咨询与建议

限定检索结果

文献类型

  • 5,837 篇 期刊文献
  • 228 篇 会议

馆藏范围

  • 6,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,173 篇 工学
    • 1,814 篇 计算机科学与技术...
    • 1,067 篇 电气工程
    • 817 篇 信息与通信工程
    • 770 篇 材料科学与工程(可...
    • 651 篇 电子科学与技术(可...
    • 618 篇 环境科学与工程(可...
    • 585 篇 网络空间安全
    • 544 篇 控制科学与工程
    • 388 篇 机械工程
    • 255 篇 仪器科学与技术
    • 247 篇 动力工程及工程热...
    • 244 篇 水利工程
    • 232 篇 软件工程
    • 224 篇 生物医学工程(可授...
    • 215 篇 力学(可授工学、理...
    • 193 篇 化学工程与技术
  • 2,715 篇 理学
    • 764 篇 数学
    • 684 篇 生物学
    • 540 篇 物理学
    • 441 篇 化学
    • 330 篇 生态学
    • 308 篇 天文学
    • 272 篇 地球物理学
    • 214 篇 大气科学
    • 207 篇 地理学
  • 705 篇 法学
    • 402 篇 政治学
    • 195 篇 社会学
  • 694 篇 农学
    • 361 篇 作物学
  • 620 篇 医学
    • 393 篇 临床医学
  • 522 篇 经济学
    • 454 篇 应用经济学
  • 397 篇 管理学
  • 78 篇 教育学
  • 58 篇 文学
  • 34 篇 军事学
  • 16 篇 历史学
  • 15 篇 艺术学
  • 6 篇 哲学

主题

  • 180 篇 security
  • 113 篇 中国
  • 89 篇 blockchain
  • 73 篇 deep learning
  • 58 篇 and
  • 54 篇 food security
  • 50 篇 china
  • 43 篇 internet of thin...
  • 43 篇 cryptography
  • 42 篇 privacy
  • 36 篇 system
  • 35 篇 rice
  • 35 篇 climate change
  • 34 篇 network
  • 34 篇 model
  • 34 篇 cooperation
  • 29 篇 policy
  • 28 篇 analysis
  • 28 篇 soil
  • 27 篇 iot

机构

  • 119 篇 shanghai institu...
  • 108 篇 university of ch...
  • 85 篇 state key labora...
  • 42 篇 university of ch...
  • 30 篇 state key labora...
  • 29 篇 institute of geo...
  • 29 篇 ieee
  • 29 篇 school of cyber ...
  • 28 篇 school of cyber ...
  • 28 篇 school of cyber ...
  • 22 篇 china institute ...
  • 20 篇 department of co...
  • 20 篇 middle east stud...
  • 18 篇 institute of inf...
  • 18 篇 center of excell...
  • 16 篇 institute of geo...
  • 16 篇 cyberspace insti...
  • 16 篇 college of resou...
  • 15 篇 institute of geo...
  • 15 篇 middle east stud...

作者

  • 16 篇 dhanushka n.wana...
  • 15 篇 lin dongdai
  • 15 篇 rui zhang
  • 14 篇 kevin d.hyde
  • 14 篇 wei wang
  • 13 篇 yu zhang
  • 13 篇 bo wang
  • 12 篇 jian wang
  • 12 篇 wei huang
  • 11 篇 mingkwan doilom
  • 11 篇 lin ma
  • 11 篇 chayanard phukha...
  • 11 篇 hua zhang
  • 11 篇 lei wang
  • 11 篇 pinjing he
  • 11 篇 wei li
  • 10 篇 hu lei
  • 10 篇 xiaohu dai
  • 10 篇 鲍皖苏
  • 10 篇 jianchu xu

