咨询与建议

限定检索结果

文献类型

  • 4,976 篇 期刊文献
  • 213 篇 会议

馆藏范围

  • 5,189 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,569 篇 工学
    • 3,154 篇 计算机科学与技术...
    • 1,510 篇 电气工程
    • 1,312 篇 信息与通信工程
    • 1,114 篇 电子科学与技术(可...
    • 1,065 篇 网络空间安全
    • 878 篇 材料科学与工程(可...
    • 748 篇 控制科学与工程
    • 478 篇 机械工程
    • 402 篇 仪器科学与技术
    • 365 篇 软件工程
    • 305 篇 生物医学工程(可授...
    • 269 篇 力学(可授工学、理...
    • 114 篇 动力工程及工程热...
    • 105 篇 环境科学与工程(可...
  • 2,220 篇 理学
    • 1,272 篇 数学
    • 567 篇 物理学
    • 303 篇 天文学
    • 264 篇 生物学
    • 160 篇 系统科学
    • 90 篇 地球物理学
    • 78 篇 化学
    • 73 篇 统计学(可授理学、...
  • 392 篇 管理学
    • 230 篇 图书情报与档案管...
    • 142 篇 管理科学与工程(可...
  • 267 篇 医学
    • 209 篇 临床医学
    • 76 篇 基础医学(可授医学...
  • 181 篇 法学
    • 98 篇 社会学
    • 67 篇 法学
  • 113 篇 经济学
    • 104 篇 应用经济学
  • 99 篇 农学
    • 59 篇 作物学
  • 94 篇 教育学
  • 55 篇 文学
  • 25 篇 军事学
  • 11 篇 艺术学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 270 篇 security
  • 197 篇 blockchain
  • 182 篇 deep learning
  • 105 篇 cryptography
  • 91 篇 internet of thin...
  • 85 篇 machine learning
  • 82 篇 authentication
  • 70 篇 privacy
  • 59 篇 network
  • 57 篇 intrusion detect...
  • 55 篇 iot
  • 50 篇 physical layer s...
  • 44 篇 cloud computing
  • 42 篇 cybersecurity
  • 42 篇 network security
  • 40 篇 image encryption
  • 40 篇 artificial intel...
  • 38 篇 information secu...
  • 36 篇 access control
  • 35 篇 安全性

机构

  • 96 篇 state key labora...
  • 41 篇 information secu...
  • 33 篇 information secu...
  • 30 篇 state key labora...
  • 29 篇 school of cyber ...
  • 28 篇 school of cyber ...
  • 28 篇 school of cyber ...
  • 27 篇 department of co...
  • 27 篇 information secu...
  • 26 篇 department of co...
  • 23 篇 state key labora...
  • 23 篇 department of in...
  • 22 篇 key laboratory o...
  • 22 篇 school of inform...
  • 20 篇 department of el...
  • 20 篇 faculty of infor...
  • 19 篇 information secu...
  • 19 篇 department of in...
  • 19 篇 school of inform...
  • 18 篇 institute of inf...

作者

  • 34 篇 walid el-shafai
  • 21 篇 李宏伟
  • 20 篇 abdelwahed motwa...
  • 19 篇 陈秀波
  • 19 篇 wei wang
  • 17 篇 xiu-bo chen
  • 17 篇 anwer mustafa hi...
  • 17 篇 fathi e.abd el-s...
  • 17 篇 mesfer al duhayy...
  • 16 篇 鲍皖苏
  • 15 篇 yiliang han
  • 15 篇 lin dongdai
  • 15 篇 kim-kwang raymon...
  • 15 篇 xiaoyuan yang
  • 15 篇 zhang huanguo
  • 14 篇 hu lei
  • 14 篇 mehedi masud
  • 14 篇 yixian yang
  • 14 篇 hu yupu
  • 14 篇 rui zhang

语言

  • 4,889 篇 英文
  • 300 篇 中文
检索条件"机构=Information Security and Cybersecurity Unit"
5189 条 记 录,以下是1-10 订阅
排序:
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher algorithms.It generated many excellent results for some ciphers,for example,Salsa20.I... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Detecting compromised email accounts via login behavior characterization
收藏 引用
cybersecurity 2024年 第1期7卷 16-36页
作者: Jianjun Zhao Can Yang Di Wu Yaqin Cao Yuling Liu Xiang Cui Qixu Liu Institute of information Engineering Chinese Academy of SciencesBeijing100085China School of Cyber security University of Chinese Academy of SciencesBeijing100049China China cybersecurity Review Technology and Certification Center Beijing100013China Zhongguancun Laboratory Beijing100089China
The illegal use of compromised email accounts by adversaries can have severe consequences for enterprises and society.Detecting compromised email accounts is more challenging than in the social network field,where ema... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu State Key Laboratory of information security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2105-2122页
作者: Mingze Li Diwen Zheng Shuhua Lu College of information and Cyber security People’s Public Security University of ChinaBeijing102600China
Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis,achieving tremendous success recently with the development of deep learning.However,there have been stillmany challenges i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
收藏 引用
Science China(information Sciences) 2024年 第1期67卷 221-239页
作者: Xiaoyan HU Zheng WAN Kaizhi HUANG Liang JIN Mengyao YAN Yajun CHEN Jinmei YANG information Engineering University Purple Mountain Laboratories for Network and Communication security
This paper proposes a novel modulated symbols-based one-time pad(SOTP) secure transmission scheme using physical layer keys.Unlike classical physical layer key generation and exclusive OR(XOR)encryption in the discret... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Heterophilic Graph Neural Network Based on Spatial and Frequency Domain Adaptive Embedding Mechanism
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第5期139卷 1701-1731页
作者: Lanze Zhang Yijun Gu Jingjie Peng College of information and Cyber security People’s Public Security University of ChinaBeijing100038China
Graph Neural Networks(GNNs)play a significant role in tasks related to homophilic graphs.Traditional GNNs,based on the assumption of homophily,employ low-pass filters for neighboring nodes to achieve information aggre... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Attention-Enhanced Voice Portrait Model Using Generative Adversarial Network
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 837-855页
作者: Jingyi Mao Yuchen Zhou YifanWang Junyu Li Ziqing Liu Fanliang Bu School of information Network security People’s Public Security University of ChinaBeijing100038China
Voice portrait technology has explored and established the relationship between speakers’ voices and their facialfeatures, aiming to generate corresponding facial characteristics by providing the voice of an unknown ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan Province Key Laboratory of information security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
CMAES-WFD:Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2253-2276页
作者: Di Wang Yuefei Zhu Jinlong Fei Maohua Guo School of Cyberspace security Information Engineering UniversityZhengzhou450000China
Website fingerprinting,also known asWF,is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination,even when using the Tor anonymity network.While advanced attacks based on de... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym information security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论