咨询与建议

限定检索结果

文献类型

  • 21,670 篇 期刊文献
  • 1,321 篇 会议

馆藏范围

  • 22,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,342 篇 工学
    • 3,231 篇 计算机科学与技术...
    • 3,100 篇 电子科学与技术(可...
    • 2,342 篇 材料科学与工程(可...
    • 2,023 篇 仪器科学与技术
    • 1,824 篇 机械工程
    • 1,809 篇 控制科学与工程
    • 1,681 篇 软件工程
    • 1,572 篇 光学工程
    • 1,437 篇 化学工程与技术
    • 1,421 篇 信息与通信工程
    • 1,265 篇 网络空间安全
    • 837 篇 电气工程
    • 541 篇 地质资源与地质工...
    • 476 篇 环境科学与工程(可...
    • 422 篇 水利工程
    • 419 篇 航空宇航科学与技...
    • 417 篇 测绘科学与技术
    • 350 篇 交通运输工程
  • 8,446 篇 理学
    • 3,076 篇 物理学
    • 1,131 篇 数学
    • 997 篇 大气科学
    • 903 篇 化学
    • 644 篇 生物学
    • 476 篇 系统科学
    • 374 篇 生态学
  • 1,790 篇 管理学
    • 1,559 篇 管理科学与工程(可...
  • 1,497 篇 农学
    • 540 篇 农业资源与环境
    • 459 篇 作物学
  • 1,182 篇 医学
    • 732 篇 临床医学
  • 569 篇 军事学
    • 565 篇 军队指挥学
  • 342 篇 经济学
  • 169 篇 艺术学
  • 99 篇 文学
  • 97 篇 法学
  • 78 篇 教育学
  • 21 篇 历史学
  • 16 篇 哲学

主题

  • 305 篇 deep learning
  • 124 篇 security
  • 101 篇 quantum
  • 92 篇 polarization
  • 83 篇 analysis
  • 80 篇 machine learning
  • 75 篇 internet of thin...
  • 75 篇 simulation
  • 74 篇 blockchain
  • 65 篇 network
  • 63 篇 distribution
  • 61 篇 china
  • 60 篇 optical
  • 58 篇 optimization
  • 53 篇 mechanism
  • 52 篇 reinforcement le...
  • 51 篇 topological
  • 50 篇 image
  • 49 篇 cryptography
  • 48 篇 surface

机构

  • 596 篇 university of ch...
  • 222 篇 university of ch...
  • 122 篇 ieee
  • 120 篇 beijing academy ...
  • 113 篇 state key labora...
  • 86 篇 collaborative in...
  • 84 篇 state key labora...
  • 61 篇 college of infor...
  • 60 篇 state key labora...
  • 58 篇 fujian science&t...
  • 56 篇 state key labora...
  • 43 篇 state key labora...
  • 42 篇 state key labora...
  • 41 篇 synergetic innov...
  • 41 篇 jiangsu center f...
  • 40 篇 department of co...
  • 40 篇 shanghai institu...
  • 38 篇 state key labora...
  • 36 篇 state key labora...
  • 35 篇 state key labora...

作者

  • 61 篇 jian wang
  • 45 篇 jun wang
  • 41 篇 jing zhang
  • 41 篇 wei liu
  • 40 篇 xin liu
  • 39 篇 jun zhang
  • 38 篇 wei li
  • 37 篇 chen chen
  • 35 篇 郭光灿
  • 34 篇 hong chen
  • 34 篇 qiang li
  • 31 篇 rui wang
  • 31 篇 li zhang
  • 31 篇 wei wang
  • 30 篇 jing chen
  • 29 篇 ming li
  • 26 篇 qing wang
  • 26 篇 温巧燕
  • 26 篇 yu zhang
  • 25 篇 xiu-bo chen

语言

  • 20,370 篇 英文
  • 2,621 篇 中文
检索条件"机构=2. State Key Laboratory of Information Security"
22991 条 记 录,以下是1-10 订阅
排序:
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU state key {2. of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research,w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu state key {2. of information security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are *** trained on the dataset will passively implant the back... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 635-644页
作者: Wenxiao QIAO Siwei SUN Lei HU state key {2. of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences School of Cryptology University of Chinese Academy of Sciences state key {2. of Cryptology
The rapid development of modern cryptographic applications such as zero-knowledge,secure multiparty computation,fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan Province key laboratory of {2. security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improved lower bound for the complexity of unique shortest vector problem
收藏 引用
Cybersecurity 2024年 第3期7卷 102-110页
作者: Baolong Jin Rui Xue state key {2. of information security Institute of Information EngineeringChinese Academy of SciencesBeijing 100085China School of Cyber security University of Chinese Academy of SciencesBeijing 100049China
Unique shortest vector problem(uSVP)plays an important role in lattice based *** cryptographic schemes based their security on *** the cofidence of those applications,it is essential to clarify the complex-ity of uSVP... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
FL-EASGD:Federated Learning Privacy security Method Based on Homomorphic Encryption
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2361-2373页
作者: Hao Sun Xiubo Chen Kaiguo Yuan information security Center State Key Laboratory ofNetworking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext ***,there is still a potential risk of privacy leakage,for example,attackers can obtain the or... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research Center of Commercial Cryptography Theory and Technology Innovation state key {2. of information security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
On Isodual Double Toeplitz Codes
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 2196-2206页
作者: SHI Minjia XU Li SOLÉ Patrick key laboratory of Intelligent Computing and Signal Processing Ministry of EducationSchool of Mathematical SciencesAnhui UniversityHefei 230601China state key {2. of information security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China CNRS University of Aix MarseilleCentrale MarseilleI2MMarseille 13284France
Double Toeplitz(shortly DT)codes are introduced here as a generalization of double circulant *** authors show that such a code is isodual,hence formally self-dual(FSD).FSD codes form a far-reaching generalization of s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Spatial Distribution Feature Extraction Network for Open Set Recognition of Electromagnetic Signal
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 279-296页
作者: Hui Zhang Huaji Zhou Li Wang Feng Zhou The Ministry key laboratory of Electronic {2. Countermeasure and Simulation Xidian UniversityXi’an710071China Science and Technology on Communication information security Control {2. Jiaxing314033China
This paper proposes a novel open set recognition method,the Spatial Distribution Feature Extraction Network(SDFEN),to address the problem of electromagnetic signal recognition in an open *** spatial distribution featu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Low-resolution Kramers-Kronig detection system with error-feedback noise shaping
收藏 引用
Science China(information Sciences) 2024年 第5期67卷 259-269页
作者: Xiangyong DONG Zhenming YU Hongyu HUANG Kaixuan SUN Kun XU state key {2. of information Photonics and Optical Communications Beijing University of Posts and Telecommunications
In this paper, we investigated the effects of error-feedback noise shaping(EFNS) on a lowresolution Kramers-Kronig(KK) detection system for the first time. Both 16-ary quadrature amplitude modulation(16-QAM) and 64-ar... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论