咨询与建议

限定检索结果

文献类型

  • 186,011 篇 期刊文献
  • 11,234 篇 会议
  • 9 册 图书

馆藏范围

  • 197,254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 126,557 篇 工学
    • 49,511 篇 材料科学与工程(可...
    • 26,612 篇 化学工程与技术
    • 18,107 篇 电气工程
    • 17,088 篇 计算机科学与技术...
    • 16,098 篇 电子科学与技术(可...
    • 15,965 篇 机械工程
    • 15,311 篇 环境科学与工程(可...
    • 11,447 篇 力学(可授工学、理...
    • 10,542 篇 水利工程
    • 10,420 篇 动力工程及工程热...
    • 9,839 篇 地质资源与地质工...
    • 9,486 篇 控制科学与工程
    • 9,186 篇 冶金工程
    • 8,932 篇 信息与通信工程
    • 7,654 篇 仪器科学与技术
    • 7,395 篇 生物医学工程(可授...
  • 121,282 篇 理学
    • 37,509 篇 化学
    • 35,462 篇 物理学
    • 34,603 篇 生物学
    • 16,150 篇 天文学
    • 14,593 篇 地球物理学
    • 11,689 篇 地质学
    • 10,519 篇 数学
    • 8,752 篇 大气科学
    • 8,480 篇 生态学
    • 7,435 篇 海洋科学
  • 47,170 篇 医学
    • 35,089 篇 临床医学
    • 11,784 篇 基础医学(可授医学...
    • 7,413 篇 公共卫生与预防医...
  • 30,425 篇 农学
    • 13,369 篇 作物学
  • 9,707 篇 管理学
  • 4,670 篇 经济学
  • 3,676 篇 法学
  • 2,094 篇 教育学
  • 1,354 篇 文学
  • 818 篇 艺术学
  • 515 篇 军事学
  • 507 篇 历史学
  • 200 篇 哲学

主题

  • 1,831 篇 china
  • 1,287 篇 microstructure
  • 1,282 篇 of
  • 1,124 篇 and
  • 1,078 篇 cancer
  • 813 篇 analysis
  • 794 篇 model
  • 773 篇 rice
  • 750 篇 mechanical prope...
  • 708 篇 climate change
  • 659 篇 rare earths
  • 648 篇 simulation
  • 636 篇 deep learning
  • 629 篇 numerical simula...
  • 559 篇 temperature
  • 551 篇 machine learning
  • 546 篇 apoptosis
  • 517 篇 structure
  • 486 篇 stability
  • 466 篇 in

机构

  • 5,310 篇 university of ch...
  • 2,057 篇 university of ch...
  • 462 篇 graduate univers...
  • 391 篇 graduate univers...
  • 379 篇 center of materi...
  • 341 篇 beijing national...
  • 320 篇 shenyang nationa...
  • 312 篇 institute of met...
  • 294 篇 songshan lake ma...
  • 287 篇 institute of geo...
  • 216 篇 school of materi...
  • 190 篇 institute of geo...
  • 189 篇 school of physic...
  • 178 篇 state key labora...
  • 176 篇 institute of hig...
  • 153 篇 institute of geo...
  • 153 篇 ieee
  • 146 篇 university of ch...
  • 140 篇 university of th...
  • 140 篇 beijing national...

作者

  • 508 篇 wei wang
  • 484 篇 wei li
  • 418 篇 wei zhang
  • 341 篇 lei wang
  • 334 篇 yang liu
  • 326 篇 jing wang
  • 301 篇 li li
  • 298 篇 lei zhang
  • 293 篇 yang yang
  • 270 篇 yu zhang
  • 266 篇 wei chen
  • 253 篇 wei liu
  • 244 篇 xin li
  • 240 篇 jing li
  • 235 篇 yan li
  • 223 篇 yan zhang
  • 216 篇 wei huang
  • 209 篇 jun wang
  • 207 篇 hui wang
  • 204 篇 yu wang

