咨询与建议

限定检索结果

文献类型

  • 13,245 篇 期刊文献
  • 809 篇 会议

馆藏范围

  • 14,054 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,228 篇 工学
    • 2,354 篇 计算机科学与技术...
    • 2,016 篇 电子科学与技术(可...
    • 1,527 篇 材料科学与工程(可...
    • 1,436 篇 仪器科学与技术
    • 1,393 篇 控制科学与工程
    • 1,335 篇 机械工程
    • 1,275 篇 软件工程
    • 997 篇 信息与通信工程
    • 994 篇 网络空间安全
    • 919 篇 光学工程
    • 917 篇 化学工程与技术
    • 645 篇 电气工程
    • 333 篇 航空宇航科学与技...
    • 296 篇 环境科学与工程(可...
    • 286 篇 水利工程
    • 284 篇 地质资源与地质工...
    • 278 篇 测绘科学与技术
    • 277 篇 交通运输工程
    • 243 篇 动力工程及工程热...
  • 4,375 篇 理学
    • 1,686 篇 物理学
    • 785 篇 数学
    • 551 篇 化学
    • 383 篇 系统科学
    • 295 篇 大气科学
    • 234 篇 生物学
  • 1,255 篇 管理学
    • 1,143 篇 管理科学与工程(可...
  • 533 篇 农学
    • 220 篇 农业资源与环境
  • 476 篇 医学
    • 315 篇 临床医学
  • 448 篇 军事学
    • 442 篇 军队指挥学
  • 219 篇 经济学
    • 214 篇 应用经济学
  • 118 篇 艺术学
  • 56 篇 文学
  • 51 篇 教育学
  • 48 篇 法学
  • 10 篇 哲学
  • 4 篇 历史学

主题

  • 230 篇 deep learning
  • 92 篇 security
  • 88 篇 blockchain
  • 78 篇 network
  • 61 篇 internet of thin...
  • 59 篇 polarization
  • 57 篇 optimization
  • 57 篇 model
  • 52 篇 analysis
  • 48 篇 physical layer s...
  • 47 篇 image
  • 46 篇 remote sensing
  • 44 篇 distribution
  • 43 篇 simulation
  • 43 篇 communication
  • 43 篇 machine learning
  • 39 篇 control
  • 38 篇 quantum
  • 37 篇 optical
  • 37 篇 power

机构

  • 201 篇 university of ch...
  • 100 篇 ieee
  • 75 篇 university of ch...
  • 72 篇 shanghai institu...
  • 61 篇 college of infor...
  • 53 篇 beijing academy ...
  • 51 篇 state key labora...
  • 46 篇 state key labora...
  • 36 篇 state key labora...
  • 33 篇 state key labora...
  • 33 篇 center of materi...
  • 32 篇 collaborative in...
  • 31 篇 state key labora...
  • 30 篇 state key labora...
  • 30 篇 state key labora...
  • 29 篇 state key labora...
  • 28 篇 state key labora...
  • 28 篇 state key labora...
  • 27 篇 state key labora...
  • 26 篇 school of electr...

作者

  • 43 篇 jian wang
  • 32 篇 jun zhang
  • 32 篇 xin liu
  • 30 篇 hong chen
  • 30 篇 qiang li
  • 29 篇 jing zhang
  • 26 篇 jun wang
  • 26 篇 chen chen
  • 25 篇 xiu-bo chen
  • 25 篇 jing wang
  • 24 篇 jing chen
  • 24 篇 deren li
  • 23 篇 wei liu
  • 22 篇 rui wang
  • 22 篇 yu zhang
  • 21 篇 qing wang
  • 21 篇 ming li
  • 21 篇 yan liu
  • 21 篇 fei-yue wang
  • 20 篇 温巧燕

