咨询与建议

限定检索结果

文献类型

  • 1,295 篇 期刊文献
  • 38 篇 会议

馆藏范围

  • 1,333 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,086 篇 工学
    • 480 篇 计算机科学与技术...
    • 298 篇 网络空间安全
    • 186 篇 电子科学与技术(可...
    • 178 篇 软件工程
    • 152 篇 仪器科学与技术
    • 152 篇 控制科学与工程
    • 151 篇 信息与通信工程
    • 96 篇 机械工程
    • 60 篇 电气工程
    • 21 篇 交通运输工程
    • 19 篇 水利工程
    • 14 篇 航空宇航科学与技...
    • 13 篇 光学工程
    • 13 篇 材料科学与工程(可...
    • 12 篇 土木工程
    • 12 篇 船舶与海洋工程
    • 12 篇 环境科学与工程(可...
    • 11 篇 化学工程与技术
  • 231 篇 管理学
    • 211 篇 管理科学与工程(可...
  • 207 篇 理学
    • 86 篇 数学
    • 59 篇 物理学
    • 15 篇 生物学
    • 13 篇 生态学
    • 10 篇 系统科学
  • 76 篇 军事学
    • 73 篇 军队指挥学
  • 43 篇 医学
    • 30 篇 临床医学
  • 36 篇 经济学
    • 36 篇 应用经济学
  • 33 篇 农学
    • 16 篇 农业资源与环境
  • 21 篇 艺术学
    • 20 篇 设计学(可授艺术学...
  • 20 篇 法学
    • 13 篇 政治学
  • 9 篇 文学
  • 8 篇 教育学
  • 2 篇 历史学

主题

  • 72 篇 security
  • 51 篇 network security
  • 48 篇 deep learning
  • 42 篇 machine learning
  • 42 篇 blockchain
  • 36 篇 network
  • 32 篇 intrusion detect...
  • 25 篇 internet of thin...
  • 22 篇 cloud computing
  • 19 篇 authentication
  • 18 篇 cryptography
  • 16 篇 privacy
  • 15 篇 anomaly detectio...
  • 15 篇 iot
  • 15 篇 neural network
  • 14 篇 smart grid
  • 13 篇 artificial intel...
  • 12 篇 clustering
  • 12 篇 wireless sensor ...
  • 12 篇 data

机构

  • 27 篇 state key labora...
  • 27 篇 state key labora...
  • 20 篇 university of ch...
  • 15 篇 institute of inf...
  • 14 篇 school of cyber ...
  • 13 篇 department of co...
  • 10 篇 school of cyber ...
  • 10 篇 institute of inf...
  • 10 篇 cyberspace insti...
  • 9 篇 ieee
  • 8 篇 institute for ne...
  • 8 篇 fujian provincia...
  • 8 篇 trusted computin...
  • 8 篇 national compute...
  • 8 篇 state key labora...
  • 7 篇 state key labora...
  • 7 篇 university of ch...
  • 7 篇 institute of inf...
  • 7 篇 shanghai institu...
  • 6 篇 department of in...

作者

  • 9 篇 wei li
  • 8 篇 dengguo feng
  • 8 篇 wei wang
  • 7 篇 lin dongdai
  • 7 篇 qixu liu
  • 6 篇 li yang
  • 6 篇 liehuang zhu
  • 6 篇 zhen chen
  • 6 篇 yu yang
  • 5 篇 junwei cao
  • 5 篇 yu wang
  • 5 篇 jiang zhang
  • 5 篇 si wang
  • 5 篇 baoxu liu
  • 5 篇 guang-hui liu
  • 5 篇 dongdai lin
  • 5 篇 yu zhang
  • 5 篇 jing qu
  • 5 篇 walid el-shafai
  • 5 篇 jiangyuan yao

