咨询与建议

限定检索结果

文献类型

  • 45,250 篇 期刊文献
  • 3,391 篇 会议
  • 2 册 图书

馆藏范围

  • 48,643 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33,887 篇 工学
    • 12,469 篇 计算机科学与技术...
    • 10,442 篇 材料科学与工程(可...
    • 7,801 篇 电气工程
    • 6,028 篇 信息与通信工程
    • 5,965 篇 电子科学与技术(可...
    • 5,011 篇 机械工程
    • 4,676 篇 控制科学与工程
    • 2,643 篇 仪器科学与技术
    • 2,637 篇 环境科学与工程(可...
    • 2,041 篇 网络空间安全
    • 1,893 篇 力学(可授工学、理...
    • 1,832 篇 水利工程
    • 1,728 篇 化学工程与技术
    • 1,725 篇 生物医学工程(可授...
    • 1,659 篇 测绘科学与技术
    • 1,602 篇 动力工程及工程热...
  • 27,301 篇 理学
    • 8,387 篇 物理学
    • 5,654 篇 生物学
    • 5,459 篇 数学
    • 4,795 篇 天文学
    • 4,648 篇 化学
    • 3,207 篇 地球物理学
    • 2,386 篇 大气科学
    • 2,154 篇 地质学
    • 1,711 篇 生态学
    • 1,524 篇 海洋科学
  • 6,710 篇 医学
    • 4,943 篇 临床医学
    • 1,598 篇 基础医学(可授医学...
  • 4,124 篇 农学
    • 1,876 篇 作物学
  • 2,362 篇 管理学
  • 1,846 篇 法学
  • 1,727 篇 经济学
    • 1,560 篇 应用经济学
  • 636 篇 教育学
  • 467 篇 文学
  • 127 篇 艺术学
  • 123 篇 军事学
  • 104 篇 历史学
  • 52 篇 哲学

主题

  • 600 篇 deep learning
  • 399 篇 security
  • 379 篇 machine learning
  • 297 篇 of
  • 293 篇 china
  • 244 篇 analysis
  • 240 篇 中国
  • 205 篇 and
  • 204 篇 system
  • 196 篇 model
  • 174 篇 internet of thin...
  • 172 篇 blockchain
  • 161 篇 information
  • 160 篇 quantum
  • 141 篇 network
  • 131 篇 simulation
  • 119 篇 polarization
  • 119 篇 clustering
  • 116 篇 data
  • 114 篇 remote sensing

机构

  • 1,018 篇 university of ch...
  • 478 篇 university of ch...
  • 141 篇 school of inform...
  • 105 篇 beijing academy ...
  • 79 篇 ieee
  • 75 篇 center of materi...
  • 74 篇 school of inform...
  • 68 篇 collaborative in...
  • 56 篇 school of inform...
  • 50 篇 state key labora...
  • 50 篇 institute of geo...
  • 50 篇 shanghai institu...
  • 46 篇 synergetic innov...
  • 46 篇 school of automa...
  • 44 篇 school of inform...
  • 42 篇 graduate univers...
  • 40 篇 shanghai institu...
  • 39 篇 school of electr...
  • 36 篇 college of infor...
  • 35 篇 songshan lake ma...

作者

  • 65 篇 jing zhang
  • 61 篇 jun wang
  • 60 篇 jun zhang
  • 58 篇 jian wang
  • 58 篇 wei huang
  • 56 篇 ming li
  • 56 篇 wei liu
  • 54 篇 li zhang
  • 47 篇 rui wang
  • 47 篇 wei wang
  • 44 篇 xin liu
  • 43 篇 hui wang
  • 39 篇 yang liu
  • 36 篇 wei li
  • 35 篇 jie yang
  • 32 篇 yu zhang
  • 32 篇 jun li
  • 31 篇 wang lei
  • 31 篇 cheng wang
  • 31 篇 jun xu

