咨询与建议

限定检索结果

文献类型

  • 276 篇 期刊文献
  • 17 篇 会议

馆藏范围

  • 293 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 269 篇 工学
    • 206 篇 计算机科学与技术...
    • 106 篇 电气工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 网络空间安全
    • 85 篇 信息与通信工程
    • 68 篇 软件工程
    • 50 篇 控制科学与工程
    • 39 篇 材料科学与工程(可...
    • 35 篇 仪器科学与技术
    • 25 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 16 篇 力学(可授工学、理...
    • 9 篇 航空宇航科学与技...
    • 6 篇 光学工程
  • 140 篇 理学
    • 93 篇 数学
    • 25 篇 物理学
    • 21 篇 生物学
    • 17 篇 系统科学
    • 9 篇 统计学(可授理学、...
    • 5 篇 天文学
    • 5 篇 地球物理学
  • 51 篇 管理学
    • 46 篇 管理科学与工程(可...
  • 19 篇 军事学
    • 18 篇 军队指挥学
  • 11 篇 法学
    • 6 篇 法学
    • 5 篇 社会学
  • 11 篇 医学
    • 8 篇 基础医学(可授医学...
    • 8 篇 临床医学
  • 9 篇 教育学
    • 7 篇 教育学
  • 8 篇 艺术学
    • 8 篇 设计学(可授艺术学...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 文学
  • 2 篇 农学

主题

  • 22 篇 blockchain
  • 18 篇 security
  • 11 篇 cryptography
  • 9 篇 authentication
  • 9 篇 data
  • 7 篇 access control
  • 7 篇 cloud computing
  • 6 篇 privacy
  • 6 篇 information secu...
  • 5 篇 deep learning
  • 5 篇 data security
  • 5 篇 cloud
  • 5 篇 encryption
  • 4 篇 image encryption
  • 4 篇 smart grid
  • 4 篇 signature
  • 4 篇 data privacy
  • 4 篇 learning
  • 4 篇 internet of thin...
  • 4 篇 electronic comme...

机构

  • 9 篇 school of comput...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 genome institute...
  • 5 篇 school of comput...
  • 5 篇 school of inform...
  • 5 篇 school of automa...
  • 5 篇 department of el...
  • 5 篇 school of comput...
  • 5 篇 school of electr...
  • 4 篇 security enginee...
  • 4 篇 school of comput...
  • 4 篇 moe key lab for ...
  • 3 篇 school of comput...
  • 3 篇 jiangsu key labo...
  • 3 篇 ieee
  • 3 篇 college of compu...
  • 3 篇 precision medici...
  • 3 篇 center for cyber...
  • 3 篇 guangxi key labo...

作者

  • 7 篇 kai ye
  • 7 篇 xiaofei yang
  • 5 篇 yong ding
  • 5 篇 walid el-shafai
  • 5 篇 peng jia
  • 5 篇 bo yang
  • 4 篇 yujue wang
  • 4 篇 chunxiang xu
  • 4 篇 yongjun ren
  • 4 篇 wei li
  • 4 篇 tun xu
  • 4 篇 yang zhao
  • 3 篇 yunqing shi
  • 3 篇 qirong mao
  • 3 篇 xiaohong guan
  • 3 篇 mohamad khairi i...
  • 3 篇 junchao dong
  • 3 篇 chengsheng zhang
  • 3 篇 hu xiong
  • 3 篇 li guo

