咨询与建议

限定检索结果

文献类型

  • 2,129 篇 期刊文献
  • 63 篇 会议

馆藏范围

  • 2,192 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,539 篇 工学
    • 785 篇 计算机科学与技术...
    • 357 篇 网络空间安全
    • 283 篇 软件工程
    • 219 篇 控制科学与工程
    • 194 篇 电子科学与技术(可...
    • 137 篇 机械工程
    • 136 篇 信息与通信工程
    • 135 篇 仪器科学与技术
    • 52 篇 电气工程
    • 34 篇 水利工程
    • 30 篇 交通运输工程
    • 28 篇 农业工程
    • 26 篇 环境科学与工程(可...
    • 25 篇 地质资源与地质工...
    • 24 篇 测绘科学与技术
  • 377 篇 理学
    • 92 篇 数学
    • 56 篇 物理学
    • 56 篇 大气科学
    • 35 篇 生物学
    • 32 篇 系统科学
    • 28 篇 生态学
  • 365 篇 管理学
    • 305 篇 管理科学与工程(可...
    • 31 篇 公共管理
  • 179 篇 医学
    • 127 篇 临床医学
    • 25 篇 公共卫生与预防医...
  • 137 篇 农学
    • 57 篇 作物学
    • 51 篇 农业资源与环境
  • 76 篇 军事学
    • 72 篇 军队指挥学
  • 73 篇 经济学
    • 65 篇 应用经济学
  • 48 篇 法学
  • 29 篇 艺术学
    • 26 篇 设计学(可授艺术学...
  • 22 篇 文学
  • 19 篇 教育学
  • 5 篇 历史学

主题

  • 116 篇 blockchain
  • 73 篇 security
  • 64 篇 deep learning
  • 60 篇 machine learning
  • 42 篇 cloud computing
  • 39 篇 privacy
  • 35 篇 internet of thin...
  • 34 篇 federated learni...
  • 32 篇 climate change
  • 32 篇 data
  • 29 篇 privacy protecti...
  • 29 篇 china
  • 25 篇 big data
  • 24 篇 encryption
  • 22 篇 anomaly detectio...
  • 22 篇 artificial intel...
  • 21 篇 iot
  • 19 篇 covid-19
  • 19 篇 data sharing
  • 19 篇 data mining

机构

  • 32 篇 information secu...
  • 22 篇 state key labora...
  • 20 篇 university of ch...
  • 20 篇 school of cybers...
  • 15 篇 school of inform...
  • 15 篇 information secu...
  • 13 篇 school of cyber ...
  • 12 篇 institute of inf...
  • 12 篇 department of el...
  • 12 篇 南京工业大学
  • 11 篇 school of cyber ...
  • 11 篇 state key labora...
  • 11 篇 data assurance a...
  • 10 篇 ieee
  • 10 篇 security enginee...
  • 10 篇 information secu...
  • 10 篇 national enginee...
  • 10 篇 shanghai institu...
  • 10 篇 china informatio...
  • 9 篇 department of in...

作者

  • 19 篇 xiu-bo chen
  • 19 篇 gang xu
  • 17 篇 walid el-shafai
  • 12 篇 樊树海
  • 11 篇 yuling chen
  • 11 篇 yu yang
  • 10 篇 jieren cheng
  • 10 篇 naglaa f.soliman
  • 10 篇 taher m.ghazal
  • 9 篇 wei li
  • 9 篇 yi-xian yang
  • 9 篇 yixian yang
  • 9 篇 yongjun ren
  • 8 篇 xiubo chen
  • 8 篇 xin li
  • 8 篇 abeer d.algarni
  • 8 篇 yang yi-xian
  • 8 篇 kim-kwang raymon...
  • 8 篇 yang li
  • 8 篇 xin wang

