咨询与建议

限定检索结果

文献类型

  • 129,905 篇 期刊文献
  • 7,964 篇 会议

馆藏范围

  • 137,869 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95,925 篇 工学
    • 28,080 篇 材料科学与工程(可...
    • 18,237 篇 化学工程与技术
    • 10,057 篇 机械工程
    • 9,664 篇 电子科学与技术(可...
    • 9,386 篇 计算机科学与技术...
    • 6,788 篇 控制科学与工程
    • 6,530 篇 电气工程
    • 6,170 篇 软件工程
    • 6,087 篇 仪器科学与技术
    • 4,198 篇 光学工程
    • 3,773 篇 环境科学与工程(可...
    • 3,456 篇 动力工程及工程热...
    • 3,351 篇 信息与通信工程
    • 2,934 篇 力学(可授工学、理...
    • 2,273 篇 航空宇航科学与技...
    • 2,036 篇 矿业工程
    • 1,980 篇 地质资源与地质工...
    • 1,976 篇 土木工程
  • 43,652 篇 理学
    • 13,029 篇 物理学
    • 10,578 篇 化学
    • 8,063 篇 数学
    • 4,079 篇 生物学
    • 2,138 篇 系统科学
    • 1,898 篇 大气科学
  • 16,924 篇 医学
    • 10,626 篇 临床医学
    • 2,145 篇 药学(可授医学、理...
    • 1,973 篇 中西医结合
  • 8,050 篇 管理学
    • 6,233 篇 管理科学与工程(可...
  • 6,149 篇 农学
    • 1,996 篇 作物学
  • 3,009 篇 经济学
    • 2,785 篇 应用经济学
  • 910 篇 文学
  • 881 篇 教育学
  • 655 篇 艺术学
  • 606 篇 军事学
  • 583 篇 法学
  • 110 篇 历史学
  • 93 篇 哲学

主题

  • 1,576 篇 microstructure
  • 985 篇 mechanical prope...
  • 823 篇 deep learning
  • 795 篇 rare earths
  • 666 篇 numerical simula...
  • 597 篇 stability
  • 594 篇 simulation
  • 558 篇 machine learning
  • 511 篇 model
  • 458 篇 photocatalysis
  • 449 篇 of
  • 426 篇 optimization
  • 409 篇 and
  • 407 篇 structure
  • 396 篇 adsorption
  • 391 篇 china
  • 356 篇 mechanism
  • 325 篇 cancer
  • 323 篇 analysis
  • 313 篇 method

机构

  • 1,250 篇 university of ch...
  • 372 篇 school of materi...
  • 317 篇 school of materi...
  • 244 篇 ieee
  • 233 篇 school of metall...
  • 221 篇 university of ch...
  • 220 篇 school of materi...
  • 158 篇 school of materi...
  • 151 篇 shenyang nationa...
  • 142 篇 school of chemic...
  • 141 篇 state key labora...
  • 135 篇 school of materi...
  • 118 篇 school of physic...
  • 112 篇 beijing national...
  • 106 篇 school of materi...
  • 103 篇 institute of met...
  • 87 篇 songshan lake ma...
  • 86 篇 center of materi...
  • 82 篇 school of automa...
  • 80 篇 school of materi...

作者

  • 428 篇 wei wang
  • 374 篇 wei zhang
  • 293 篇 yang liu
  • 277 篇 wei chen
  • 261 篇 lei wang
  • 259 篇 lei zhang
  • 257 篇 wei li
  • 253 篇 yu zhang
  • 242 篇 wei liu
  • 235 篇 yang li
  • 217 篇 jing wang
  • 215 篇 jing li
  • 211 篇 xin wang
  • 201 篇 jun wang
  • 201 篇 yi zhang
  • 186 篇 li wang
  • 182 篇 jun li
  • 180 篇 li li
  • 174 篇 yang yang
  • 172 篇 yan li

