咨询与建议

限定检索结果

文献类型

  • 25,930 篇 期刊文献
  • 1,149 篇 会议

馆藏范围

  • 27,079 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,293 篇 工学
    • 3,692 篇 计算机科学与技术...
    • 3,045 篇 电子科学与技术(可...
    • 2,341 篇 材料科学与工程(可...
    • 2,088 篇 仪器科学与技术
    • 2,027 篇 控制科学与工程
    • 1,798 篇 软件工程
    • 1,791 篇 机械工程
    • 1,553 篇 信息与通信工程
    • 1,381 篇 化学工程与技术
    • 1,292 篇 光学工程
    • 1,242 篇 网络空间安全
    • 765 篇 电气工程
    • 649 篇 地质资源与地质工...
    • 581 篇 航空宇航科学与技...
    • 542 篇 环境科学与工程(可...
    • 462 篇 水利工程
    • 406 篇 测绘科学与技术
  • 9,302 篇 理学
    • 2,585 篇 物理学
    • 1,375 篇 大气科学
    • 1,253 篇 数学
    • 875 篇 化学
    • 826 篇 生物学
    • 571 篇 生态学
    • 502 篇 系统科学
  • 2,517 篇 管理学
    • 1,890 篇 管理科学与工程(可...
  • 2,372 篇 农学
    • 852 篇 农业资源与环境
    • 704 篇 作物学
  • 2,012 篇 医学
    • 1,239 篇 临床医学
  • 781 篇 经济学
    • 712 篇 应用经济学
  • 508 篇 军事学
    • 484 篇 军队指挥学
  • 281 篇 法学
  • 239 篇 艺术学
  • 208 篇 文学
  • 153 篇 教育学
  • 52 篇 历史学
  • 20 篇 哲学

主题

  • 339 篇 deep learning
  • 274 篇 china
  • 129 篇 security
  • 112 篇 machine learning
  • 104 篇 analysis
  • 99 篇 simulation
  • 97 篇 blockchain
  • 85 篇 climate change
  • 81 篇 internet of thin...
  • 80 篇 polarization
  • 79 篇 quantum
  • 68 篇 remote sensing
  • 65 篇 of
  • 62 篇 model
  • 59 篇 reinforcement le...
  • 57 篇 mechanism
  • 57 篇 system
  • 55 篇 distribution
  • 55 篇 network
  • 52 篇 dynamic

机构

  • 942 篇 university of ch...
  • 264 篇 university of ch...
  • 99 篇 ieee
  • 94 篇 beijing academy ...
  • 70 篇 fujian science&t...
  • 66 篇 institute of geo...
  • 62 篇 collaborative in...
  • 62 篇 school of inform...
  • 53 篇 state key labora...
  • 39 篇 institute of mic...
  • 38 篇 center of materi...
  • 37 篇 department of co...
  • 37 篇 songshan lake ma...
  • 36 篇 state key labora...
  • 33 篇 synergetic innov...
  • 32 篇 institute of geo...
  • 31 篇 beijing national...
  • 31 篇 university of ch...
  • 31 篇 state key labora...
  • 29 篇 institute of geo...

作者

  • 56 篇 wei huang
  • 54 篇 jing zhang
  • 53 篇 li zhang
  • 52 篇 jian wang
  • 52 篇 jun wang
  • 52 篇 jun zhang
  • 48 篇 wei liu
  • 45 篇 xin liu
  • 45 篇 ming li
  • 40 篇 rui wang
  • 40 篇 hui wang
  • 35 篇 wei wang
  • 33 篇 wei zhang
  • 31 篇 jing chen
  • 30 篇 jie yang
  • 30 篇 chen chen
  • 29 篇 qing wang
  • 29 篇 jun xu
  • 28 篇 xiang li
  • 27 篇 wei li

语言

  • 24,064 篇 英文
  • 3,015 篇 中文
检索条件"机构=China Information Security Research Institute"
27079 条 记 录,以下是1-10 订阅
排序:
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu State Key Laboratory of information security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are *** trained on the dataset will passively implant the back... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Improved lower bound for the complexity of unique shortest vector problem
收藏 引用
Cybersecurity 2024年 第3期7卷 102-110页
作者: Baolong Jin Rui Xue State Key Laboratory of information security Institute of Information EngineeringChinese Academy of SciencesBeijing 100085China School of Cyber security University of Chinese Academy of SciencesBeijing 100049China
Unique shortest vector problem(uSVP)plays an important role in lattice based *** cryptographic schemes based their security on *** the cofidence of those applications,it is essential to clarify the complex-ity of uSVP... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2105-2122页
作者: Mingze Li Diwen Zheng Shuhua Lu College of information and Cyber security People’s Public Security University of ChinaBeijing102600China
Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis,achieving tremendous success recently with the development of deep ***,there have been stillmany challenges including crow... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Heterophilic Graph Neural Network Based on Spatial and Frequency Domain Adaptive Embedding Mechanism
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第5期139卷 1701-1731页
作者: Lanze Zhang Yijun Gu Jingjie Peng College of information and Cyber security People’s Public Security University of ChinaBeijing100038China
Graph Neural Networks(GNNs)play a significant role in tasks related to homophilic *** GNNs,based on the assumption of homophily,employ low-pass filters for neighboring nodes to achieve information aggregation and ***,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research,w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Attention-Enhanced Voice Portrait Model Using Generative Adversarial Network
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 837-855页
作者: Jingyi Mao Yuchen Zhou YifanWang Junyu Li Ziqing Liu Fanliang Bu School of information Network security People’s Public Security University of ChinaBeijing100038China
Voice portrait technology has explored and established the relationship between speakers’ voices and their facialfeatures, aiming to generate corresponding facial characteristics by providing the voice of an unknown ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TransTM:A device-free method based on time-streaming multiscale transformer for human activity recognition
收藏 引用
Defence Technology(防务技术) 2024年 第2期32卷 619-628页
作者: Yi Liu Weiqing Huang Shang Jiang Bobai Zhao Shuai Wang Siye Wang Yanfang Zhang institute of information Engineering Chinese Academy of Sciences School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina School of information Management Beijing Information Science and Technology UniversityBeijingChina
RFID-based human activity recognition(HAR)attracts attention due to its convenience,noninvasiveness,and privacy *** RFID-based HAR methods use modeling,CNN,or LSTM to extract features ***,they have shortcomings:1)requ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Robust adaptive radar beamforming based on iterative training sample selection using kurtosis of generalized inner product statistics
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 24-30页
作者: TIAN Jing ZHANG Wei School of information and Electronics Beijing Institute of TechnologyBeijing 100081China National Key Laboratory of Electromagnetic Space security Chengdu 610036China
In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China Department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China information security institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
security estimation of LWE via BKW algorithms
收藏 引用
Cybersecurity 2024年 第1期7卷 71-87页
作者: Yu Wei Lei Bi Xianhui Lu Kunpeng Wang SKLOIS Institute of Information EngineeringCASBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
The Learning With Errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography *** are a variety of LWE-solving methods,which can be classified into four groups... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论