咨询与建议

限定检索结果

文献类型

  • 1,450 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 1,537 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,177 篇 工学
    • 465 篇 计算机科学与技术...
    • 217 篇 网络空间安全
    • 191 篇 软件工程
    • 189 篇 控制科学与工程
    • 188 篇 电子科学与技术(可...
    • 153 篇 仪器科学与技术
    • 144 篇 信息与通信工程
    • 93 篇 机械工程
    • 52 篇 航空宇航科学与技...
    • 51 篇 化学工程与技术
    • 41 篇 电气工程
    • 40 篇 材料科学与工程(可...
    • 33 篇 光学工程
    • 25 篇 地质资源与地质工...
    • 25 篇 交通运输工程
    • 20 篇 水利工程
    • 19 篇 测绘科学与技术
  • 390 篇 理学
    • 100 篇 物理学
    • 83 篇 数学
    • 36 篇 化学
    • 33 篇 地球物理学
    • 32 篇 大气科学
    • 29 篇 天文学
    • 25 篇 系统科学
    • 23 篇 生物学
  • 252 篇 管理学
    • 232 篇 管理科学与工程(可...
  • 74 篇 医学
    • 49 篇 临床医学
  • 74 篇 军事学
    • 72 篇 军队指挥学
  • 51 篇 农学
    • 26 篇 农业资源与环境
  • 44 篇 经济学
    • 41 篇 应用经济学
  • 17 篇 艺术学
  • 16 篇 法学
  • 8 篇 文学
  • 7 篇 教育学

主题

  • 58 篇 deep learning
  • 49 篇 security
  • 40 篇 network
  • 40 篇 machine learning
  • 38 篇 blockchain
  • 23 篇 cloud computing
  • 22 篇 internet of thin...
  • 22 篇 network security
  • 18 篇 convolutional ne...
  • 17 篇 neural network
  • 16 篇 quantum
  • 15 篇 system
  • 14 篇 anomaly detectio...
  • 13 篇 artificial intel...
  • 13 篇 neural
  • 12 篇 analysis
  • 11 篇 physical layer s...
  • 11 篇 cryptography
  • 11 篇 authentication
  • 11 篇 china

机构

  • 38 篇 university of ch...
  • 17 篇 information secu...
  • 15 篇 information secu...
  • 14 篇 national compute...
  • 13 篇 national compute...
  • 10 篇 shanghai astrono...
  • 8 篇 institute of inf...
  • 7 篇 beijing national...
  • 7 篇 national digital...
  • 7 篇 department of el...
  • 7 篇 information secu...
  • 6 篇 national digital...
  • 6 篇 school of comput...
  • 6 篇 ieee
  • 6 篇 university of ch...
  • 6 篇 shanghai institu...
  • 6 篇 jiangsu collabor...
  • 6 篇 center of materi...
  • 6 篇 school of inform...
  • 6 篇 state key labora...

作者

  • 12 篇 xiu-bo chen
  • 10 篇 gang xu
  • 10 篇 taher m.ghazal
  • 8 篇 yuqing zhang
  • 8 篇 wei wang
  • 8 篇 wei li
  • 8 篇 zhiguo qu
  • 7 篇 kaizhi huang
  • 7 篇 yixian yang
  • 7 篇 wang chi
  • 7 篇 xin zhang
  • 7 篇 muhammad adnan k...
  • 7 篇 liang jin
  • 7 篇 yang yi-xian
  • 7 篇 li wang
  • 7 篇 bin li
  • 6 篇 zhang yuqing
  • 6 篇 yu zhang
  • 6 篇 yongjun ren
  • 6 篇 jieren cheng

语言

  • 1,410 篇 英文
  • 127 篇 中文
检索条件"机构=Network Space Security Center"
1537 条 记 录,以下是1-10 订阅
排序:
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 221-239页
作者: Xiaoyan HU Zheng WAN Kaizhi HUANG Liang JIN Mengyao YAN Yajun CHEN Jinmei YANG Information Engineering University Purple Mountain Laboratories for network and Communication security
This paper proposes a novel modulated symbols-based one-time pad(SOTP) secure transmission scheme using physical layer *** classical physical layer key generation and exclusive OR(XOR)encryption in the discrete binary... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Attention-Enhanced Voice Portrait Model Using Generative Adversarial network
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 837-855页
作者: Jingyi Mao Yuchen Zhou YifanWang Junyu Li Ziqing Liu Fanliang Bu School of Information network security People’s Public Security University of ChinaBeijing100038China
Voice portrait technology has explored and established the relationship between speakers’ voices and their facialfeatures, aiming to generate corresponding facial characteristics by providing the voice of an unknown ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Generic attacks on small-state stream cipher constructions in the multi-user setting
收藏 引用
Cybersecurity 2024年 第3期7卷 69-79页
作者: Jianfu Huang Ye Luo Qinggan Fu Yincen Chen Chao Wang Ling Song College of Cyber security Jinan UniversityGuangzhou 510632China National Joint Engineering Research center of network security Detection and Protection Technology Jinan UniversityGuangzhou 510632China
Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight *** ciphers c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(Information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of network security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information security Technology Ltd. center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Survey on Fake Information Generation,Dissemination and Detection
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 573-583页
作者: Wanqiu CUI Dawei WANG Na HAN School of National security People's Public Security University of China Big Data center of The Ministry of Public security
The current booming development of the Internet has put the public in an era of information overload,in which false information is mixed and spread *** phenomenon has seriously disturbed the social network ***,a subst... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Automated federated learning‐based adversarial attack and defence in industrial control systems
收藏 引用
IET Cyber-Systems and Robotics 2024年 第2期6卷 109-127页
作者: Guo-Qiang Zeng Jun-Min Shao Kang-Di Lu Guang-Gang Geng Jian Weng College of Cyber security Jinan UniversityGuangzhouChina National Joint Engineering Research center of network security Detection and Protection Technology Jinan UniversityGuangzhouChina College of Information Science and Technology Donghua UniversityShanghaiChina
With the development of deep learning and federated learning(FL),federated intrusion detection systems(IDSs)based on deep learning have played a significant role in securing industrial control systems(ICSs).However,ad... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An End-To-End Hyperbolic Deep Graph Convolutional Neural network Framework
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 537-563页
作者: Yuchen Zhou Hongtao Huo Zhiwen Hou Lingbin Bu Yifan Wang Jingyi Mao Xiaojun Lv Fanliang Bu School of Information network security People’s Public Security University of ChinaBeijing100038China Institute of Computing Technology China Academy of Railway Sciences Corporation LimitedBeijing100081China
Graph Convolutional Neural networks(GCNs)have been widely used in various fields due to their powerful capabilities in processing graph-structured ***,GCNs encounter significant challenges when applied to scale-free g... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
High-Confidence Computing
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and security Liuzhou 545000China Guangxi Education System network security Monitoring center Liuzhou 545000China center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Multi-party privacy-preserving decision tree training with a privileged party
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 253-268页
作者: Yiwen TONG Qi FENG Min LUO Debiao HE Key Laboratory of Aerospace Information security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Key Laboratory of Computing Power network and Information security Ministry of EducationShandong Computer Science Center Qilu University of Technology(Shandong Academy of Sciences)
Currently, a decision tree is the most commonly used data mining algorithm for classification tasks. While a significant number of studies have investigated privacy-preserving decision trees, the methods proposed in t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu network and Information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China Department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China Information security Institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China Information security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论