咨询与建议

限定检索结果

文献类型

  • 5,801 篇 期刊文献
  • 225 篇 会议
  • 1 册 图书

馆藏范围

  • 6,027 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,456 篇 工学
    • 1,831 篇 计算机科学与技术...
    • 827 篇 电子科学与技术(可...
    • 671 篇 网络空间安全
    • 622 篇 软件工程
    • 520 篇 控制科学与工程
    • 511 篇 仪器科学与技术
    • 423 篇 信息与通信工程
    • 408 篇 机械工程
    • 227 篇 材料科学与工程(可...
    • 205 篇 光学工程
    • 147 篇 化学工程与技术
    • 119 篇 电气工程
    • 90 篇 交通运输工程
    • 79 篇 环境科学与工程(可...
    • 63 篇 航空宇航科学与技...
    • 59 篇 测绘科学与技术
    • 58 篇 地质资源与地质工...
  • 1,219 篇 理学
    • 482 篇 物理学
    • 316 篇 数学
    • 94 篇 化学
    • 91 篇 系统科学
    • 84 篇 生物学
  • 741 篇 管理学
    • 625 篇 管理科学与工程(可...
    • 55 篇 公共管理
  • 595 篇 医学
    • 473 篇 临床医学
  • 227 篇 农学
    • 78 篇 作物学
    • 76 篇 农业资源与环境
  • 189 篇 经济学
    • 186 篇 应用经济学
  • 176 篇 军事学
    • 170 篇 军队指挥学
  • 89 篇 艺术学
    • 82 篇 设计学(可授艺术学...
  • 63 篇 文学
  • 51 篇 法学
  • 44 篇 教育学
  • 6 篇 历史学
  • 3 篇 哲学

主题

  • 303 篇 security
  • 206 篇 deep learning
  • 183 篇 machine learning
  • 136 篇 internet of thin...
  • 125 篇 blockchain
  • 87 篇 authentication
  • 76 篇 iot
  • 72 篇 information
  • 67 篇 network
  • 59 篇 cybersecurity
  • 55 篇 artificial intel...
  • 53 篇 system
  • 50 篇 intrusion detect...
  • 49 篇 of
  • 47 篇 big data
  • 47 篇 quantum
  • 47 篇 cloud computing
  • 44 篇 information secu...
  • 43 篇 detection
  • 39 篇 management

机构

  • 35 篇 department of co...
  • 31 篇 department of co...
  • 26 篇 ieee
  • 25 篇 department of in...
  • 22 篇 department of in...
  • 22 篇 department of el...
  • 21 篇 department of el...
  • 21 篇 department of co...
  • 20 篇 university of ch...
  • 19 篇 department of co...
  • 17 篇 tsinghua nationa...
  • 17 篇 department of el...
  • 15 篇 department of in...
  • 15 篇 security enginee...
  • 14 篇 hefei national l...
  • 13 篇 department of au...
  • 13 篇 information tech...
  • 13 篇 department of au...
  • 12 篇 department of co...
  • 12 篇 department of co...

作者

  • 22 篇 abdelwahed motwa...
  • 21 篇 anwer mustafa hi...
  • 20 篇 fathi e.abd el-s...
  • 19 篇 mesfer al duhayy...
  • 19 篇 manar ahmed hamz...
  • 16 篇 mehedi masud
  • 16 篇 walid el-shafai
  • 15 篇 fahd n.al-wesabi
  • 14 篇 abu sarwar zaman...
  • 14 篇 wei li
  • 13 篇 jun zhang
  • 13 篇 ishfaq yaseen
  • 12 篇 imran khan
  • 12 篇 rajeev kumar
  • 12 篇 yang yang
  • 11 篇 lei wang
  • 11 篇 radwa marzouk
  • 11 篇 xiu-bo chen
  • 11 篇 tao wu
  • 11 篇 jing wang