语言

  • 2,030 篇 英文
  • 162 篇 中文
检索条件"机构=Big Data Center of The Ministry of Public Security"
2192 条 记 录,以下是1-10 订阅
排序:
Survey on Fake Information Generation,Dissemination and Detection
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 573-583页
作者: Wanqiu CUI Dawei WANG Na HAN School of National security People's Public Security University of China big data center of the ministry of public security
The current booming development of the Internet has put the public in an era of information overload,in which false information is mixed and spread *** phenomenon has seriously disturbed the social network ***,a subst... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Key Management for Outsourced data security
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第5期19卷 449-454页
作者: PEI Bei CHEN Changsong WAN Changsheng The Third Research Institute of ministry of public security School of Information Science and Engineering Southeast University
This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
data security and Privacy in Bitcoin System:A Survey
收藏 引用
Journal of Computer Science & Technology 2020年 第4期35卷 843-862页
作者: Lie-Huang Zhu Bao-Kun Zheng Meng Shen Feng Gao Hong-Yu Li Ke-Xin Shi School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Information Management for Law China University of Political Science and LawBeijing 102249China Key Laboratory of Information Network security Ministry of Public SecurityShanghai 201204China
To date,bitcoin has been the most successful application of blockchain technology and has received considerable attention from both industry and *** is an electronic payment system based on cryptography rather than on... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Collection and Judgment of Electronic data Evidence in Criminal Cases:From the Perspective of Investigation and Evidence Collection by public security Organs
收藏 引用
Journal of Forensic Science and Medicine 2019年 第4期5卷 187-194页
作者: Bo Wang Yuxian Liu Department of Hunan public security The Comprehensive Case Handling CenterThe Network Technology TeamHunanChina Department of Hunan Provincial public security Police of The Legal CorpsHunanChina
With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily *** addition to the information generated by the Internet in the form of digitization,it has become the mai... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An incentive-compatible rational secret sharing scheme using blockchain and smart contract
收藏 引用
Science China(Information Sciences) 2021年 第10期64卷 221-241页
作者: Zerui CHEN Youliang TIAN Changgen PENG State Key Laboratory of public big Date College of Computer Science and Technology Guizhou University Institute of Cryptography and data security Guizhou University
In the rational cryptographic protocol, the two rational players often fall into the prisoner’s dilemma, which is also the case for the rational secret sharing we consider in this paper. First, it is proved that rati... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A novel algorithm for ocean wave direction inversion from X-band radar images based on optical flow method
收藏 引用
Acta Oceanologica Sinica 2018年 第3期37卷 88-93页
作者: WANG Li CHENG Yunfei HONG Lijuan LIU Xinyu Third Research Institute Ministry of Public Security
As one of the important sea state parameters for navigation safety and coastal resource management, the ocean wave direction represents the propagation direction of the wave. A novel algorithm based on an optical flow... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Efficient Steganalysis Model Based on Multi-Scale LTP and Derivative Filters
收藏 引用
Computers, Materials & Continua 2020年 第3期62卷 1259-1271页
作者: Yuwei Chen Yuling Chen Yu Yang Xinda Hao Ning Wang Guizhou University Guizhou Provincial Key Laboratory of Public Big DataGuiyang550025China Information security center Beijing University of Posts and TelecommunicationsBeijing100876China
Local binary pattern(LBP)is one of the most advanced image classification recognition operators and is commonly used in texture detection *** indicates that LBP also has a good application prospect in ***,the existing... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Overview of General Theory of security
收藏 引用
China Communications 2017年 第7期14卷 1-10页
作者: Min Lei Yixian Yang Xinxin Niu Yu Yang Jie Hao Information security center Beijing University of Posts and Telecommunications Guizhou University Guizhou Provincial Key Laboratory of Public Big Data Jiangsu Engineering center of Network Monitoring Nanjing University of Information Science & Technology
Cyber security lacks comprehensive theoretical guidance. General security theory, as a set of basic security theory concepts, is intended to guide cyber security and all the other security work. The general theory of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Video Stabilization via Prediction with Time-Series Network and Image Inpainting with Pyramid Fusion
收藏 引用
Chinese Journal of Electronics 2021年 第6期30卷 1103-1110页
作者: CHENG Keyang LI Shichao RONG Lan WANG Wenshan SHI Wenxi ZHAN Yongzhao School of Computer Science and Communication Engineering Jiangsu University Jiangsu Province big data Ubiquitous Perception and Intelligent Agricultural Application Engineering Research center Cyber Space security Academy of Jiangsu University National Engineering Laboratory for public Safety Risk Perception and Control by big data Xinjiang Lianhaichuangzhi Information Technology Co. Ltd.
Due to the poor filling effect of the video image defect commonly used in the video stabilization field, the video is seemed still unstable after the image stabilization process, which seriously affects the visual eff... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Image Inpainting Based on Improved Deep Convolutional Auto-encoder Network
收藏 引用
Chinese Journal of Electronics 2020年 第6期29卷 1074-1084页
作者: QIANG Zhenping HE Libo DAI Fei ZHANG Qinghui LI Junqiu College of big data and Intelligent Engineering Southwest Forestry University Information security College Yunnan Police College
This paper proposes an effective image inpainting method using an improved deep convolutional auto-encoder *** analogy with exiting methods of image inpainting based on auto-decoders,inpainting methods using the deep ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论