咨询与建议

限定检索结果

文献类型

  • 5,780 篇 期刊文献
  • 230 篇 会议

馆藏范围

  • 6,010 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,278 篇 工学
    • 1,888 篇 计算机科学与技术...
    • 1,071 篇 电气工程
    • 901 篇 信息与通信工程
    • 811 篇 网络空间安全
    • 799 篇 电子科学与技术(可...
    • 786 篇 材料科学与工程(可...
    • 631 篇 环境科学与工程(可...
    • 626 篇 控制科学与工程
    • 523 篇 软件工程
    • 382 篇 机械工程
    • 316 篇 仪器科学与技术
    • 272 篇 化学工程与技术
    • 248 篇 水利工程
    • 246 篇 动力工程及工程热...
    • 221 篇 生物医学工程(可授...
    • 216 篇 力学(可授工学、理...
  • 2,647 篇 理学
    • 764 篇 数学
    • 634 篇 生物学
    • 536 篇 物理学
    • 429 篇 化学
    • 317 篇 生态学
    • 302 篇 天文学
    • 265 篇 地球物理学
    • 210 篇 大气科学
  • 786 篇 农学
    • 352 篇 作物学
    • 285 篇 农业资源与环境
  • 761 篇 管理学
    • 312 篇 管理科学与工程(可...
  • 712 篇 法学
    • 421 篇 政治学
  • 616 篇 医学
    • 387 篇 临床医学
  • 512 篇 经济学
    • 451 篇 应用经济学
  • 237 篇 军事学
  • 79 篇 教育学
  • 59 篇 艺术学
  • 58 篇 文学
  • 16 篇 历史学
  • 6 篇 哲学

主题

  • 180 篇 security
  • 111 篇 中国
  • 92 篇 blockchain
  • 72 篇 deep learning
  • 59 篇 food security
  • 58 篇 and
  • 49 篇 cryptography
  • 47 篇 china
  • 44 篇 internet of thin...
  • 42 篇 privacy
  • 37 篇 system
  • 35 篇 network
  • 33 篇 cooperation
  • 33 篇 climate change
  • 32 篇 model
  • 32 篇 rice
  • 31 篇 authentication
  • 28 篇 policy
  • 28 篇 intrusion detect...
  • 27 篇 analysis

机构

  • 123 篇 shanghai institu...
  • 106 篇 university of ch...
  • 86 篇 state key labora...
  • 44 篇 university of ch...
  • 30 篇 state key labora...
  • 28 篇 school of cyber ...
  • 28 篇 institute of geo...
  • 28 篇 ieee
  • 28 篇 school of cyber ...
  • 27 篇 school of cyber ...
  • 23 篇 china institute ...
  • 20 篇 department of co...
  • 18 篇 institute of inf...
  • 18 篇 middle east stud...
  • 17 篇 center of excell...
  • 17 篇 institute of geo...
  • 16 篇 state key labora...
  • 16 篇 state key labora...
  • 15 篇 institute of geo...
  • 15 篇 institute of inf...

作者

  • 16 篇 dhanushka n.wana...
  • 15 篇 lin dongdai
  • 15 篇 rui zhang
  • 14 篇 lei zhang
  • 14 篇 wei wang
  • 13 篇 yu zhang
  • 13 篇 bo wang
  • 12 篇 jian wang
  • 12 篇 lin ma
  • 12 篇 kevin d.hyde
  • 11 篇 mingkwan doilom
  • 11 篇 chayanard phukha...
  • 11 篇 jie chen
  • 11 篇 hua zhang
  • 11 篇 wei huang
  • 11 篇 lei wang
  • 11 篇 pinjing he
  • 11 篇 wei li
  • 11 篇 yang yang
  • 10 篇 xiaohu dai