语言

  • 5,518 篇 英文
  • 547 篇 中文
检索条件"机构=Institute of Cyberspace Security"
6065 条 记 录,以下是1-10 订阅
排序:
A Generalized MSST Algorithm for Counting Points of Elliptic Curves over■
收藏 引用
Journal of Systems Science & Complexity 2024年 第4期37卷 1738-1754页
作者: LI Xiao LV Chang PAN Zhizhong Key Laboratory of cyberspace security Defense Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences Huawei Technologies Co. Ltd.
Elliptic curve cryptography is an important part of nowaday's public key cryptosystem.Counting points of elliptic curves over finite fields is of great significance to the selection of safety curves.At present, there ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Label-Aware Chinese Event Detection with Heterogeneous Graph Attention Network
收藏 引用
Journal of Computer Science & Technology 2024年 第1期39卷 227-242页
作者: 崔诗尧 郁博文 从鑫 柳厅文 谭庆丰 时金桥 institute of Information Engineering Chinese Academy of SciencesBeijing 100190China School of Cyber security University of Chinese Academy of SciencesBeijing 100049China cyberspace institute of Advanced Technology Guangzhou UniversityGuangzhou 510006China School of Cyber security Beijing University of Posts and TelecommunicationsBeijing 100088China
Event detection(ED)seeks to recognize event triggers and classify them into the predefined event types.Chinese ED is formulated as a character-level task owing to the uncertain word boundaries.Prior methods try to inc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Spatiotemporal Prediction of Urban Traffics Based on Deep GNN
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 265-282页
作者: Ming Luo Huili Dou Ning Zheng School of Computer Science Hangzhou Dianzi UniversityHangzhou310018China Zhejiang institute of Communications Hangzhou310012China School of cyberspace security Hangzhou Dianzi UniversityHangzhou310018China
Traffic prediction already plays a significant role in applications like traffic planning and urban management,but it is still difficult to capture the highly non-linear and complicated spatiotemporal correlations of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1881-1895页
作者: Xiao Feng Zheng Yuan Cyber security Academy Beijing University of Posts and TelecommunicationsBeijing100876China Department of cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China State Grid Info-Telecom Great Power Science and Technology Co. Ltd.Beijing102211China
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of Information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher algorithms.It generated many excellent results for some ciphers,for example,Salsa20.I... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
FMSA:a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems
收藏 引用
Cybersecurity 2024年 第1期7卷 110-121页
作者: Kaisheng Fan Weizhe Zhang Guangrui Liu Hui He School of cyberspace Science Harbin Institute of TechnologyHarbin 150001China Department of New Networks Peng Cheng LaboratoryShenzhen 518055GuangdongChina
Intrusion detection systems are increasingly using machine learning.While machine learning has shown excellent performance in identifying malicious traffic,it may increase the risk of privacy leakage.This paper focuse... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu State Key Laboratory of Information security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hydrologic Response to Future Climate Change in the Dulong-Irra-waddy River Basin Based on Coupled Model Intercomparison Project 6
收藏 引用
Chinese Geographical Science 2024年 第2期34卷 294-310页
作者: XU Ziyue MA Kai YUAN Xu HE Daming institute of International Rivers and Eco-security Yunnan UniversityKunming 650500China Yunnan Key Laboratory of International Rivers and Transboundary Eco-security Kunming 650500China
Within the context of the Belt and Road Initiative(BRI)and the China-Myanmar Economic Corridor(CMEC),the Dulong-Ir-rawaddy(Ayeyarwady)River,an international river among China,India and Myanmar,plays a significant role... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
security estimation of LWE via BKW algorithms
收藏 引用
Cybersecurity 2024年 第1期7卷 71-87页
作者: Yu Wei Lei Bi Xianhui Lu Kunpeng Wang SKLOIS Institute of Information EngineeringCASBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
The Learning With Errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography direction.There are a variety of LWE-solving methods,which can be classified into... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Review of Intelligent Configuration and Its security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University cyberspace institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
来源: 同方期刊数据库 同方期刊数据库 评论