语言

  • 1,227 篇 英文
  • 106 篇 中文
检索条件"机构=Institute for Cryptology and Network Security"
1333 条 记 录,以下是1-10 订阅
排序:
DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 645-674页
作者: Chunhui Li Xiaoying Wang Qingjie Zhang Jiaye Liang Aijing Zhang School of Information Engineering Institute of Disaster PreventionLangfang065201China Langfang Key Laboratory of network Emergency Protection and network security Langfang065201China
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1129-1150页
作者: Shijie Tang Yong Ding Huiyong Wang School of Computer Science and Information security Guilin University of Electronic TechnologyGuilin541004China School of Electronic Engineering and Automation Guilin University of Electronic TechnologyGuilin541004China Guangxi Engineering Research Center of Industrial Internet security and Blockchain Guilin University of Electronic TechnologyGuilin541004China institute of Cyberspace Technology HKCT Institute for Higher EducationHong Kong999077China School of Mathematics&Computing Science Guilin University of Electronic TechnologyGuilin541004China
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Linear complexity of quaternary sequences with odd period and low autocorrelation
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2014年 第5期21卷 89-93页
作者: KE Pin-hui LIN Chang-lu ZHANG Sheng-yuan Fujian Provincial Key Laboratory of network security and cryptology Fujian Normal University
Equivalence between two classes of quaternary sequences with odd period and best known autocorrelation are proved. A lower bound on the linear complexity of these sequences is presented. It is shown that the quaternar... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Diagnosability of the Incomplete Star Graphs
收藏 引用
Tsinghua Science and Technology 2007年 第S1期12卷 105-109页
作者: 郑淑霞 周书明 Key Laboratory of network security and cryptology Fujian Normal University
The growing size of the multiprocessor systems increases their vulnerability to component failures. It is crucial to local and to replace the fault processors to maintain system’s high reliability. The fault diagnosi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An improved Durandal signature scheme
收藏 引用
Science China(Information Sciences) 2020年 第3期63卷 140-155页
作者: Yongcheng SONG Xinyi HUANG Yi MU Wei WU Fujian Provincial Key Laboratory of network security and cryptology College of Mathematics and InformaticsFujian Normal University
Constructing secure and effective code-based signature schemes has been an open problem. In this paper, we efficiently reduce the key size of the Durandal signature scheme introduced by Aragon et al.(EUROCRYPT 2019). ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Frequency hopping sequences based on d-form functions
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第4期17卷 58-62页
作者: KE Pin-hui,ZHANG Sheng-yuan Key Laboratory of network security and cryptology,Fujian Normal University,Fuzhou 350007,China [a] Key Laboratory of network security cryptology Fujian Normal University Fuzhou 350007 China
By using d-form function, a new construction of frequency hopping sequence with optimal Hamming correlation is presented in this article, which generalizes the results presented by Ding (2007). Furthermore, a new cl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Constructions of vector output Boolean functions with high generalized nonlinearity
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2008年 第2期15卷 77-81页
作者: KE Pin-hui ZHANG Sheng-yuan Key Laboratory of network security and cryptology Fujian Normal UniversityFujian 350007 China
Carlet et al. recently introduced generalized nonlinearity to measure the ability to resist the improved correlation attack of a vector output Boolean function. This article presents a construction of vector output Bo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On the Cross-Correlation Distribution of d-Ary Generalized Legendre-Sidelnikov Sequences
收藏 引用
Chinese Journal of Electronics 2018年 第2期27卷 287-291页
作者: KE Pinhui YE Zhifan ZHANG Shengyuan CHANG Zuling Fujian Provincial Key Laboratory of network security and cryptology Fujian Normal University School of Mathematics and Statistics Zhengzhou University
The cross-correlation distribution of constant multiple sequences of the d-ary generalized LegendreSidelnikov sequences is investigated via character sums. An upper on the cross-correlation values of the sequences is ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Semi-quantum protocol for cardinalities of private set intersection and union based on GHZ states
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第4期29卷 69-76,105页
作者: Zhang Long Wang Weijian Zhang Kejia School of Mathematical Science Heilongjiang UniversityHarbin 150080China institute for cryptology and network security Heilongjiang UniversityHarbin 150080China
In modern society,it is necessary to perform some secure computations for private sets between different *** instance,two merchants desire to calculate the number of common customers and the total number of users with... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
On the Error Linear Complexity Spectrum of Binary Sequences with Period of Power of Two
收藏 引用
Chinese Journal of Electronics 2015年 第2期24卷 366-372页
作者: CHANG Zuling KE Pinhui School of Mathematics and Statistics Zhengzhou University Fujian Provincial Key Laboratory of network security and cryptology Fujian Normal University
The properties of error linear complexity of binary sequences with period of power of two are studied in this paper. Using the Games-Chan algorithm as main tool, accurate formulas of the minimum value k for which the ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论