咨询与建议

限定检索结果

文献类型

  • 115,139 篇 期刊文献
  • 5,181 篇 会议
  • 4 册 图书

馆藏范围

  • 120,324 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 80,444 篇 工学
    • 36,072 篇 材料科学与工程(可...
    • 18,020 篇 化学工程与技术
    • 16,104 篇 计算机科学与技术...
    • 13,407 篇 电气工程
    • 11,959 篇 电子科学与技术(可...
    • 11,807 篇 机械工程
    • 8,688 篇 力学(可授工学、理...
    • 8,068 篇 控制科学与工程
    • 6,909 篇 信息与通信工程
    • 6,419 篇 环境科学与工程(可...
    • 6,405 篇 动力工程及工程热...
    • 5,888 篇 冶金工程
    • 5,643 篇 软件工程
    • 5,492 篇 生物医学工程(可授...
    • 4,874 篇 仪器科学与技术
    • 4,485 篇 水利工程
    • 3,879 篇 生物工程
    • 3,856 篇 地质资源与地质工...
  • 73,348 篇 理学
    • 26,265 篇 物理学
    • 23,832 篇 化学
    • 16,742 篇 生物学
    • 13,161 篇 数学
    • 9,533 篇 天文学
    • 4,898 篇 地球物理学
    • 4,115 篇 地质学
  • 32,731 篇 医学
    • 25,924 篇 临床医学
    • 7,939 篇 基础医学(可授医学...
    • 3,987 篇 药学(可授医学、理...
  • 9,780 篇 农学
    • 4,058 篇 作物学
  • 5,840 篇 管理学
    • 3,773 篇 管理科学与工程(可...
  • 2,287 篇 经济学
  • 1,127 篇 教育学
  • 1,100 篇 法学
  • 662 篇 文学
  • 630 篇 艺术学
  • 488 篇 军事学
  • 125 篇 历史学
  • 70 篇 哲学

主题

  • 861 篇 deep learning
  • 695 篇 cancer
  • 663 篇 apoptosis
  • 663 篇 of
  • 658 篇 machine learning
  • 595 篇 rare earths
  • 490 篇 microstructure
  • 486 篇 and
  • 433 篇 model
  • 410 篇 case report
  • 401 篇 diagnosis
  • 401 篇 covid-19
  • 357 篇 stability
  • 349 篇 treatment
  • 328 篇 structure
  • 309 篇 system
  • 308 篇 optimization
  • 301 篇 analysis
  • 301 篇 mechanical prope...
  • 292 篇 prognosis

机构

  • 731 篇 university of ch...
  • 150 篇 university of ch...
  • 141 篇 ieee
  • 128 篇 department of co...
  • 93 篇 department of ch...
  • 92 篇 department of mo...
  • 89 篇 department of co...
  • 79 篇 department of mo...
  • 78 篇 state key labora...
  • 74 篇 department of mo...
  • 73 篇 department of ph...
  • 67 篇 university of mi...
  • 67 篇 institute for pa...
  • 67 篇 nikhef p.o.box 4...
  • 67 篇 fysikum stockhol...
  • 64 篇 michigan state u...
  • 56 篇 department of au...
  • 51 篇 collaborative in...
  • 51 篇 university of sc...
  • 46 篇 beijing national...

作者

  • 273 篇 wei zhang
  • 235 篇 wei wang
  • 215 篇 wei li
  • 159 篇 jian wang
  • 148 篇 lei zhang
  • 146 篇 yu zhang
  • 133 篇 li zhang
  • 133 篇 li li
  • 131 篇 jing wang
  • 127 篇 yang liu
  • 120 篇 wei liu
  • 120 篇 wei chen
  • 119 篇 yan zhang
  • 118 篇 yang yang
  • 109 篇 jun li
  • 106 篇 lei wang
  • 105 篇 yi zhang
  • 103 篇 yang li
  • 98 篇 rui wang
  • 95 篇 hui wang

