咨询与建议

限定检索结果

文献类型

  • 10,027 篇 期刊文献
  • 601 篇 会议

馆藏范围

  • 10,628 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,168 篇 工学
    • 1,123 篇 计算机科学与技术...
    • 929 篇 材料科学与工程(可...
    • 922 篇 电子科学与技术(可...
    • 891 篇 控制科学与工程
    • 885 篇 化学工程与技术
    • 846 篇 机械工程
    • 722 篇 仪器科学与技术
    • 708 篇 软件工程
    • 526 篇 航空宇航科学与技...
    • 463 篇 信息与通信工程
    • 372 篇 电气工程
    • 348 篇 光学工程
    • 331 篇 地质资源与地质工...
    • 279 篇 网络空间安全
    • 251 篇 建筑学
    • 232 篇 力学(可授工学、理...
    • 230 篇 土木工程
    • 217 篇 动力工程及工程热...
    • 211 篇 交通运输工程
  • 4,435 篇 理学
    • 1,121 篇 数学
    • 937 篇 物理学
    • 629 篇 化学
    • 579 篇 天文学
    • 371 篇 地球物理学
    • 276 篇 地质学
    • 202 篇 大气科学
    • 181 篇 系统科学
  • 813 篇 管理学
    • 626 篇 管理科学与工程(可...
  • 323 篇 医学
    • 221 篇 临床医学
  • 190 篇 农学
  • 183 篇 经济学
    • 173 篇 应用经济学
  • 104 篇 军事学
  • 91 篇 艺术学
  • 59 篇 文学
  • 52 篇 法学
  • 51 篇 教育学
  • 13 篇 哲学
  • 8 篇 历史学

主题

  • 123 篇 space
  • 106 篇 crystal structur...
  • 104 篇 deep learning
  • 63 篇 blockchain
  • 58 篇 simulation
  • 55 篇 numerical simula...
  • 47 篇 optimization
  • 44 篇 analysis
  • 42 篇 model
  • 37 篇 reinforcement le...
  • 36 篇 network
  • 33 篇 polarization
  • 30 篇 mechanical prope...
  • 28 篇 internet of thin...
  • 28 篇 methods:data ana...
  • 28 篇 artificial intel...
  • 27 篇 coordination pol...
  • 26 篇 control
  • 25 篇 communication
  • 24 篇 image

机构

  • 123 篇 university of ch...
  • 96 篇 school of earth ...
  • 67 篇 university of mi...
  • 67 篇 institute for pa...
  • 67 篇 nikhef p.o.box 4...
  • 67 篇 fysikum stockhol...
  • 67 篇 michigan state u...
  • 67 篇 institut fur the...
  • 67 篇 dept.of physics ...
  • 67 篇 compas group ins...
  • 67 篇 rudolf peierls c...
  • 67 篇 nstitucio catala...
  • 67 篇 department of ph...
  • 67 篇 school of physic...
  • 67 篇 ludwig-maximilia...
  • 67 篇 cea/saclay dsm/i...
  • 67 篇 department of ph...
  • 67 篇 national astrono...
  • 67 篇 santa cruz insti...
  • 66 篇 national researc...

作者

  • 89 篇 v.i.belousov
  • 85 篇 h.murayama
  • 85 篇 j.d.jackson
  • 85 篇 g.d'ambrosio
  • 85 篇 m.white
  • 85 篇 p.de jong
  • 85 篇 v.burkert
  • 85 篇 y.hayato
  • 85 篇 a.v.gritsan
  • 85 篇 a.gurtu
  • 85 篇 m.carena
  • 85 篇 a.masoni
  • 85 篇 s.rolli
  • 84 篇 a.d.martin
  • 84 篇 b.heltsley
  • 84 篇 s.r.klein
  • 84 篇 d.h.weinberg
  • 84 篇 u.f.katz
  • 84 篇 m.titov
  • 81 篇 j.matthews

