咨询与建议

限定检索结果

文献类型

  • 5,780 篇 期刊文献
  • 230 篇 会议

馆藏范围

  • 6,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,278 篇 工学
    • 1,888 篇 计算机科学与技术...
    • 1,071 篇 电气工程
    • 901 篇 信息与通信工程
    • 811 篇 网络空间安全
    • 799 篇 电子科学与技术(可...
    • 786 篇 材料科学与工程(可...
    • 631 篇 环境科学与工程(可...
    • 626 篇 控制科学与工程
    • 523 篇 软件工程
    • 382 篇 机械工程
    • 316 篇 仪器科学与技术
    • 272 篇 化学工程与技术
    • 248 篇 水利工程
    • 246 篇 动力工程及工程热...
    • 221 篇 生物医学工程(可授...
    • 216 篇 力学(可授工学、理...
  • 2,647 篇 理学
    • 764 篇 数学
    • 634 篇 生物学
    • 536 篇 物理学
    • 429 篇 化学
    • 317 篇 生态学
    • 302 篇 天文学
    • 265 篇 地球物理学
    • 210 篇 大气科学
  • 786 篇 农学
    • 352 篇 作物学
    • 285 篇 农业资源与环境
  • 761 篇 管理学
    • 312 篇 管理科学与工程(可...
  • 712 篇 法学
    • 421 篇 政治学
  • 616 篇 医学
    • 387 篇 临床医学
  • 512 篇 经济学
    • 451 篇 应用经济学
  • 237 篇 军事学
  • 79 篇 教育学
  • 59 篇 艺术学
  • 58 篇 文学
  • 16 篇 历史学
  • 6 篇 哲学

主题

  • 180 篇 security
  • 111 篇 中国
  • 92 篇 blockchain
  • 72 篇 deep learning
  • 59 篇 food security
  • 58 篇 and
  • 49 篇 cryptography
  • 47 篇 china
  • 44 篇 internet of thin...
  • 42 篇 privacy
  • 37 篇 system
  • 35 篇 network
  • 33 篇 cooperation
  • 33 篇 climate change
  • 32 篇 model
  • 32 篇 rice
  • 31 篇 authentication
  • 28 篇 policy
  • 28 篇 intrusion detect...
  • 27 篇 analysis

机构

  • 123 篇 shanghai institu...
  • 106 篇 university of ch...
  • 86 篇 state key labora...
  • 44 篇 university of ch...
  • 30 篇 state key labora...
  • 28 篇 school of cyber ...
  • 28 篇 institute of geo...
  • 28 篇 ieee
  • 28 篇 school of cyber ...
  • 27 篇 school of cyber ...
  • 23 篇 china institute ...
  • 20 篇 department of co...
  • 18 篇 institute of inf...
  • 18 篇 middle east stud...
  • 17 篇 center of excell...
  • 17 篇 institute of geo...
  • 16 篇 state key labora...
  • 16 篇 state key labora...
  • 15 篇 institute of geo...
  • 15 篇 institute of inf...

作者

  • 16 篇 dhanushka n.wana...
  • 15 篇 lin dongdai
  • 15 篇 rui zhang
  • 14 篇 lei zhang
  • 14 篇 wei wang
  • 13 篇 yu zhang
  • 13 篇 bo wang
  • 12 篇 jian wang
  • 12 篇 lin ma
  • 12 篇 kevin d.hyde
  • 11 篇 mingkwan doilom
  • 11 篇 chayanard phukha...
  • 11 篇 jie chen
  • 11 篇 hua zhang
  • 11 篇 wei huang
  • 11 篇 lei wang
  • 11 篇 pinjing he
  • 11 篇 wei li
  • 11 篇 yang yang
  • 10 篇 xiaohu dai

