咨询与建议

限定检索结果

文献类型

  • 20,581 篇 期刊文献
  • 2,373 篇 会议

馆藏范围

  • 22,954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,944 篇 工学
    • 8,934 篇 计算机科学与技术...
    • 5,929 篇 材料科学与工程(可...
    • 5,297 篇 电子科学与技术(可...
    • 5,060 篇 电气工程
    • 4,106 篇 控制科学与工程
    • 4,011 篇 信息与通信工程
    • 3,461 篇 机械工程
    • 3,192 篇 软件工程
    • 2,227 篇 仪器科学与技术
    • 2,117 篇 网络空间安全
    • 1,551 篇 化学工程与技术
    • 1,260 篇 力学(可授工学、理...
    • 1,110 篇 生物医学工程(可授...
    • 1,042 篇 动力工程及工程热...
    • 1,017 篇 环境科学与工程(可...
    • 1,015 篇 光学工程
    • 780 篇 航空宇航科学与技...
    • 642 篇 水利工程
  • 12,179 篇 理学
    • 4,138 篇 物理学
    • 3,640 篇 数学
    • 2,085 篇 生物学
    • 2,053 篇 化学
    • 1,812 篇 天文学
    • 1,040 篇 系统科学
    • 619 篇 地球物理学
    • 543 篇 海洋科学
  • 3,074 篇 管理学
    • 2,329 篇 管理科学与工程(可...
    • 625 篇 图书情报与档案管...
  • 1,570 篇 医学
    • 1,165 篇 临床医学
  • 1,466 篇 农学
    • 656 篇 作物学
  • 544 篇 经济学
  • 518 篇 军事学
  • 435 篇 法学
  • 393 篇 教育学
  • 239 篇 艺术学
  • 230 篇 文学
  • 17 篇 历史学
  • 15 篇 哲学

主题

  • 645 篇 deep learning
  • 309 篇 machine learning
  • 293 篇 security
  • 189 篇 internet of thin...
  • 133 篇 blockchain
  • 116 篇 network
  • 110 篇 clustering
  • 102 篇 image
  • 100 篇 analysis
  • 93 篇 optimization
  • 85 篇 simulation
  • 71 篇 polarization
  • 71 篇 classification
  • 68 篇 system
  • 65 篇 iot
  • 62 篇 cloud computing
  • 60 篇 metaheuristics
  • 59 篇 sensor
  • 59 篇 control
  • 55 篇 power

机构

  • 294 篇 college of infor...
  • 109 篇 ieee
  • 107 篇 university of ch...
  • 53 篇 college of infor...
  • 52 篇 college of elect...
  • 48 篇 college of compu...
  • 40 篇 college of infor...
  • 35 篇 college of infor...
  • 35 篇 university of ch...
  • 35 篇 college of elect...
  • 32 篇 college of elect...
  • 31 篇 college of infor...
  • 30 篇 college of physi...
  • 30 篇 state key labora...
  • 29 篇 college of mathe...
  • 29 篇 college of elect...
  • 29 篇 college of infor...
  • 29 篇 shanghai institu...
  • 28 篇 school of cyber ...
  • 28 篇 college of physi...

作者

  • 55 篇 abdelwahed motwa...
  • 52 篇 mehedi masud
  • 47 篇 jing zhang
  • 38 篇 jian wang
  • 37 篇 jun wang
  • 34 篇 yunyoung nam
  • 33 篇 xin liu
  • 32 篇 rui wang
  • 31 篇 jun zhang
  • 30 篇 施德恒
  • 28 篇 li zhang
  • 28 篇 hong chen
  • 27 篇 abu sarwar zaman...
  • 26 篇 bin zhang
  • 25 篇 xiang li
  • 24 篇 wei liu
  • 23 篇 chen chen
  • 22 篇 huaguang zhang
  • 21 篇 cheng wang
  • 21 篇 jin wang

语言

  • 22,599 篇 英文
  • 355 篇 中文
检索条件"机构=College of Information Security Engineering"
22954 条 记 录,以下是1-10 订阅
排序:
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research,w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
收藏 引用
Science China(information Sciences) 2024年 第1期67卷 221-239页
作者: Xiaoyan HU Zheng WAN Kaizhi HUANG Liang JIN Mengyao YAN Yajun CHEN Jinmei YANG information engineering University Purple Mountain Laboratories for Network and Communication security
This paper proposes a novel modulated symbols-based one-time pad(SOTP) secure transmission scheme using physical layer *** classical physical layer key generation and exclusive OR(XOR)encryption in the discrete binary... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2105-2122页
作者: Mingze Li Diwen Zheng Shuhua Lu college of information and Cyber security People’s Public Security University of ChinaBeijing102600China
Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis,achieving tremendous success recently with the development of deep ***,there have been stillmany challenges including crow... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Heterophilic Graph Neural Network Based on Spatial and Frequency Domain Adaptive Embedding Mechanism
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第5期139卷 1701-1731页
作者: Lanze Zhang Yijun Gu Jingjie Peng college of information and Cyber security People’s Public Security University of ChinaBeijing100038China
Graph Neural Networks(GNNs)play a significant role in tasks related to homophilic *** GNNs,based on the assumption of homophily,employ low-pass filters for neighboring nodes to achieve information aggregation and ***,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI college of Liberal Arts and Sciences National University of Defense Technology Hunan engineering Research Center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of information security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CMAES-WFD:Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2253-2276页
作者: Di Wang Yuefei Zhu Jinlong Fei Maohua Guo School of Cyberspace security Information Engineering UniversityZhengzhou450000China
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity *** advanced attacks based on deep neural ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4573-4601页
作者: Zhihui Song Jinchen Xu Kewei Li Zheng Shan School of Cyberspace security Information Engineering UniversityZhengzhou450001China
Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code ***,due to lim... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan Province Key Laboratory of information security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Two-Layer Attention Feature Pyramid Network for Small Object Detection
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第10期141卷 713-731页
作者: Sheng Xiang Junhao Ma Qunli Shang Xianbao Wang Defu Chen college of information engineering Zhejiang University of TechnologyHangzhou310023China Binjiang Cyberspace security Institute of ZJUT Hangzhou310056China
Effective small object detection is crucial in various applications including urban intelligent transportation and pedestrian ***,small objects are difficult to detect accurately because they contain less *** current ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Network traffic classification:Techniques,datasets,and challenges
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 676-692页
作者: Ahmad Azab Mahmoud Khasawneh Saed Alrabaee Kim-Kwang Raymond Choo Maysa Sarsour college of information Technology and Systems Victorian Institute of TechnologyAustralia college of engineering Al Ain UniversityAbu DhabiUnited Arab Emirates information Systems and security College of ITUnited Arab Emirates UniversityAl Ain15551United Arab Emirates Department of information Systems and Cyber security University of Texas at San AntonioSan AntonioTX78260USA School of Photovoltaic and Renewable Energy engineering University of New South WalesSydneyNSW2052Australia
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论