语言

  • 9,812 篇 英文
  • 816 篇 中文
检索条件"机构=School of Cyber Space and Technology"
10628 条 记 录,以下是1-10 订阅
排序:
DeepSI:A Sensitive-Driven Testing Samples Generation Method of Whitebox CNN Model for Edge Computing
收藏 引用
Tsinghua Science and technology 2024年 第3期29卷 784-794页
作者: Zhichao Lian Fengjun Tian school of cyber Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China
In recent years,Deep Learning(DL)technique has been widely used in Internet of Things(IoT)and Industrial Internet of Things(IIoT)for edge computing,and achieved good *** more and more studies have shown the vulnerabil... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm
收藏 引用
Science China(Information Sciences) 2024年 第5期67卷 325-326页
作者: Teng LI Weiguo LIN Ruichen MA Zhuo MA Yulong SHEN Jianfeng MA school of cyber Engineering Xidian University school of Computer Science and technology Xidian University
As mission scenarios grow more complex, the role of a single unmanned aerial vehicle(UAV) is limited. The UAV swarm,surpassing the single UAV, dynamically establishes temporary communication networks, ensuring high tr... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 645-656页
作者: Zequn NIU Jingfeng XUE Yong WANG Tianwei LEI Weijie HAN Xianwei GAO school of Computer Science and technology Beijing Institute of Technology school of space Information Space Engineering University
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
收藏 引用
Science China(Information Sciences) 2024年 第6期67卷 399-417页
作者: Chengyan MA Ning XI Di LU Yebo FENG Jianfeng MA school of cyber Engineering Xidian University school of Computer Science and technology Xidian University Department of Computer and Information Science University of Oregon
Memory corruption attacks(MCAs) refer to malicious behaviors of system intruders that modify the contents of a memory location to disrupt the normal operation of computing systems, causing leakage of sensitive data or... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG Institute of Information Engineering Chinese Academy of Sciences school of cyber Security University of Chinese Academy of Sciences school of Computer Science and technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Verification of quantum networks using the GHZ paradox
收藏 引用
Communications in Theoretical Physics 2024年 第10期76卷 57-63页
作者: Huan Ye Xue Yang Ming-Xing Luo school of Information Science and technology Southwest Jiaotong University school of Computer Science and cyber Security Chengdu University of Technology
The Greenberger–Horne–Zeilinger(GHZ) paradox shows that it is possible to create a multipartite state involving three or more particles in which the measurement outcomes of the particles are correlated in a way that... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new centrality measure based on neighbor loop structure for network dismantling
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 472-480页
作者: Qingxia Liu Bang Wang Jiming Qi Xianjun Deng school of Electronic Information and Communications Huazhong University of Science and TechnologyWuhan430074China school of cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China
Nearly all real-world networks are complex networks and usually are in danger of ***,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network *** dismantling ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Characteristic Mode Analysis for Pattern Diversity and Beamforming: A Survey
收藏 引用
Chinese Journal of Electronics 2024年 第5期33卷 1117-1126页
作者: Qianyun ZHANG Biyi WU school of cyber Science and technology Beihang University Center for Electromagnetic Simulation School of Integrated Circuits and Electronics Beijing Institute of Technology
With the rapid development of space-air-ground integrated communications, diverse requirements have been imposed on antenna radiation patterns. In addition, increasingly compact platforms brings significant challenges... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Towards the universal defense for query-based audio adversarial attacks on speech recognition system
收藏 引用
cybersecurity 2024年 第1期7卷 53-70页
作者: Feng Guo Zheng Sun Yuxuan Chen Lei Ju school of cyber Science and technology Shandong UniversityQingdaoChina Quancheng Laboratory QCLJinanChina
Recently,studies show that deep learning-based automatic speech recognition(ASR)systems are vulnerable to adversarial examples(AEs),which add a small amount of noise to the original audio *** AE attacks pose new chall... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fast fixed-time three-dimensional terminal guidance with non-concave trajectory constraint
收藏 引用
Chinese Journal of Aeronautics 2024年 第3期37卷 208-218页
作者: Youmin GONG Yanning GUO Yueyong LYU Dongyu LI Guangfu MA Department of Control Science and Engineering Harbin Institute of TechnologyHarbin 150001China school of cyber Science and technology Beihang UniversityBeijing 100191China
Focusing on the non-concave trajectory constraint,a sliding-mode-based nonsingular feedback fast fixed-time three-dimensional terminal guidance of rotor unmanned aerial vehicle landing,planetary landing and spacecraft... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论