咨询与建议

限定检索结果

文献类型

  • 5,555 篇 期刊文献
  • 195 篇 会议
  • 2 册 图书

馆藏范围

  • 5,752 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,224 篇 工学
    • 2,417 篇 计算机科学与技术...
    • 973 篇 电气工程
    • 973 篇 电子科学与技术(可...
    • 873 篇 材料科学与工程(可...
    • 826 篇 信息与通信工程
    • 773 篇 网络空间安全
    • 638 篇 控制科学与工程
    • 618 篇 软件工程
    • 416 篇 机械工程
    • 331 篇 生物医学工程(可授...
    • 323 篇 环境科学与工程(可...
    • 304 篇 仪器科学与技术
    • 293 篇 力学(可授工学、理...
    • 170 篇 化学工程与技术
    • 164 篇 动力工程及工程热...
  • 2,349 篇 理学
    • 955 篇 数学
    • 546 篇 生物学
    • 531 篇 物理学
    • 278 篇 化学
    • 242 篇 天文学
    • 180 篇 生态学
    • 153 篇 地球物理学
  • 919 篇 医学
    • 710 篇 临床医学
    • 195 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 608 篇 管理学
    • 337 篇 管理科学与工程(可...
  • 512 篇 农学
    • 225 篇 作物学
    • 156 篇 农业资源与环境
  • 342 篇 法学
  • 324 篇 经济学
    • 298 篇 应用经济学
  • 178 篇 军事学
    • 167 篇 军队指挥学
  • 130 篇 教育学
  • 74 篇 文学
  • 68 篇 艺术学
  • 10 篇 哲学
  • 8 篇 历史学

主题

  • 391 篇 security
  • 157 篇 blockchain
  • 131 篇 deep learning
  • 108 篇 internet of thin...
  • 84 篇 cryptography
  • 81 篇 machine learning
  • 78 篇 privacy
  • 71 篇 iot
  • 70 篇 authentication
  • 67 篇 network
  • 48 篇 artificial intel...
  • 48 篇 and
  • 48 篇 intrusion detect...
  • 39 篇 system
  • 37 篇 model
  • 36 篇 food security
  • 33 篇 中国
  • 32 篇 food
  • 32 篇 cyber security
  • 31 篇 management

机构

  • 34 篇 department of co...
  • 31 篇 shanghai institu...
  • 30 篇 ieee
  • 22 篇 department of co...
  • 20 篇 department of el...
  • 19 篇 department of co...
  • 18 篇 department of in...
  • 18 篇 department of in...
  • 17 篇 university of ch...
  • 17 篇 department of co...
  • 16 篇 center of excell...
  • 15 篇 security enginee...
  • 15 篇 department of el...
  • 14 篇 department of in...
  • 14 篇 department of el...
  • 12 篇 school of scienc...
  • 12 篇 department of co...
  • 12 篇 department of ma...
  • 11 篇 department of co...
  • 11 篇 security enginee...

作者

  • 34 篇 walid el-shafai
  • 16 篇 kim-kwang raymon...
  • 15 篇 abdelwahed motwa...
  • 15 篇 dhanushka n.wana...
  • 15 篇 fathi e.abd el-s...
  • 14 篇 陈克非
  • 14 篇 wei li
  • 13 篇 mehedi masud
  • 13 篇 anwer mustafa hi...
  • 12 篇 rajeev kumar
  • 12 篇 naglaa f.soliman
  • 11 篇 mingkwan doilom
  • 11 篇 chayanard phukha...
  • 11 篇 ishfaq yaseen
  • 11 篇 kevin d.hyde
  • 11 篇 muhammad adnan k...
  • 11 篇 曾贵华
  • 10 篇 fatma s.alrayes
  • 10 篇 sanjeev kumar
  • 10 篇 sajeewa s.n.maha...

