sensing and Geographical information System Guangdong Open Laboratory of Geospatial Information Technology and Application Guangzhou Institute of Geography Guangdong Academy of Sciences Southern Marine Science and Engineering Guangdong laboratory (Guangzhou) State key {1. of Resources and Environmental information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of Sciences College of Resources and Environment University of Chinese Academy of Sciences School of Traffic & Transportation Engineering Changsha University of Science and Technology
Mangroves are crucial to the ecological security of the Earth and human well-being. Their management, conservation, and restoration are of great importance and necessitate the support of spatio-temporal {1. an... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
E-PRedictor: an approach for early prediction of pull request acceptance
收藏 引用
Science China(information Sciences) 2025年
作者: Kexing CHEN Lingfeng BAO Xing HU Xin XIA Xiaohu YANG State key {1. of Blockchain and Data security Zhejiang University Software Engineering Application technology Lab
A pull request (PR) is an event in Git where a contributor asks project maintainers to review code he/she wants to merge into a project. The PR mechanism greatly improves the efficiency of distributed software develop...
来源: 同方期刊数据库 同方期刊数据库 评论
Analysis and solution of streak effect in high dynamic range CMOS image sensors
收藏 引用
Science China(information Sciences) 2025年 第1期68卷 402-403页
作者: Wanbin ZHA Jiangtao XU Jinghua AO Kaiming NIE Zhiyuan GAO School of Microelectronics Tianjin University Tianjin key {1. of Imaging and Sensing Microelectronic technology Tianjin University
The high dynamic range (HDR) CMOS image sensor has been widely used in many fields,such as autonomous driving and security guarding [1..The dual conversion gain (DCG)structure,which adjusts the conversion gain (CG) by...
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Automatic search method for multiple differentials and its application on MANTIS
收藏 引用
Science China(information Sciences) 2019年 第3期62卷 145-159页
作者: Shiyao CHEN Ru LIU Tingting CUI Meiqin WANG key {1. of cryptologic technology and information security Ministry of EducationShandong University
Multiple differential cryptanalysis is one of the extensions of classic differential cryptanalysis. In this paper, we present a generic automatic search method for clustering multiple differentials on a target block c... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1129-1150页
作者: Shijie Tang Yong Ding Huiyong Wang School of Computer Science and information {1. Guilin University of Electronic TechnologyGuilin541004China School of Electronic Engineering and Automation Guilin University of Electronic TechnologyGuilin541004China Guangxi Engineering Research Center of Industrial Internet security and Blockchain Guilin University of Electronic TechnologyGuilin541004China Institute of Cyberspace technology HKCT Institute for Higher EducationHong Kong999077China School of Mathematics&Computing Science Guilin University of Electronic TechnologyGuilin541004China
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 799-816页
作者: Congcong Wang Chen Wang Wenying Zheng Wei Gu School of Software Nanjing University of Information Science and TechnologyNanjing210044China School of information Science and Engineering Zhejiang Sci-Tech UniversityHangzhou310018China State key {1. of Public Big Data Guizhou UniversityGuiyang550025China School of Computer Science and technology(School of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China School of Computer Science(School of Cyber Science and Engineering) Nanjing University of Information Science and TechnologyNanjing210044China
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data {1. and privacy *** research emphasizes data {1. and user privacy conce... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论