咨询与建议

限定检索结果

文献类型

  • 3,739 篇 期刊文献
  • 138 篇 会议

馆藏范围

  • 3,877 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,451 篇 工学
    • 883 篇 计算机科学与技术...
    • 519 篇 网络空间安全
    • 307 篇 软件工程
    • 304 篇 电子科学与技术(可...
    • 253 篇 控制科学与工程
    • 218 篇 仪器科学与技术
    • 190 篇 信息与通信工程
    • 176 篇 机械工程
    • 126 篇 化学工程与技术
    • 123 篇 材料科学与工程(可...
    • 97 篇 电气工程
    • 83 篇 环境科学与工程(可...
    • 66 篇 水利工程
    • 65 篇 农业工程
  • 834 篇 理学
    • 225 篇 物理学
    • 178 篇 数学
    • 95 篇 生物学
    • 77 篇 生态学
    • 74 篇 化学
    • 74 篇 大气科学
  • 491 篇 管理学
    • 327 篇 管理科学与工程(可...
    • 87 篇 公共管理
    • 68 篇 农林经济管理
  • 379 篇 医学
    • 238 篇 临床医学
    • 67 篇 公共卫生与预防医...
  • 365 篇 农学
    • 139 篇 作物学
    • 127 篇 农业资源与环境
  • 184 篇 军事学
    • 171 篇 军队指挥学
  • 178 篇 经济学
    • 150 篇 应用经济学
  • 165 篇 法学
    • 106 篇 政治学
  • 49 篇 艺术学
  • 33 篇 文学
  • 32 篇 教育学
  • 6 篇 历史学
  • 3 篇 哲学

主题

  • 135 篇 security
  • 118 篇 blockchain
  • 70 篇 deep learning
  • 65 篇 china
  • 55 篇 machine learning
  • 43 篇 internet of thin...
  • 43 篇 food security
  • 40 篇 climate change
  • 35 篇 system
  • 34 篇 cloud computing
  • 32 篇 privacy
  • 30 篇 network
  • 28 篇 privacy protecti...
  • 25 篇 analysis
  • 25 篇 artificial intel...
  • 25 篇 authentication
  • 24 篇 中国
  • 23 篇 cryptography
  • 23 篇 and
  • 23 篇 quantum

机构

  • 63 篇 university of ch...
  • 48 篇 shanghai institu...
  • 42 篇 information secu...
  • 37 篇 state key labora...
  • 35 篇 information secu...
  • 30 篇 school of cyber ...
  • 28 篇 school of cyber ...
  • 27 篇 information secu...
  • 27 篇 school of cyber ...
  • 24 篇 ieee
  • 19 篇 information secu...
  • 19 篇 china informatio...
  • 18 篇 institute of inf...
  • 17 篇 center of excell...
  • 17 篇 school of inform...
  • 16 篇 state key labora...
  • 14 篇 institute of inf...
  • 14 篇 national enginee...
  • 14 篇 school of cyber ...
  • 13 篇 school of cyber ...

作者

  • 24 篇 xiu-bo chen
  • 19 篇 kim-kwang raymon...
  • 16 篇 gang xu
  • 15 篇 yixian yang
  • 15 篇 kevin d.hyde
  • 14 篇 yu zhang
  • 14 篇 xiubo chen
  • 13 篇 jianfeng ma
  • 13 篇 dhanushka n.wana...
  • 13 篇 hui li
  • 12 篇 liang jin
  • 12 篇 li li
  • 12 篇 jieren cheng
  • 12 篇 wei li
  • 12 篇 jian li
  • 11 篇 mingkwan doilom
  • 11 篇 陈秀波
  • 11 篇 chayanard phukha...
  • 11 篇 lei zhang
  • 11 篇 jiangxing wu

语言

  • 3,466 篇 英文
  • 411 篇 中文
检索条件"机构=Center of Cyber Security"
3877 条 记 录,以下是1-10 订阅
排序:
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 308-309页
作者: Lisha YAO Lin HOU Jian WENG Feixiang ZHAO College of cyber security Jinan University
A public-key authenticated encryption with keyword search(PAEKS)[1, 2] system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token. This...
来源: 同方期刊数据库 同方期刊数据库 评论
A Federated Learning Framework with Blockchain-Based Auditable Participant Selection
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 5125-5142页
作者: Huang Zeng Mingtian Zhang Tengfei Liu Anjia Yang College of cyber security Jinan UniversityGuangzhou510632China
Federated learning is an important distributed model training technique in Internet of Things(IoT),in which participant selection is a key component that plays a role in improving training efficiency and model *** mod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2105-2122页
作者: Mingze Li Diwen Zheng Shuhua Lu College of Information and cyber security People’s Public Security University of ChinaBeijing102600China
Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis,achieving tremendous success recently with the development of deep ***,there have been stillmany challenges including crow... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Heterophilic Graph Neural Network Based on Spatial and Frequency Domain Adaptive Embedding Mechanism
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第5期139卷 1701-1731页
作者: Lanze Zhang Yijun Gu Jingjie Peng College of Information and cyber security People’s Public Security University of ChinaBeijing100038China
Graph Neural Networks(GNNs)play a significant role in tasks related to homophilic *** GNNs,based on the assumption of homophily,employ low-pass filters for neighboring nodes to achieve information aggregation and ***,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Lightweight, Searchable, and Controllable EMR Sharing Scheme
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1521-1538页
作者: Xiaohui Yang Peiyin Zhao School of cyber security and Computer Hebei UniversityBaoding071000China
Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer fromprivacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1843-1859页
作者: Xiaohui Yang Kun Zhang School of cyber security and Computer Hebei UniversityBaoding071000China
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of ***,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data canno... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of Information security Institute of Information Engineering Chinese Academy of Sciences School of cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research,w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Generic attacks on small-state stream cipher constructions in the multi-user setting
收藏 引用
cybersecurity 2024年 第3期7卷 69-79页
作者: Jianfu Huang Ye Luo Qinggan Fu Yincen Chen Chao Wang Ling Song College of cyber security Jinan UniversityGuangzhou 510632China National Joint Engineering Research center of Network security Detection and Protection Technology Jinan UniversityGuangzhou 510632China
Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight *** ciphers c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 3023-3045页
作者: Zhenxiang He Zhenyu Zhao Ke Chen Yanlin Liu School of cyber security Gansu University of Political Science and LawLanzhou730070China
The fast-paced development of blockchain technology is ***,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain *** smart contract vuln... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4491-4512页
作者: Chunhui Li Hua Jiang School of Computer and Electronic Information Guangxi UniversityNanning530000China cyber security and Information center Guangxi UniversityNanning530000China
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of *** systems spanning various sectors of enterprises geographically dispersed,the necessit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论