语言

  • 5,521 篇 英文
  • 230 篇 中文
  • 1 篇 日文
检索条件"机构=Security Department"
5752 条 记 录,以下是1-10 订阅
排序:
Eu-MOF-Based Fluorescent Ratiometric Sensor by Detecting 3,4,5-Trihydroxybenzoic for Fingerprint Visualization on Porous Objects
收藏 引用
Photonic Sensors 2024年 第1期14卷 85-98页
作者: Muwen LIANG Yabin ZHAO Yaping LUO Bin DU Wei HU Bing LIU Xihui MU Zhaoyang TONG department of Investigation People's Public Security University of ChinaBejing 100038China State Key Laboratory of NBC Protection for Civilian Beijing 102205China
Latent fingerprints(LFPs)at the crime scene are served as important clues to locate the trajectory of criminal behavior and portray the characteristics of the ***,visualizing LFPs is of considerable *** this work,the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Tuning Second Chern Number in a Four-Dimensional Topological Insulator by High-Frequency Time-Periodic Driving
收藏 引用
Chinese Physics Letters 2024年 第4期41卷 77-89页
作者: 刘峥嵘 陈锐 周斌 department of Physics Hubei UniversityWuhan 430062China Key Laboratory of Intelligent Sensing System and security of Ministry of Education Hubei UniversityWuhan 430062China
Floquet engineering has attracted considerable attention as a promising approach for tuning topological phase *** investigate the effects of high-frequency time-periodic driving in a four-dimensional(4D)topological in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Suboptimal Feature Selection Techniques for Effective Malicious Traffic Detection on Lightweight Devices
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第8期140卷 1669-1687页
作者: So-Eun Jeon Ye-Sol Oh Yeon-Ji Lee Il-Gu Lee department of Future Convergence Technology Engineering Sungshin Women’s UniversitySeoul02844Korea department of Convergence security Engineering SungshinWomen’s UniversitySeoul02844Korea
With the advancement of wireless network technology,vast amounts of traffic have been generated,and malicious traffic attacks that threaten the network environment are becoming increasingly *** signature-based detecti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1881-1895页
作者: Xiao Feng Zheng Yuan Cyber security Academy Beijing University of Posts and TelecommunicationsBeijing100876China department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China State Grid Info-Telecom Great Power Science and Technology Co. Ltd.Beijing102211China
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Differentially Private Support Vector Machines with Knowledge Aggregation
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3891-3907页
作者: Teng Wang Yao Zhang Jiangguo Liang Shuai Wang Shuanggen Liu School of Cyberspace security Xi’an University of Posts and TelecommunicationsXi’an710121China
With the widespread data collection and processing,privacy-preserving machine learning has become increasingly important in addressing privacy risks related to *** vector machine(SVM)is one of the most elementary lear... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Novel Rifle Number Recognition Based on Improved YOLO in Military Environment
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 249-263页
作者: Hyun Kwon Sanghyun Lee department of Artificial Intelligence and Data Science Korea Military AcademySeoulKorea Graduate School of Information security Korea Advanced Institute of Science and TechnologyDaejeonKorea
Deep neural networks perform well in image recognition,object recognition,pattern analysis,and speech *** military applications,deep neural networks can detect equipment and recognize *** military equipment,it is nece... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
The Transfer and Change of Paints in a Hit-and-run Motor Vehicle Accident
收藏 引用
Journal of Forensic Science and Medicine 2024年 第1期10卷 24-27页
作者: Can Hu Jun Zhu Hongcheng Mei Hongling Guo Ping Wang Yajun Li Trace Evidence department Institute of Forensic ScienceMinistry of Public SecurityXichengBeijingChina
This work investigated transfer and change of paint evidences in a case of *** kinds of attachments were found on the clothes of the victim and they were initially considered paint fragments from the vehicle causing t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Blockchain-Assisted Unsupervised Learning Method for Crowdsourcing Reputation Management
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第9期140卷 2297-2314页
作者: Tianyu Wang Kongyang Chen department of Cyberspace security Guangzhou UniversityGuangzhou51006China Institute of Artificial Intelligence Guangzhou UniversityGuangzhou51006China Center of Young Scholars Pazhou LabGuangzhou510335China
Crowdsourcing holds broad applications in information acquisition and dissemination,yet encounters challenges pertaining to data quality assessment and user reputation *** mechanisms stand as crucial solutions for app... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
MarkNeRF:Watermarking for Neural Radiance Field
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1235-1250页
作者: Lifeng Chen Jia Liu Wenquan Sun Weina Dong Xiaozhong Pan Cryptographic Engineering department Institute of Cryptographic EngineeringEngineering University of PAPXi’an710086China Key Laboratory of Network and Information security of PAP Xi’an710086China
This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)*** employ an embedding network to integrate the watermark into the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and Information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China Information security Institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China Information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论