咨询与建议

限定检索结果

文献类型

  • 5,504 篇 期刊文献
  • 188 篇 会议

馆藏范围

  • 5,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,011 篇 工学
    • 1,171 篇 计算机科学与技术...
    • 923 篇 网络空间安全
    • 460 篇 电子科学与技术(可...
    • 421 篇 软件工程
    • 370 篇 仪器科学与技术
    • 363 篇 信息与通信工程
    • 345 篇 控制科学与工程
    • 299 篇 电气工程
    • 298 篇 机械工程
    • 269 篇 材料科学与工程(可...
    • 249 篇 化学工程与技术
    • 182 篇 环境科学与工程(可...
    • 140 篇 水利工程
    • 120 篇 土木工程
    • 114 篇 光学工程
    • 100 篇 农业工程
    • 99 篇 交通运输工程
  • 1,549 篇 理学
    • 423 篇 物理学
    • 404 篇 数学
    • 153 篇 生态学
    • 141 篇 生物学
    • 139 篇 化学
    • 116 篇 大气科学
  • 596 篇 管理学
    • 446 篇 管理科学与工程(可...
    • 92 篇 公共管理
  • 546 篇 农学
    • 211 篇 农业资源与环境
    • 184 篇 作物学
  • 362 篇 军事学
    • 360 篇 军队指挥学
  • 279 篇 医学
    • 165 篇 临床医学
  • 119 篇 经济学
    • 109 篇 应用经济学
  • 78 篇 法学
  • 63 篇 艺术学
  • 22 篇 文学
  • 20 篇 教育学
  • 12 篇 历史学
  • 1 篇 哲学

主题

  • 134 篇 security
  • 98 篇 blockchain
  • 71 篇 china
  • 68 篇 deep learning
  • 50 篇 food security
  • 49 篇 authentication
  • 43 篇 quantum
  • 42 篇 cryptography
  • 38 篇 information secu...
  • 37 篇 cryptanalysis
  • 35 篇 physical layer s...
  • 35 篇 machine learning
  • 33 篇 privacy protecti...
  • 31 篇 network
  • 30 篇 system
  • 30 篇 quantum key dist...
  • 30 篇 climate change
  • 27 篇 internet of thin...
  • 26 篇 analysis
  • 26 篇 key

机构

  • 113 篇 university of ch...
  • 112 篇 shanghai institu...
  • 90 篇 state key labora...
  • 43 篇 information secu...
  • 37 篇 university of ch...
  • 34 篇 state key labora...
  • 33 篇 ieee
  • 31 篇 state key labora...
  • 29 篇 key laboratory o...
  • 28 篇 school of cyber ...
  • 28 篇 state key labora...
  • 27 篇 information secu...
  • 25 篇 state key labora...
  • 24 篇 school of cyber ...
  • 23 篇 school of cybers...
  • 22 篇 state key labora...
  • 22 篇 key laboratory o...
  • 20 篇 school of cyber ...
  • 20 篇 department of co...
  • 19 篇 college of under...

作者

  • 25 篇 xiu-bo chen
  • 25 篇 温巧燕
  • 23 篇 hui li
  • 21 篇 wei li
  • 17 篇 yang yang
  • 17 篇 zhang huanguo
  • 17 篇 du xiuli
  • 17 篇 hu yupu
  • 16 篇 chao wang
  • 16 篇 ruijin liao
  • 16 篇 fusuo zhang
  • 14 篇 jian wang
  • 14 篇 xin liu
  • 14 篇 pengfei li
  • 14 篇 李宏伟
  • 14 篇 lin dongdai
  • 14 篇 xiubo chen
  • 14 篇 lei zhang
  • 13 篇 lei wang
  • 13 篇 li li