语言

  • 5,653 篇 英文
  • 357 篇 中文
检索条件"机构=Third Institute of Ministry of Public Security"
6010 条 记 录,以下是31-40 订阅
排序:
A Generalized MSST Algorithm for Counting Points of Elliptic Curves over F_(p)^(n)
收藏 引用
Journal of Systems Science & Complexity 2024年 第4期37卷 1738-1754页
作者: LI Xiao LV Chang PAN Zhizhong Key Laboratory of Cyberspace security Defense Institute of Information EngineeringChinese Academy of SciencesBeijing 100085China School of Cyber security University of Chinese Academy of SciencesBeijing 100085China Huawei Technologies Co. Ltd.Shenzhen 518129China
Elliptic curve cryptography is an important part of nowaday's public key *** points of elliptic curves over finite fields is of great significance to the selection of safety *** present,there are many p-adic algorithm... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第7期140卷 1045-1075页
作者: Hao Jiang Yuerong Liao Dongdong Zhao Wenjian Luo Xingyi Zhang Key Laboratory of Intelligent Computing and Signal Processing of ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei230601China Chongqing Research institute School of Computer Science and Artificial IntelligenceWuhan University of TechnologyWuhan430070China Guangdong Provincial Key Laboratory of Novel security Intelligence Technologies School of Computer Science and TechnologyHarbin Institute of TechnologyShenzhen518055China
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many *** by the self-nonself discrimination par... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
MRm-DLDet:a memory-resident malware detection framework based on memory forensics and deep neural network
收藏 引用
Cybersecurity 2024年 第1期7卷 88-109页
作者: Jiaxi Liu Yun Feng Xinyu Liu Jianjun Zhao Qixu Liu institute of Information Engineering Chinese Academy of SciencesBeijing 100085China School of Cyber security University of Chinese Academy of SciencesBeijing 100049China
Cyber attackers have constantly updated their attack techniques to evade antivirus software detection in recent *** popular evasion method is to execute malicious code and perform malicious actions only in ***-cious p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A strategy to synthesize phosphorus-containing nickel phyllosilicate whiskers to enhance the flame retardancy of epoxy composites with excellent mechanical and dry-friction properties
收藏 引用
Frontiers of Chemical Science and Engineering 2024年 第3期18卷 39-50页
作者: Shibin Nie Zongquan Zhao Yuxuan Xu Wei He Wenli Zhai Jinian Yang School of public security and Emergency Management Anhui University of Science and TechnologyHefei231131China School of Safety Science and Engineering Anhui University of Science and TechnologyHuainan232001China School of Materials Science and Engineering Anhui University of Science and TechnologyHuainan232001China institute of Energy Hefei Comprehensive National Science CenterHefei230000China
To enhance the fire safety and wear resistance of epoxy,phosphorus-containing nickel phyllosilicate whiskers(FP-NiPS)were synthesized using a facile hydrothermal technology,with 9,10-dihydro-9-oxa-10-phosphaphenanthre... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Anomaly Detection in Imbalanced Encrypted Traffic with Few Packet Metadata-Based Feature Extraction
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 585-607页
作者: Min-Gyu Kim Hwankuk Kim Department of Financial Information security Kookmin UniversitySeoul02707Republic of Korea Department of Information security Cryptography Mathematics Kookmin UniversitySeoul02707Republic of Korea
In the IoT(Internet of Things)domain,the increased use of encryption protocols such as SSL/TLS,VPN(Virtual Private Network),and Tor has led to a rise in attacks leveraging encrypted *** research on anomaly detection u... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 1881-1895页
作者: Xiao Feng Zheng Yuan Cyber security Academy Beijing University of Posts and TelecommunicationsBeijing100876China Department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China State Grid Info-Telecom Great Power Science and Technology Co. Ltd.Beijing102211China
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient privacy-preserving federated learning under dishonest-majority setting
收藏 引用
Science China(Information Sciences) 2024年 第5期67卷 323-324页
作者: Yinbin MIAO Da KUANG Xinghua LI Tao LENG Ximeng LIU Jianfeng MA School of Cyber Engineering Xidian University Intelligent Policing Key Laboratory of Sichuan Province Sichuan Police College institute of Information Engineering Chinese Academy of Sciences School of Cyber security University of Chinese Academy of Sciences Key Laboratory of Information security of Network Systems Fuzhou University
Federated learning(FL) is an emerging distributed learning paradigm that solves the problem of isolated data by jointly learning the global model through distributed ***, recent studies have shown that FL may not alwa...
来源: 同方期刊数据库 同方期刊数据库 评论
Novel Rifle Number Recognition Based on Improved YOLO in Military Environment
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 249-263页
作者: Hyun Kwon Sanghyun Lee Department of Artificial Intelligence and Data Science Korea Military AcademySeoulKorea Graduate School of Information security Korea Advanced Institute of Science and TechnologyDaejeonKorea
Deep neural networks perform well in image recognition,object recognition,pattern analysis,and speech *** military applications,deep neural networks can detect equipment and recognize *** military equipment,it is nece... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for public Blockchain
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian institute of Big Data security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论