语言

  • 289 篇 英文
  • 4 篇 中文
检索条件"机构=School of Computer Science and Information Security Guilin University of Electronic Technology 1 Jinji Road"
293 条 记 录,以下是41-50 订阅
排序:
On τ-time secure key agreemen
收藏 引用
science China(information sciences) 2015年 第1期58卷 165-177页
作者: JIANG ShaoQuan Institute of information security Mianyang Normal University school of computer science University of Electronic Science and Technology of China
A τ-time key agreement system(τ-time KAS) is an unconditionally secure key agreement where an attacker cannot obtain any information about the challenge conference key even if he eavesdrops executions ofτ(maybe rep... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
PCRTAM-Net:A Novel Pre-Activated Convolution Residual and Triple Attention Mechanism Network for Retinal Vessel Segmentation
收藏 引用
Journal of computer science & technology 2023年 第3期38卷 567-581页
作者: 汪华登 李紫正 保罗 黎兵兵 潘细朋 刘振丙 蓝如师 罗笑南 Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin 541004China school of computer science and information security Guilin University of Electronic TechnologyGuilin 541004China school of Artificial Intelligence Guilin University of Electronic TechnologyGuilin 541004China Department of Pathology Ganzhou Municipal HospitalGanzhou 341000China
Retinal images play an essential role in the early diagnosis of ophthalmic *** segmentation of retinal vessels in color fundus images is challenging due to the morphological differences between the retinal vessels and... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New health-state assessment model based on belief rule base with interpretability
收藏 引用
science China(information sciences) 2021年 第7期64卷 209-223页
作者: Zhijie ZHOU You CAO Guanyu HU Youmin ZHANG Shuaiwen TANG Yuan CHEN High-Tech Institute of Xi'an Department of information and Control Engineering Xi'an University of Technology school of computer science and information security Guilin University of Electronic Technology Department of Mechanical Industrial and Aerospace Engineering Concordia University
Health-state assessment is the foundation of optimal-maintenance decision-making for complex systems to maintain reliability and safety. Generating the assessment results in a convincing and interpretable way to avoid... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Super-resolution compressive spectral imaging via two-tone adaptive coding
收藏 引用
Photonics Research 2020年 第6期8卷 395-411页
作者: CHANG XU TINGFA XU GE YAN XU MA YUHAN ZHANG XI WANG FENG ZHAO GONZALO R.ARCE Key Laboratory of Photoelectronic Imaging technology and System School of Optics and PhotonicsBeijing Institute of TechnologyBeijing 100081China school of computer science and information security Guilin University of Electronic TechnologyGuilin 541004China Department of Electrical and computer Engineering University of DelawareNewarkDelaware 19716USA
Coded apertures with random patterns are extensively used in compressive spectral imagers to sample the incident scene in the image *** samplings,however,are inadequate to capture the structural characteristics of the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Collision-Based Chosen-Message Simple Power Clustering Attack Algorithm
收藏 引用
China Communications 2013年 第5期10卷 114-119页
作者: 陈艾东 许森 陈运 秦志光 school of computer science and Engineering University of Electronic Science and Technology of China information security Institute Chengdu University of Information Technology school of electronic information and Electrical Engineering Shanghai Jiao Tong University
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Sensitive information security Based on Elliptic Curves
收藏 引用
World Journal of Engineering and technology 2024年 第2期12卷 274-285页
作者: Nadine Nibigira Vincent Havyarimana Zhu Xiao school of Engineering sciences University of Burundi Doctoral School Bujumbura Burundi Department of Applied sciences Burundi Higher Institute of Education (ENS) Bujumbura Burundi College of computer science and electronic Engineering Hunan University Changsha China
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
K-Means Clustering with Local Distance Privacy
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 433-442页
作者: Mengmeng Yang Longxia Huang Chenghua Tang the Data61 Commonwealth Scientific and Industrial Research OrganizationMelbourne 3168Australia the school of computer science and Communication Engineering Jiangsu UniversityZhenjiang 212013China. the school of computer science and information security Guilin University of Electronic TechnologyGuilin 541010China
With the development of information technology,a mass of data are generated every *** and analysing these data help service providers improve their services and gain an advantage in the fierce market competition.K-mea... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
收藏 引用
science China(information sciences) 2018年 第3期61卷 228-230页
作者: Lixue SUN Chunxiang XU Mingwu ZHANG Kefei CHEN Hongwei LI Center for Cyber security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of China school of computer science Hubei University of Technology school of science Hangzhou Normal University Laboratory of science and technology on Communication security
Public key encryption with keyword search(PEKS)enables one to search encrypted data containing some keyword without decrypting the data in public key *** et al.[1]introduced the notion of PEKS,but later Byun et al.[2]... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
SpectraTr:A novel deep learning model for qualitative analysis of drug spectroscopy based on transformer structure
收藏 引用
Journal of Innovative Optical Health sciences 2022年 第3期15卷 107-117页
作者: Pengyou Fu Yue Wen Yuke Zhang Lingqiao Li Yanchun Feng Lihui Yin Huihua Yang school of computer science and information security guilin university of electronic technology 1 jinji road Guilin 541004P.R.China school of Artīcial Intelligence Beijing university of Posts and Telecommunications 10 Xitucheng road Beijing 100876P.R.China school of International Beijing University of Posts and Telecommunications 10 Xitucheng Road Beijing 100876P.R.China National Institutes for Food and Drug Control 10 Tiantanxili road Beijing 100050P.R.China
The drug supervision methods based on near-infrared spectroscopy analysis are heavily dependent on the chemometrics model which characterizes the relationship between spectral data and drug *** preliminary application... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
反向连边在大型分层网络中的影响(英文)
收藏 引用
Engineering 2024年 第5期 240-249页
作者: 曹浩森 胡斌斌 莫小雨 陈都鑫 高建喜 袁烨 陈关荣 Tamás Vicsek 管晓宏 张海涛 MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Intelligent Manufacturing Equipment and Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology school of Mechanical and Aerospace Engineering Nanyang Technological University Jiangsu Key Laboratory of Networked Collective Intelligence School of Mathematics Southeast University Department of computer science Rensselaer Polytechnic Institute Department of electronic Engineering City University of Hong Kong Department of Biological Physics E?tv?s University MOE Key Laboratory for Intelligent Networks and Network security School of Automation Science and Engineering Xi'an Jiaotong University
Hierarchical networks are frequently encountered in animal groups, gene networks, and artificial engineering systems such as multiple robots, unmanned vehicle systems, smart grids, wind farm networks,and so forth. The...
来源: 同方期刊数据库 同方期刊数据库 评论