语言

  • 125,916 篇 英文
  • 11,952 篇 中文
  • 1 篇 法文
检索条件"机构=School of Cyberspace Science and Technology"
137869 条 记 录,以下是1-10 订阅
排序:
The Exchange Attack and the Mixture Differential Attack Revisited: From the Perspective of Automatic Evaluation
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 19-29页
作者: Kexin QIAO Zhiyu ZHANG Zhongfeng NIU Liehuang ZHU school of cyberspace science and technology Beijing Institute of Technology State Key Laboratory of Cryptology Institute of Information Engineering Chinese Academy of Sciences school of Cryptography University of Chinese Academy of Sciences
Recent results show that the differential properties within quadruples boom as a new inspiration in cryptanalysis of Advanced Encryption Standard(AES)-like constructions. These methods include the exchange attack prop... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamical behaviors in discrete memristor-coupled small-world neuronal networks
收藏 引用
Chinese Physics B 2024年 第4期33卷 729-734页
作者: 鲁婕妤 谢小华 卢亚平 吴亚联 李春来 马铭磷 school of Automation and Electronic Information Xiangtan UniversityXiangtan 411105China school of Computer science school of cyberspace science Xiangtan UniversityXiangtan 411105China
The brain is a complex network system in which a large number of neurons are widely connected to each other and transmit signals to each *** memory characteristic of memristors makes them suitable for simulating neuro... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fusion of Spiral Convolution-LSTM for Intrusion Detection Modeling
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2315-2329页
作者: Fei Wang Zhen Dong school of cyberspace Security Gansu University of Political Science and LawLanzhou73000China
Aiming at the problems of low accuracy and slow convergence speed of current intrusion detection models,SpiralConvolution is combined with Long Short-Term Memory Network to construct a new intrusion detection *** data... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Adaptive Graph Convolutional Adjacency Matrix Network for Video Summarization
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 1947-1965页
作者: Jing Zhang Guangli Wu Shanshan Song school of cyberspace Security Gansu University of Political Science and LawLanzhou730000China
Video summarization aims to select key frames or key shots to create summaries for fast retrieval,compression,and efficient browsing of *** neural networks efficiently capture information about graph nodes and their n... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Authenticated Digital Currency Redaction with Stronger Privacy and Usability
收藏 引用
China Communications 2024年 第6期21卷 219-236页
作者: Tang Yongli Li Ying Zhao Zongqu Li Yuanhong Guo Rui school of Computer science and technology Henan Polytechnic UniversityJiaozuo 454000China school of cyberspace Security Xi’an University of Posts and TelecommunicationsXi’an 710121China
With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key *** signature scheme(RSS)can provide the verification of the integrity... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dynamics and synchronization in a memristor-coupled discrete heterogeneous neuron network considering noise
收藏 引用
Chinese Physics B 2024年 第2期33卷 537-544页
作者: 晏询 李志军 李春来 school of Automation and Electronic Information Xiangtan UniversityXiangtan 411105China school of Computer science&school of cyberspace science Xiangtan UniversityXiangtan 411105China
Research on discrete memristor-based neural networks has received much ***,current research mainly focuses on memristor–based discrete homogeneous neuron networks,while memristor-coupled discrete heterogeneous neuron... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Time Series Intrusion Detection Method Based on SSAE,TCN and Bi-LSTM
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 845-871页
作者: Zhenxiang He Xunxi Wang Chunwei Li school of cyberspace Security Gansu University of Political Science and LawLanzhou730000China
In the fast-evolving landscape of digital networks,the incidence of network intrusions has escalated ***,the crucial role of time series data in intrusion detection remains largely underappreciated,with most systems f... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Deep Learning Social Network Access Control Model Based on User Preferences
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第7期140卷 1029-1044页
作者: Fangfang Shan Fuyang Li Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun school of Computer science Zhongyuan University of TechnologyZhengzhou450007China Henan Key Laboratory of cyberspace Situation Awareness Zhengzhou450001China
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social ***,socialusers andsocialdata entities are extractedfromthe social networkandused to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
FMSA:a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems
收藏 引用
Cybersecurity 2024年 第1期7卷 110-121页
作者: Kaisheng Fan Weizhe Zhang Guangrui Liu Hui He school of cyberspace science Harbin Institute of TechnologyHarbin 150001China Department of New Networks Peng Cheng LaboratoryShenzhen 518055GuangdongChina
Intrusion detection systems are increasingly using machine *** machine learning has shown excellent performance in identifying malicious traffic,it may increase the risk of privacy *** paper focuses on imple-menting a... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 965-978页
作者: Hao LI Yi ZHANG Jinwei WANG Weiming ZHANG Xiangyang LUO Key Laboratory of cyberspace Situation Awareness of Henan Province Nanjing University of Information science & technology University of science and technology of China
Existing deep learning-based steganography detection methods utilize convolution to automatically capture and learn steganographic features, yielding higher detection efficiency compared to manually designed steganogr... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论