语言

  • 5,653 篇 英文
  • 357 篇 中文
检索条件"机构=Third Institute of Ministry of Public Security"
6010 条 记 录,以下是21-30 订阅
排序:
Robust adaptive radar beamforming based on iterative training sample selection using kurtosis of generalized inner product statistics
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 24-30页
作者: TIAN Jing ZHANG Wei School of Information and Electronics Beijing Institute of TechnologyBeijing 100081China National Key Laboratory of Electromagnetic Space security Chengdu 610036China
In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A dual-RPA based lateral flow strip for sensitive,on-site detection of CP4-EPSPS and Cry1Ab/Ac genes in genetically modified crops
收藏 引用
Food Science and Human Wellness 2024年 第1期13卷 183-190页
作者: Jinbin Wang Yu Wang Xiuwen Hu Yifan Chen Wei Jiang Xiaofeng Liu Juan Liu Lemei Zhu Haijuan Zeng Hua Liu Key Laboratory of Agricultural Genetics and Breeding Institute of Biotechnology ResearchShanghai Academy of Agricultural SciencesShanghai 201106China Crops Ecological Environment security Inspection and Supervision Center(Shanghai) Ministry of Agriculture and Rural AffairsShanghai 201106China School of Life Science and Engineering Lanzhou University of TechnologyLanzhou 730050China School of public Health Changsha Medical UniversityChangsha 410219China Academician Workstation Changsha Medical UniversityChangsha 410219China
Traditional transgenic detection methods require high test conditions and struggle to be both sensitive and *** this study,a one-tube dual recombinase polymerase amplification(RPA)reaction system for CP4-EPSPS and Cry... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
Science China(Information Sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
security estimation of LWE via BKW algorithms
收藏 引用
Cybersecurity 2024年 第1期7卷 71-87页
作者: Yu Wei Lei Bi Xianhui Lu Kunpeng Wang SKLOIS Institute of Information EngineeringCASBeijingChina School of Cyber security University of Chinese Academy of SciencesBeijingChina
The Learning With Errors(LWE)problem is widely used in lattice-based cryptography,which is the most promising post-quantum cryptography *** are a variety of LWE-solving methods,which can be classified into four groups... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and Information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China Department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China Information security institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China Information security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Research on Site Planning of Mobile Communication Network
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3243-3261页
作者: Jiahan He Guangjun Liang Meng Li KefanYao Bixia Wang Lu Li Department of Computer Information and Cyber security Jiangsu Police InstituteNanjing210000China Engineering Research Center of Electronic Data Forensics Analysis Nanjing210000China Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjing210000China Basic Course Teaching and Research Department Jiangsu Police InstituteNanjing210000China Communication and Signal College Nanjing Railway Vocational and TechnicalNanjing210000China
In this paper,considering the cost of base station,coverage,call quality,and other practical factors,a multi-objective optimal site planning scheme is ***,based on practical needs,mathematical modeling methods were us... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
FADSF:A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2351-2362页
作者: Yan Sun Caiyun Liu Jun Li Yitong Liu Data security institute China Industrial Control Systems Cyber Emergency Response TeamBeijing100040China
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage *** data of ICV(intelligent connected vehicles)is the key t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Two-Layer Attention Feature Pyramid Network for Small Object Detection
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 713-731页
作者: Sheng Xiang Junhao Ma Qunli Shang Xianbao Wang Defu Chen College of Information Engineering Zhejiang University of TechnologyHangzhou310023China Binjiang Cyberspace security institute of ZJUT Hangzhou310056China
Effective small object detection is crucial in various applications including urban intelligent transportation and pedestrian ***,small objects are difficult to detect accurately because they contain less *** current ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An effective strategy for dendrite free Li metal anodes:Nickel foam decorated with high lattice-matching CoN and CoF_(2) nanosheets for dense deposition
收藏 引用
Nano Research 2024年 第5期17卷 4069-4078页
作者: Wenlong Liu Jianzong Man Xiaodong Sun Ning Zhang Yehong Du Kun Liu Zhongsheng Wen Song Li Juncai Sun institute of Materials and Technology Dalian Maritime UniversityDalian 116026China Shandong Provinvial Key Laboratory of Chemical Energy Storage and Novel Cell Technology and School of Chemistry and Chemical enginneringLiaocheng UniversityLiaocheng 252000China Department of public security Management Liaoning Police CollegeDalian 116036China
The notorious dendrite and infinite volume change seriously restrict the advancement of lithium metal anodes(LMAs),during the long-term process of stripping/***,the nanosheets of metal fluoride(CoF_(2))and metal nitri... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
New Algebraic Attacks on Grendel with the Strategy of Bypassing SPN Steps
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 635-644页
作者: Wenxiao QIAO Siwei SUN Lei HU State Key Laboratory of Information security Institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences School of Cryptology University of Chinese Academy of Sciences State Key Laboratory of Cryptology
The rapid development of modern cryptographic applications such as zero-knowledge,secure multiparty computation,fully homomorphic encryption has motivated the design of new so-called arithmetization-oriented symmetric... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论