咨询与建议

限定检索结果

文献类型

  • 1,849 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 1,924 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,794 篇 工学
    • 1,120 篇 计算机科学与技术...
    • 880 篇 信息与通信工程
    • 822 篇 电子科学与技术(可...
    • 779 篇 电气工程
    • 635 篇 网络空间安全
    • 453 篇 材料科学与工程(可...
    • 388 篇 控制科学与工程
    • 331 篇 仪器科学与技术
    • 317 篇 软件工程
    • 218 篇 机械工程
    • 162 篇 生物医学工程(可授...
    • 132 篇 力学(可授工学、理...
    • 96 篇 光学工程
    • 68 篇 动力工程及工程热...
    • 56 篇 生物工程
    • 36 篇 化学工程与技术
    • 33 篇 航空宇航科学与技...
    • 29 篇 交通运输工程
    • 29 篇 环境科学与工程(可...
  • 887 篇 理学
    • 455 篇 数学
    • 350 篇 物理学
    • 160 篇 天文学
    • 79 篇 生物学
    • 48 篇 系统科学
    • 40 篇 化学
  • 327 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 129 篇 图书情报与档案管...
  • 193 篇 军事学
    • 191 篇 军队指挥学
  • 70 篇 医学
    • 55 篇 临床医学
  • 40 篇 艺术学
    • 39 篇 设计学(可授艺术学...
  • 34 篇 农学
  • 22 篇 法学
  • 20 篇 经济学
  • 17 篇 文学
  • 11 篇 教育学
  • 1 篇 历史学

主题

  • 94 篇 security
  • 64 篇 blockchain
  • 42 篇 cryptography
  • 40 篇 deep learning
  • 38 篇 authentication
  • 33 篇 physical layer s...
  • 33 篇 network coding
  • 33 篇 quantum
  • 32 篇 communication
  • 28 篇 encryption
  • 27 篇 internet of thin...
  • 25 篇 coding
  • 25 篇 machine learning
  • 22 篇 iot
  • 22 篇 privacy
  • 21 篇 quantum cryptogr...
  • 20 篇 quantum secure d...
  • 20 篇 cloud computing
  • 19 篇 quantum key dist...
  • 18 篇 key

机构

  • 27 篇 state key labora...
  • 18 篇 information secu...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 15 篇 national mobile ...
  • 14 篇 state key labora...
  • 13 篇 information secu...
  • 12 篇 school of inform...
  • 12 篇 state key labora...
  • 11 篇 data assurance a...
  • 11 篇 university of ch...
  • 11 篇 school of inform...
  • 10 篇 state key labora...
  • 10 篇 school of cybers...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 communication re...
  • 9 篇 state key labora...
  • 9 篇 ieee
  • 9 篇 school of commun...

作者

  • 17 篇 tie jun cui
  • 11 篇 温巧燕
  • 11 篇 qiang cheng
  • 11 篇 gang xu
  • 10 篇 曾贵华
  • 9 篇 chen chen
  • 9 篇 xiu-bo chen
  • 9 篇 shi jin
  • 9 篇 shibin zhang
  • 8 篇 jin wang
  • 8 篇 liuguo yin
  • 8 篇 wei wang
  • 8 篇 xiao ma
  • 7 篇 yan chang
  • 7 篇 邓富国
  • 7 篇 xiaoniu yang
  • 7 篇 袁建国
  • 7 篇 muhammad shafiq
  • 7 篇 walid el-shafai
  • 7 篇 hui li

语言

  • 1,779 篇 英文
  • 145 篇 中文
检索条件"机构=Laboratory of Coding and Communication Security"
1924 条 记 录,以下是1-10 订阅
排序:
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 221-239页
作者: Xiaoyan HU Zheng WAN Kaizhi HUANG Liang JIN Mengyao YAN Yajun CHEN Jinmei YANG Information Engineering University Purple Mountain Laboratories for Network and communication security
This paper proposes a novel modulated symbols-based one-time pad(SOTP) secure transmission scheme using physical layer *** classical physical layer key generation and exclusive OR(XOR)encryption in the discrete binary... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Spatial Distribution Feature Extraction Network for Open Set Recognition of Electromagnetic Signal
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 279-296页
作者: Hui Zhang Huaji Zhou Li Wang Feng Zhou The Ministry Key laboratory of Electronic Information Countermeasure and Simulation Xidian UniversityXi’an710071China Science and Technology on communication Information security Control laboratory Jiaxing314033China
This paper proposes a novel open set recognition method,the Spatial Distribution Feature Extraction Network(SDFEN),to address the problem of electromagnetic signal recognition in an open *** spatial distribution featu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Distributed Self-Tallying Electronic Voting System Using the Smart Contract
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 1063-1076页
作者: Jingyu YAO Bo YANG Tao WANG Wenzheng ZHANG School of Computer Science Shaanxi Normal University State Key laboratory of Integrated Services Networks Xidian University Science and Technology on communication security laboratory
For electronic voting(e-voting) with a trusted authority, the ballots may be discarded or tampered, so it is attractive to eliminate the dependence on the trusted party. An e-voting protocol, where the final voting re... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Robust textile-based spoof plasmonic frequency scanning antenna for on-body IoT applications
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 269-284页
作者: Zhao-Min CHEN Jun-Lin ZHAN Hao CHEN Ya LI Hongjun HE Wu YANG Zhen-Guo LIU Wei-Bing LU State Key Lab of Millimeter Waves School of Information Science and EngineeringSoutheast University Center for Flexible RF Technology Frontiers Science Center for Mobile Information Communication and SecuritySoutheast University Future Research laboratory China Mobile Research Institute Purple Mountain Laboratories
Securing a comfortable, wearable compact frequency beam scanning antenna(FBSA) with robustness to deformation, low specific absorption rate(SAR), and good coverage of the surrounding environment for Internet of Things... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Precise region semantics-assisted GAN for pose-guided person image generation
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第3期9卷 665-678页
作者: Ji Liu Zhenyu Weng Yuesheng Zhu communication and Information security Lab Shenzhen Graduate SchoolPeking UniversityShenzhenChina School of Electrical and Electronic Engineering Nanyang Technological UniversitySingaporeSingapore
Generating a realistic person's image from one source pose conditioned on another different target pose is a promising computer vision *** previous mainstream methods mainly focus on exploring the transformation relat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Review of Intelligent Configuration and Its security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第04期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on communication security laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(Information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key laboratory of Network security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key laboratory for Network Computing and security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security proble... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Research on Site Planning of Mobile communication Network
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3243-3261页
作者: Jiahan He Guangjun Liang Meng Li KefanYao Bixia Wang Lu Li Department of Computer Information and Cyber security Jiangsu Police InstituteNanjing210000China Engineering Research Center of Electronic Data Forensics Analysis Nanjing210000China Key laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjing210000China Basic Course Teaching and Research Department Jiangsu Police InstituteNanjing210000China communication and Signal College Nanjing Railway Vocational and TechnicalNanjing210000China
In this paper,considering the cost of base station,coverage,call quality,and other practical factors,a multi-objective optimal site planning scheme is ***,based on practical needs,mathematical modeling methods were us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Randomization Strategies in Image Steganography Techniques:A Review
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3139-3171页
作者: AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan Center for Cyber security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)BangiSelangor43600Malaysia Department of Information and communication Engineering Pabna University of Science and TechnologyPabna6600Bangladesh
Image steganography is one of the prominent technologies in data hiding *** system performance mostly depends on the embedding *** goal is to embed strictly confidential information into images without causing percept... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论