语言

  • 43,634 篇 英文
  • 5,009 篇 中文
检索条件"机构=Institute of Medical Information Security"
48643 条 记 录,以下是1-10 订阅
排序:
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU State Key Laboratory of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher algorithms.It generated many excellent results for some ciphers,for example,Salsa20.I... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu State Key Laboratory of information security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are injected.Models trained on the dataset will passively impl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TransTM:A device-free method based on time-streaming multiscale transformer for human activity recognition
收藏 引用
Defence Technology(防务技术) 2024年 第2期32卷 619-628页
作者: Yi Liu Weiqing Huang Shang Jiang Bobai Zhao Shuai Wang Siye Wang Yanfang Zhang institute of information Engineering Chinese Academy of Sciences School of Cyber SecurityUniversity of Chinese Academy of SciencesBeijingChina School of information Management Beijing Information Science and Technology UniversityBeijingChina
RFID-based human activity recognition(HAR)attracts attention due to its convenience,noninvasiveness,and privacy protection.Existing RFID-based HAR methods use modeling,CNN,or LSTM to extract features effectively.Still... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
security estimation of LWE via BKW algorithms
收藏 引用
Cybersecurity 2024年 第1期7卷 71-87页
作者: Yu Wei Lei Bi Xianhui Lu Kunpeng Wang SKLOIS Institute of Information EngineeringCASBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
The Learning With Errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography direction.There are a variety of LWE-solving methods,which can be classified into... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lightweight Res-Connection Multi-Branch Network for Highly Accurate Crowd Counting and Localization
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2105-2122页
作者: Mingze Li Diwen Zheng Shuhua Lu College of information and Cyber security People’s Public Security University of ChinaBeijing102600China
Crowd counting is a promising hotspot of computer vision involving crowd intelligence analysis,achieving tremendous success recently with the development of deep learning.However,there have been stillmany challenges i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
收藏 引用
Science China(information Sciences) 2024年 第1期67卷 221-239页
作者: Xiaoyan HU Zheng WAN Kaizhi HUANG Liang JIN Mengyao YAN Yajun CHEN Jinmei YANG information Engineering University Purple Mountain Laboratories for Network and Communication security
This paper proposes a novel modulated symbols-based one-time pad(SOTP) secure transmission scheme using physical layer keys.Unlike classical physical layer key generation and exclusive OR(XOR)encryption in the discret... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Heterophilic Graph Neural Network Based on Spatial and Frequency Domain Adaptive Embedding Mechanism
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第5期139卷 1701-1731页
作者: Lanze Zhang Yijun Gu Jingjie Peng College of information and Cyber security People’s Public Security University of ChinaBeijing100038China
Graph Neural Networks(GNNs)play a significant role in tasks related to homophilic graphs.Traditional GNNs,based on the assumption of homophily,employ low-pass filters for neighboring nodes to achieve information aggre... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Attention-Enhanced Voice Portrait Model Using Generative Adversarial Network
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 837-855页
作者: Jingyi Mao Yuchen Zhou YifanWang Junyu Li Ziqing Liu Fanliang Bu School of information Network security People’s Public Security University of ChinaBeijing100038China
Voice portrait technology has explored and established the relationship between speakers’ voices and their facialfeatures, aiming to generate corresponding facial characteristics by providing the voice of an unknown ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust adaptive radar beamforming based on iterative training sample selection using kurtosis of generalized inner product statistics
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 24-30页
作者: TIAN Jing ZHANG Wei School of information and Electronics Beijing Institute of TechnologyBeijing 100081China National Key Laboratory of Electromagnetic Space security Chengdu 610036China
In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Generalized MSST Algorithm for Counting Points of Elliptic Curves over■
收藏 引用
Journal of Systems Science & Complexity 2024年 第4期37卷 1738-1754页
作者: LI Xiao LV Chang PAN Zhizhong Key Laboratory of Cyberspace security Defense Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences Huawei Technologies Co. Ltd.
Elliptic curve cryptography is an important part of nowaday's public key cryptosystem.Counting points of elliptic curves over finite fields is of great significance to the selection of safety curves.At present, there ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论