语言

  • 12,384 篇 英文
  • 1,670 篇 中文
检索条件"机构=State Key Laboratory of Information Security.Institute of Information Engineering"
14054 条 记 录,以下是1-10 订阅
排序:
SAT-Based Automatic Searching for Differential and Linear Trails: Applying to CRAX
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 72-79页
作者: Yiyi HAN Caibing WANG Zhongfeng NIU Lei HU state key laboratory of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences
Boolean satisfiability problem(SAT) is now widely applied in differential cryptanalysis and linear cryptanalysis for various cipher *** generated many excellent results for some ciphers,for example,*** this research,w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
DLP:towards active defense against backdoor attacks with decoupled learning process
收藏 引用
Cybersecurity 2024年 第1期7卷 122-134页
作者: Zonghao Ying Bin Wu state key laboratory of information security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
Deep learning models are well known to be susceptible to backdoor attack,where the attacker only needs to provide a tampered dataset on which the triggers are *** trained on the dataset will passively implant the back... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan engineering Research Center of Commercial Cryptography Theory and Technology Innovation state key laboratory of information security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Improved lower bound for the complexity of unique shortest vector problem
收藏 引用
Cybersecurity 2024年 第3期7卷 102-110页
作者: Baolong Jin Rui Xue state key laboratory of information security Institute of Information EngineeringChinese Academy of SciencesBeijing 100085China School of Cyber security University of Chinese Academy of SciencesBeijing 100049China
Unique shortest vector problem(uSVP)plays an important role in lattice based *** cryptographic schemes based their security on *** the cofidence of those applications,it is essential to clarify the complex-ity of uSVP... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan Province key laboratory of information security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 635-644页
作者: Wenxiao QIAO Siwei SUN Lei HU state key laboratory of information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences School of Cryptology University of Chinese Academy of Sciences state key laboratory of Cryptology
The rapid development of modern cryptographic applications such as zero-knowledge,secure multiparty computation,fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Efficient privacy-preserving federated learning under dishonest-majority setting
收藏 引用
Science China(information Sciences) 2024年 第5期67卷 323-324页
作者: Yinbin MIAO Da KUANG Xinghua LI Tao LENG Ximeng LIU Jianfeng MA School of Cyber engineering Xidian University Intelligent Policing key laboratory of Sichuan Province Sichuan Police College institute of information engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences key laboratory of information security of Network Systems Fuzhou University
Federated learning(FL) is an emerging distributed learning paradigm that solves the problem of isolated data by jointly learning the global model through distributed ***, recent studies have shown that FL may not alwa...
来源: 同方期刊数据库 同方期刊数据库 评论
CRBFT:A Byzantine Fault-Tolerant Consensus Protocol Based on Collaborative Filtering Recommendation for Blockchains
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1491-1519页
作者: Xiangyu Wu Xuehui Du Qiantao Yang Aodi Liu Na Wang Wenjuan Wang He’nan Province key laboratory of information security Information Engineering UniversityZhengzhou450000China School of Cyber Science engineering Zhengzhou UniversityZhengzhou450000China
Blockchain has been widely used in finance,the Internet of Things(IoT),supply chains,and other scenarios as a revolutionary *** protocol plays a vital role in blockchain,which helps all participants to maintain the st... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust textile-based spoof plasmonic frequency scanning antenna for on-body IoT applications
收藏 引用
Science China(information Sciences) 2024年 第8期67卷 269-284页
作者: Zhao-Min CHEN Jun-Lin ZHAN Hao CHEN Ya LI Hongjun HE Wu YANG Zhen-Guo LIU Wei-Bing LU state key Lab of Millimeter Waves School of Information Science and EngineeringSoutheast University Center for Flexible RF Technology Frontiers Science Center for Mobile Information Communication and SecuritySoutheast University Future Research laboratory China Mobile Research Institute Purple Mountain Laboratories
Securing a comfortable, wearable compact frequency beam scanning antenna(FBSA) with robustness to deformation, low specific absorption rate(SAR), and good coverage of the surrounding environment for Internet of Things... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第9期140卷 2613-2634页
作者: Ziqiao Zhou Tianyang Zhou Jinghao Xu Junhu Zhu Henan key laboratory of information security National Engineering Technology Research Center of the Digital Switching SystemZhengzhou450000China School of Cryptographic engineering Information Engineering UniversityZhengzhou450000China
Intelligent penetration testing is of great significance for the improvement of the security of information systems,and the critical issue is the planning of penetration test *** view of the difficulty for attackers t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论