语言

  • 5,111 篇 英文
  • 581 篇 中文
检索条件"机构=Key Laboratory of Ministry of Public Security for Road Traffic Safety"
5692 条 记 录,以下是1-10 订阅
排序:
Driver injury severity analysis of crashes in a western China’s rural mountainous county:Taking crash compatibility difference into consideration
收藏 引用
Journal of traffic and Transportation Engineering(English Edition) 2021年 第5期8卷 703-714页
作者: Liyang Wang Ruimin Li Changjun Wang Zhiyong Liu key laboratory of the ministry of public security for road traffic safety Ministry of Public SecurityWuxi 214151China traffic Management Research Institute of the ministry of public security Wuxi 214151China Institute of Transportation Engineering Department of Civil EngineeringTsinghua UniversityBeijing 100084China
China’s traffic safety attracts increasing research *** data show that crashes in the western region of China are more severe than those in the eastern ***,research on crash severity in western China is *** study app... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An efficient quantum proactive incremental learning algorithm
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第1期Mechanics & Astronomy) .卷 49-57页
作者: Lingxiao Li Jing Li Yanqi Song Sujuan Qin Qiaoyan Wen Fei Gao State key laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications School of Cyberspace security Beijing University of Posts and Telecommunications
In scenarios where a large amount of data needs to be learned, incremental learning can make full use of old knowledge, significantly reduce the computational cost of the overall learning process, and maintain high pe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Electrocatalytic cleavage of a lignin β-O-4 model compound and coupling with nitrogen-containing aromatics using Prussian blue analogue-derived nickel–cobalt spinel
收藏 引用
Journal of Energy Chemistry 2025年 第1期100卷 628-636页
作者: Yi Qi Xueying Chen Bowen Liu Xuliang Lin Xueqing Qiu Yanlin Qin Guangdong Provincial key laboratory of Plant Resources Biorefinery School of Chemical Engineering and Light Industry Guangdong University of Technology Guangdong Provincial laboratory of Chemistry and Fine Chemical Engineering Jieyang Center Guangdong Basic Research Center of Excellence for Ecological security and Green Development Guangdong University of Technology
Electrochemical conversion of lignin for the production of high-value heterocyclic aromatic compounds has great *** demonstrate the targeted synthesis and cation modulation of NiCo2O4spinel nanoboxes,synthesized via c... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient and Practical public key Cryptosystem with CCA-security on Standard Model
收藏 引用
Tsinghua Science and Technology 2014年 第5期19卷 486-495页
作者: Zhen Liu Xiaoyuan Yang Weidong Zhong Yiliang Han Department of Network and Information security key laboratory Engineering University of the Armed PoliceForce
Chosen Ciphertext Attack (CCA) security on the standard model is widely accepted as the standard security notion for the public key cryptosystem. The existing CCA-secure public key cryptosystems on the standard mode... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
key Management for Outsourced Data security
收藏 引用
Wuhan University Journal of Natural Sciences 2014年 第5期19卷 449-454页
作者: PEI Bei CHEN Changsong WAN Changsheng The Third Research Institute of ministry of public security School of Information Science and Engineering Southeast University
This paper analyzes the efficiency and security of bi- linear-map-based schemes and brings about an AAA based publicly auditable scheme for cloud computing, which is much more efficient. In this scheme, a trust model ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on theory and key technology of trusted computing platform security testing and evaluation
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 434-453页
作者: ZHANG HuanGuo1,2, YAN Fei1,2, FU JianMing1,2, XU MingDi1,2, YANG Yang1,2, HE Fan1,2 & ZHAN Jing1,2 1School of Computer, Wuhan University, Wuhan 430072, China 2key laboratory of Aerospace Information security and Trusted Computing, ministry of Education, Wuhan 430072, China 1. School of Computer Wuhan University Wuhan 430072 China2. Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 China
Trusted computing has become a new trend in the area of international information security, and the products of trusted computing platform begin to be used in application. Users will not use the products of informatio... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Chinese Cyber Threat Intelligence Named Entity Recognition via RoBERTa-wwm-RDCNN-CRF
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 299-323页
作者: Zhen Zhen Jian Gao School of Information Network security People’s Public Security University of ChinaBeijing100038China key laboratory of safety Precautions and Risk Assessment Ministry of Public SecurityBeijing102623China
In recent years,cyber attacks have been intensifying and causing great harm to individuals,companies,and *** mining of cyber threat intelligence(CTI)can facilitate intelligence integration and serve well in combating ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A New Method for Estimating Lithium‑Ion Battery State‑of‑Energy Based on Multi‑timescale Filter
收藏 引用
Automotive Innovation 2023年 第4期6卷 611-621页
作者: Guangming Zhao Wei Xu Yifan Wang road traffic safety Research Center of the ministry of public security Beijing 100068China China Automotive Engineering Research Institute Co. LtdChongqing 401120China
Accurate estimation of the state-of-energy(SOE)in lithium-ion batteries is critical for optimal energy management and energy optimization in electric ***,the conventional recursive least squares(RLS)algorithm struggle... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fine Grained Feature Extraction Model of Riot-related Images Based on YOLOv5
收藏 引用
Computer Systems Science & Engineering 2023年 第4期45卷 85-97页
作者: Shaofan Su Deyu Yuan Yuanxin Wang Meng Ding Department of Information Cyber security People’s Public Security University of ChinaBeijing100038China key laboratory of safety Precautions and Risk Assessment Ministry of Public SecurityBeijing102623China public security Behavioral Science laboratory People’s Public Security University of ChinaBeijing102623China
With the rapid development of Internet technology,the type of information in the Internet is extremely complex,and a large number of riot contents containing bloody,violent and riotous components have *** contents pos... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SensFL:Privacy-Preserving Vertical Federated Learning with Sensitive Regularization
收藏 引用
Computer Modeling in Engineering & Sciences 2025年 第1期142卷 385-404页
作者: Chongzhen Zhang Zhichen Liu Xiangrui Xu Fuqiang Hu Jiao Dai Baigen Cai Wei Wang School of Automation and Intelligence Beijing Jiaotong UniversityBeijing100044China Shuohuang Railway Development Co. Ltd.National Energy GroupCangzhou062350China Beijing key laboratory of security and Privacy in Intelligent Transportation School of Computer Science and TechnologyBeijing Jiaotong UniversityBeijing100044China
In the realm of Intelligent Railway Transportation Systems,effective multi-party collaboration is crucial due to concerns over privacy and data *** Federated Learning(VFL)has emerged as a promising approach to facilit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论