语言

  • 115,701 篇 英文
  • 4,622 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Cryptography Science and Technology"
120324 条 记 录,以下是1-10 订阅
排序:
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 388-410页
作者: Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi cryptography and Data Security Laboratory School of MathematicsIran University of Science and TechnologyNarmakTehranIran
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same *** if the shareholders have two different positions,essential and non‐essential,it is necessary to use essent... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 19-29页
作者: Kexin QIAO Zhiyu ZHANG Zhongfeng NIU Liehuang ZHU School of Cyberspace science and technology Beijing Institute of Technology State Key Laboratory of Cryptology Institute of Information Engineering Chinese Academy of Sciences School of cryptography University of Chinese Academy of Sciences
Recent results show that the differential properties within quadruples boom as a new inspiration in cryptanalysis of Advanced Encryption Standard(AES)-like constructions. These methods include the exchange attack prop... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Phytochemical analysis, antioxidant, acetylcholinesterase, and α-amylase inhibitors from Hippeastrum hybridum extract
收藏 引用
Journal of Traditional Chinese Medicine 2024年 第3期44卷 496-504页
作者: Naila Sher Mushtaq Ahmed Nadia Mushtaq department of Biotechnology University of Science and Technology department of Botany University of Science and Technology
OBJECTIVE:To investigate the effects of Hippeastrum hybridum(HH) as a free radical scavenger,and an inhibitor of the two enzymes i-e Alpha-amylase(α-amylase) and acetylcholinesterase(AChE).METHODS:In this study... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
General Method of Combining Grover and Simon for Attacking Block Ciphers
收藏 引用
China Communications 2024年 第6期21卷 237-245页
作者: Fu Xiangqun Bao Wansu Shi Jianhong Li Tan Henan Key Laboratory of Quantum Information and cryptography PLA SSF IEUZhengzhou 450001China Synergetic Innovation Center of Quantum Information and Quantum Physics University of Science and Technology of ChinaHefei 230026China
The compatibility of different quantum algorithms should be considered when these algorithms are *** this paper,the method of combining Grover and Simon is studied for the first time,under some preconditions or ***,we... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and sciences National University of Defense Technology Hunan Engineering Research Center of Commercial cryptography Theory and technology Innovation State Key Laboratory of Information Security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Federated Learning Security and Privacy-Preserving Algorithm and Experiments Research Under Internet of Things Critical Infrastructure
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 400-414页
作者: Nasir Ahmad Jalali Hongsong Chen department of Computer science University of Science and Technology Beijing(USTB)Beijing 100083China
The widespread use of the Internet of Things(IoTs)and the rapid development of artificial intelligence technologies have enabled applications to cross commercial and industrial band *** such systems,all participants r... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Skill enhancement learning with knowledge distillation
收藏 引用
science China(Information sciences) 2024年 第8期67卷 206-220页
作者: Naijun LIU Fuchun SUN Bin FANG Huaping LIU department of Computer science and technology Tsinghua University
Skill learning through reinforcement learning has significantly progressed in recent years. However, it often struggles to efficiently find optimal or near-optimal policies due to the inherent trial-and-error explorat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Memory-enhanced text style transfer with dynamic style learning and calibration
收藏 引用
science China(Information sciences) 2024年 第4期67卷 181-196页
作者: Fuqiang LIN Yiping SONG Zhiliang TIAN Wangqun CHEN Diwen DONG Bo LIU College of Computer science and technology National University of Defense Technology department of Computer science and Engineering The Hong Kong University of Science and Technology Strategic Assessments and Consultation Institute Academy of Military Sciences
Text style transfer aims to rephrase a sentence to match the desired style while retaining the original content. As a controllable text generation task, mainstream approaches use content-independent style embedding as... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim department of Financial Information Security Kookmin UniversitySeoul02707Republic of Korea department of Information Security cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Security of quantum key distribution with virtual mutually unbiased bases
收藏 引用
science China(Physics,Mechanics & Astronomy) 2024年 第7期67卷 13-21页
作者: Hong-Wei Li Chen-Peng Hao Zhi-Jiang Chen Li Gong Yi-Fei Lu Yang Wang Jia-Ji Li Chun-Mei Zhang Rong Wang Zhen-Qiang Yin Qing-Yu Cai Henan Key Laboratory of Quantum Information and cryptography SSF IEUZhengzhou 450000China Institute of Quantum Information and technology Nanjing University of Posts and TelecommunicationsNanjing 210003China department of Physics University of Hong KongHong Kong 999077China Key Laboratory of Quantum Information University of Science and Technology of ChinaHefei 230026China School of Information and Communication Engineering Hainan UniversityHaikou 570228China
In a perfect quantum key distribution(QKD)protocol,quantum states should be prepared and measured with mutually unbiased bases(MUBs).However,in a practical QKD system,quantum states are generally prepared and measured... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论