咨询与建议

限定检索结果

文献类型

  • 4,624 篇 期刊文献
  • 171 篇 会议

馆藏范围

  • 4,795 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,105 篇 工学
    • 2,288 篇 计算机科学与技术...
    • 1,242 篇 网络空间安全
    • 652 篇 软件工程
    • 616 篇 电子科学与技术(可...
    • 439 篇 控制科学与工程
    • 363 篇 仪器科学与技术
    • 360 篇 信息与通信工程
    • 336 篇 机械工程
    • 83 篇 电气工程
    • 32 篇 交通运输工程
    • 32 篇 航空宇航科学与技...
    • 31 篇 光学工程
    • 26 篇 公安技术
    • 25 篇 材料科学与工程(可...
    • 23 篇 建筑学
    • 22 篇 测绘科学与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 土木工程
  • 681 篇 管理学
    • 663 篇 管理科学与工程(可...
  • 613 篇 理学
    • 318 篇 数学
    • 174 篇 物理学
    • 73 篇 系统科学
    • 16 篇 地球物理学
  • 275 篇 军事学
    • 272 篇 军队指挥学
  • 142 篇 医学
    • 127 篇 临床医学
  • 95 篇 艺术学
    • 92 篇 设计学(可授艺术学...
  • 64 篇 经济学
    • 64 篇 应用经济学
  • 49 篇 文学
    • 36 篇 外国语言文学
  • 45 篇 法学
    • 30 篇 社会学
  • 44 篇 教育学
    • 39 篇 教育学
  • 28 篇 农学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 371 篇 security
  • 223 篇 blockchain
  • 178 篇 deep learning
  • 125 篇 machine learning
  • 122 篇 internet of thin...
  • 113 篇 cryptography
  • 104 篇 authentication
  • 101 篇 privacy
  • 89 篇 cloud computing
  • 74 篇 network security
  • 68 篇 network
  • 67 篇 iot
  • 67 篇 intrusion detect...
  • 61 篇 access control
  • 57 篇 cyber security
  • 49 篇 information secu...
  • 48 篇 privacy protecti...
  • 48 篇 encryption
  • 46 篇 artificial intel...
  • 44 篇 detection

机构

  • 45 篇 state key labora...
  • 42 篇 ieee
  • 38 篇 school of comput...
  • 35 篇 department of co...
  • 27 篇 school of cyber ...
  • 26 篇 school of cyber ...
  • 24 篇 state key labora...
  • 23 篇 department of co...
  • 22 篇 school of comput...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 21 篇 school of cyber ...
  • 20 篇 school of comput...
  • 20 篇 school of cyber ...
  • 19 篇 department of in...
  • 18 篇 state key labora...
  • 18 篇 department of in...
  • 17 篇 department of co...
  • 17 篇 school of cyber ...

作者

  • 33 篇 walid el-shafai
  • 32 篇 zhang huanguo
  • 27 篇 jianfeng ma
  • 22 篇 陈克非
  • 17 篇 hui li
  • 16 篇 rui zhang
  • 16 篇 huanguo zhang
  • 15 篇 ma jianfeng
  • 15 篇 abdelwahed motwa...
  • 15 篇 yu zhang
  • 15 篇 kim-kwang raymon...
  • 15 篇 anwer mustafa hi...
  • 15 篇 fathi e.abd el-s...
  • 15 篇 mesfer al duhayy...
  • 15 篇 naglaa f.soliman
  • 14 篇 wei wang
  • 14 篇 jieren cheng
  • 14 篇 wei li
  • 14 篇 fahd n.al-wesabi
  • 13 篇 mehedi masud

语言

  • 4,561 篇 英文
  • 234 篇 中文
检索条件"机构=Computer Science and Cyber Security"
4795 条 记 录,以下是1-10 订阅
排序:
A Lightweight, Searchable, and Controllable EMR Sharing Scheme
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1521-1538页
作者: Xiaohui Yang Peiyin Zhao School of cyber security and computer Hebei UniversityBaoding071000China
Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer fromprivacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1843-1859页
作者: Xiaohui Yang Kun Zhang School of cyber security and computer Hebei UniversityBaoding071000China
Data is regarded as a valuable asset,and sharing data is a prerequisite for fully exploiting the value of ***,the current medical data sharing scheme lacks a fair incentive mechanism,and the authenticity of data canno... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Verification of quantum networks using the GHZ paradox
收藏 引用
Communications in Theoretical Physics 2024年 第10期76卷 57-63页
作者: Huan Ye Xue Yang Ming-Xing Luo School of Information science and Technology Southwest Jiaotong University School of computer science and cyber security Chengdu University of Technology
The Greenberger–Horne–Zeilinger(GHZ) paradox shows that it is possible to create a multipartite state involving three or more particles in which the measurement outcomes of the particles are correlated in a way that... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Smart Contract Vulnerability Detection Method Based on Feature Graph and Multiple Attention Mechanisms
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3023-3045页
作者: Zhenxiang He Zhenyu Zhao Ke Chen Yanlin Liu School of cyber security Gansu University of Political Science and LawLanzhou730070China
The fast-paced development of blockchain technology is ***,the security concerns of smart contracts represent a significant challenge to the stability and dependability of the entire blockchain *** smart contract vuln... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
science China(Information sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG Institute of Information Engineering Chinese Academy of Sciences School of cyber security University of Chinese Academy of Sciences School of computer science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Enhancing Image Description Generation through Deep Reinforcement Learning:Fusing Multiple Visual Features and Reward Mechanisms
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2469-2489页
作者: Yan Li Qiyuan Wang Kaidi Jia School of cyber security Gansu University of Political Science and LawLanzhou730070China
Image description task is the intersection of computer vision and natural language processing,and it has important prospects,including helping computers understand images and obtaining information for the visually ***... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
computers, Materials and Continua 2024年 第1期81卷 183-211页
作者: Njoum M. Sulaiman R. Shukur Z. Qamar F. Center of cyber security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Selangor Bangi 43600 Malaysia computer science and cyber security Faculty of Engineering and Information Technology BirZeit University Ramallah P.O. Box 14 BirZeit Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden data. This property makes it difficult for steganalysts’ powerful data extr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
收藏 引用
science China(Information sciences) 2024年 第1期67卷 308-309页
作者: Lisha YAO Lin HOU Jian WENG Feixiang ZHAO College of cyber security Jinan University
A public-key authenticated encryption with keyword search(PAEKS)[1, 2] system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token. This...
来源: 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
science China(Information sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA School of cyber Engineering Xidian University School of computer science and Technology Xidian University Department of computer and Information science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Federated Learning Framework with Blockchain-Based Auditable Participant Selection
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 5125-5142页
作者: Huang Zeng Mingtian Zhang Tengfei Liu Anjia Yang College of cyber security Jinan UniversityGuangzhou510632China
Federated learning is an important distributed model training technique in Internet of Things(IoT),in which participant selection is a key component that plays a role in improving training efficiency and model *** mod... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论