语言

  • 190,145 篇 英文
  • 7,105 篇 中文
  • 4 篇 法文
检索条件"机构=Institute for Cyber Enabled Research"
197254 条 记 录,以下是1-10 订阅
排序:
Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1731-1754页
作者: Bin Luo Liangguo Chen Shuhua Ruan Yonggang Luo School of cyber Science and Engineering Sichuan UniversityChengdu610065China Key Laboratory of Data Protection and Intelligent Management(Sichuan University) Ministry of EducationChengdu610065China cyber Science research institute Sichuan UniversityChengdu610065China
Considering the stealthiness and persistence of Advanced Persistent Threats(APTs),system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a ***-b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Unified Model Fusing Region of Interest Detection and Super Resolution for Video Compression
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 3955-3975页
作者: Xinkun Tang Feng Ouyang Ying Xu Ligu Zhu Bo Peng School of Computer and cyber Sciences Communication University of ChinaBeijing100024China Cable Television Technology research institute Academy of Broadcasting ScienceBeijing100866China
High-resolution video transmission requires a substantial amount of *** this paper,we present a novel video processing methodology that innovatively integrates region of interest(ROI)identification and super-resolutio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Label-Aware Chinese Event Detection with Heterogeneous Graph Attention Network
收藏 引用
Journal of Computer Science & Technology 2024年 第1期39卷 227-242页
作者: 崔诗尧 郁博文 从鑫 柳厅文 谭庆丰 时金桥 institute of Information Engineering Chinese Academy of SciencesBeijing 100190China School of cyber Security University of Chinese Academy of SciencesBeijing 100049China cyberspace institute of Advanced Technology Guangzhou UniversityGuangzhou 510006China School of cyber Security Beijing University of Posts and TelecommunicationsBeijing 100088China
Event detection(ED)seeks to recognize event triggers and classify them into the predefined event *** ED is formulated as a character-level task owing to the uncertain word *** methods try to incorpo-rate word-level in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A game-theoretic approach for federated learning:A trade-off among privacy,accuracy and energy
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 389-403页
作者: Lihua Yin Sixin Lin Zhe Sun Ran Li Yuanyuan He Zhiqiang Hao cyberspace institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China China Industrial Control Systems cyber Emergency Response Team Beijing100040China
Benefiting from the development of Federated Learning(FL)and distributed communication systems,large-scale intelligent applications become *** devices not only provide adequate training data,but also cause privacy lea... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG institute of Information Engineering Chinese Academy of Sciences School of cyber Security University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Strengthening Network Security: Deep Learning Models for Intrusion Detectionwith Optimized Feature Subset and Effective Imbalance Handling
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1995-2022页
作者: Bayi Xu Lei Sun Xiuqing Mao Chengwei Liu Zhiyi Ding School of cyber Science and Engineering Zhengzhou UniversityZhengzhou450000China Three Academy Information Engineering UniversityZhengzhou450001China The 3rd research Department Nanjing Research Institute of Electronic EngineeringNanjing210007China
In recent years,frequent network attacks have highlighted the importance of efficient detection methods for ensuring cyberspace *** paper presents a novel intrusion detection system consisting of a data prepro-cessing... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences School of cyber Security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research,w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 308-309页
作者: Lisha YAO Lin HOU Jian WENG Feixiang ZHAO College of cyber Security Jinan University
A public-key authenticated encryption with keyword search(PAEKS)[1, 2] system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token. This...
来源: 同方期刊数据库 同方期刊数据库 评论
Security estimation of LWE via BKW algorithms
收藏 引用
cybersecurity 2024年 第1期7卷 71-87页
作者: Yu Wei Lei Bi Xianhui Lu Kunpeng Wang SKLOIS Institute of Information EngineeringCASBeijingChina School of cyber Security University of Chinese Academy of SciencesBeijingChina
The Learning With Errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography *** are a variety of LWE-solving methods,which can be classified into four groups... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A survey on blockchain-enabled federated learning and its prospects with digital twin
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 248-264页
作者: Kangde Liu Zheng Yan Xueqin Liang Raimo Kantola Chuangyue Hu State Key Lab on Integrated Services Network School of Cyber EngineeringXidian UniversityXi'anChina Department of Communications and Networking Aalto UniversityEspooFinland Yangtze Delta Region Blockchain Technology research institute JiaxingChina
Digital Twin(DT)supports real time analysis and provides a reliable simulation platform in the Internet of Things(IoT).The creation and application of DT hinges on amounts of data,which poses pressure on the applicati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论