语言

  • 5,548 篇 英文
  • 479 篇 中文
检索条件"机构=Information Security Technologies Department"
6027 条 记 录,以下是1-10 订阅
排序:
A New Encryption Mechanism Supporting the Update of Encrypted Data for Secure and Efficient Collaboration in the Cloud Environment
收藏 引用
Computer Modeling in Engineering & Sciences 2025年 第1期142卷 813-834页
作者: Chanhyeong Cho Byeori Kim Haehyun Cho Taek-Young Youn department of Cyber security Dankook UniversityYongin16890Republic of Korea department of Software Soongsil UniversitySeoul07027Republic of Korea
With the rise of remote collaboration,the demand for advanced storage and collaboration tools has rapidly ***,traditional collaboration tools primarily rely on access control,leaving data stored on cloud servers vulne... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Steel Surface Defect Recognition in Smart Manufacturing Using Deep Ensemble Transfer Learning-Based Techniques
收藏 引用
Computer Modeling in Engineering & Sciences 2025年 第1期142卷 231-250页
作者: Tajmal Hussain Jongwon Seok department of information and Communication Engineering Changwon National UniversityChangwon51140Republic of Korea
Smart manufacturing and Industry 4.0 are transforming traditional manufacturing processes by utilizing innovative technologies such as the artificial intelligence(AI)and internet of things(IoT)to enhance efficiency,re... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Controlled mutual quantum entity authentication using entanglement swapping
收藏 引用
Chinese Physics B 2015年 第9期24卷 116-124页
作者: Min-Sung Kang Chang-Ho Hong Jino Heo Jong-In Lim Hyung-Jin Yang Center for information security technologies (CIST) Korea University Graduate School of information security Korea University department of Physics Korea University
In this paper, we suggest a controlled mutual quantum entity authentication protocol by which two users mutually certify each other on a quantum network using a sequence of Greenberger–Horne–Zeilinger(GHZ)-like st... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Bidirectional transfer of quantum information for unknown photons via cross-Kerr nonlinearity and photon-number-resolving measurement
收藏 引用
Chinese Physics B 2016年 第2期25卷 82-92页
作者: Jino Heo Chang-Ho Hong Dong-Hoon Lee Hyung-Jin Yang Graduate School of information security (GSIS) Korea University Center for information security technologies (CIST) Korea University department of Physics Korea University
We propose an arbitrary controlled-unitary (CU) gate and a bidirectional transfer scheme of quantum information (BTQI) for unknown photons. The proposed CU gate utilizes quantum non-demolition photon-number-resolv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Bidirectional quantum teleportation of unknown photons using path-polarization intra-particle hybrid entanglement and controlled-unitary gates via cross-Kerr nonlinearity
收藏 引用
Chinese Physics B 2015年 第5期24卷 210-222页
作者: Jino Heo Chang-Ho Hong Jong-In Lim Hyung-Jin Yang Graduate School of information security (GSIS) Korea University Center for information security technologies (CIST) Korea University department of Physics Korea University
We propose an arbitrary controlled-unitary (CU) gate and a bidirectional quantum teleportation (BQTP) scheme. The proposed CU gate utilizes photonic qubits (photons) with cross-Kerr nonlinearities (XKNLs), X-h... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum secure direct communication network with hyperentanglement
收藏 引用
Chinese Physics B 2014年 第9期23卷 107-111页
作者: Chang Ho Hong Jino Heo Jong In Lim Hyung Jin Yang Graduate School of information Management and security Korea University Center for information security technologies (CIST) Korea University department of Physics Korea University Graduate School of information security (GSIS) Korea University
We propose a quantum secure direct communication protocol with entanglement swapping and hyperentanglement. Any two users, Alice and Bob, can communicate with each other in a quantum network, even though there is no d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Joint Optimization Scheme for the Reconfigurable Intelligent Surface-Assisted Untrusted Relay Networks
收藏 引用
China Communications 2023年 第12期20卷 19-29页
作者: Lihua Gong Wei Xu Xiaoxiu Ding Nanrun Zhou Qibiao Zhu department of Electronic information Engineering Nanchang UniversityNanchang 330031China Shanghai Key Laboratory of Integrate Administration technologies for information security School of Information Security EngineeringShanghai Jiao Tong UniversityShanghai 200240China
To further improve the secrecy rate,a joint optimization scheme for the reconfigurable intelligent surface(RIS)phase shift and the power allocation is proposed in the untrusted relay(UR)networks assisted by the *** ea... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms
收藏 引用
Science China(information Sciences) 2015年 第12期58卷 89-103页
作者: ZHANG WenTao BAO ZhenZhen LIN DongDai Vincent RIJMEN YANG Bo Han Ingrid VERBAUWHEDE State Key Laboratory of information security Institute of Information EngineeringChinese Academy of Sciences department of Electrical Engineering ESAT COSIC and i Minds Security Department
In this paper, we propose a new lightweight block cipher named RECTANGLE. The main idea of the design of RECTANGLE is to allow lightweight and fast implementations using bit-slice techniques. RECTANGLE uses an SP-netw... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Explainable Artificial Intelligence-Based Model Drift Detection Applicable to Unsupervised Environments
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1701-1719页
作者: Yongsoo Lee Yeeun Lee Eungyu Lee Taejin Lee department of information security Hoseo UniversityAsan31499Korea
Cybersecurity increasingly relies on machine learning(ML)models to respond to and detect ***,the rapidly changing data environment makes model life-cycle management after deployment ***-time detection of drift signals... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
LEGA:A Lightweight and Efficient Group Authentication Protocol for Massive Machine Type Communication in 5G Networks
收藏 引用
Journal of Communications and information Networks 2020年 第4期5卷 457-466页
作者: Sultan Basudan department of information Technology and security Jazan UniversitySaudi Arabia
Massive machine type communication(mMTC)is anticipated to be an essential part of fifth generation(5G)*** main challenge for mMTC devices(mMTCDs)is the design of an access authentication scheme that can fulfill the se... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论