咨询与建议

限定检索结果

文献类型

  • 3,003 篇 期刊文献
  • 119 篇 会议

馆藏范围

  • 3,122 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,247 篇 工学
    • 1,012 篇 计算机科学与技术...
    • 536 篇 电气工程
    • 478 篇 材料科学与工程(可...
    • 477 篇 网络空间安全
    • 456 篇 信息与通信工程
    • 435 篇 电子科学与技术(可...
    • 300 篇 环境科学与工程(可...
    • 282 篇 控制科学与工程
    • 282 篇 软件工程
    • 187 篇 机械工程
    • 157 篇 仪器科学与技术
    • 153 篇 化学工程与技术
    • 132 篇 生物医学工程(可授...
    • 121 篇 水利工程
    • 111 篇 力学(可授工学、理...
  • 1,433 篇 理学
    • 377 篇 生物学
    • 356 篇 数学
    • 338 篇 物理学
    • 244 篇 化学
    • 183 篇 天文学
    • 166 篇 生态学
    • 136 篇 地球物理学
  • 468 篇 管理学
    • 240 篇 管理科学与工程(可...
  • 465 篇 医学
    • 284 篇 临床医学
    • 156 篇 公共卫生与预防医...
    • 129 篇 基础医学(可授医学...
  • 428 篇 农学
    • 207 篇 作物学
    • 143 篇 农业资源与环境
  • 260 篇 法学
  • 175 篇 经济学
    • 145 篇 应用经济学
  • 147 篇 军事学
    • 137 篇 军队指挥学
  • 52 篇 教育学
  • 28 篇 艺术学
  • 24 篇 文学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 108 篇 security
  • 80 篇 blockchain
  • 66 篇 china
  • 50 篇 deep learning
  • 47 篇 climate change
  • 41 篇 food security
  • 35 篇 machine learning
  • 30 篇 cloud computing
  • 27 篇 system
  • 26 篇 internet of thin...
  • 23 篇 中国
  • 23 篇 privacy protecti...
  • 22 篇 network
  • 22 篇 information secu...
  • 21 篇 analysis
  • 20 篇 quantum
  • 20 篇 network security
  • 19 篇 federated learni...
  • 18 篇 privacy
  • 18 篇 and

机构

  • 52 篇 university of ch...
  • 48 篇 shanghai institu...
  • 42 篇 information secu...
  • 35 篇 information secu...
  • 27 篇 information secu...
  • 22 篇 state key labora...
  • 19 篇 information secu...
  • 19 篇 china informatio...
  • 17 篇 center of excell...
  • 15 篇 school of inform...
  • 14 篇 national enginee...
  • 13 篇 national compute...
  • 13 篇 university of ch...
  • 13 篇 school of scienc...
  • 12 篇 beijing national...
  • 12 篇 national compute...
  • 11 篇 ieee
  • 11 篇 data assurance a...
  • 11 篇 state key labora...
  • 10 篇 department of en...

作者

  • 24 篇 xiu-bo chen
  • 19 篇 gang xu
  • 16 篇 kevin d.hyde
  • 15 篇 yixian yang
  • 13 篇 dhanushka n.wana...
  • 13 篇 yang yixian
  • 12 篇 xiubo chen
  • 12 篇 liang jin
  • 12 篇 jieren cheng
  • 12 篇 fusuo zhang
  • 12 篇 yang yi-xian
  • 11 篇 mingkwan doilom
  • 11 篇 陈秀波
  • 11 篇 chayanard phukha...
  • 11 篇 jiangxing wu
  • 11 篇 李宏伟
  • 11 篇 jian li
  • 10 篇 jian wang
  • 10 篇 lin ma
  • 10 篇 kaizhi huang

语言

  • 3,035 篇 英文
  • 87 篇 中文
检索条件"机构=lnformntion Security Center"
3122 条 记 录,以下是1-10 订阅
排序:
Survey on Fake Information Generation,Dissemination and Detection
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 573-583页
作者: Wanqiu CUI Dawei WANG Na HAN School of National security People's Public Security University of China Big Data center of The Ministry of Public security
The current booming development of the Internet has put the public in an era of information overload,in which false information is mixed and spread *** phenomenon has seriously disturbed the social network ***,a subst... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Generic attacks on small-state stream cipher constructions in the multi-user setting
收藏 引用
Cybersecurity 2024年 第3期7卷 69-79页
作者: Jianfu Huang Ye Luo Qinggan Fu Yincen Chen Chao Wang Ling Song College of Cyber security Jinan UniversityGuangzhou 510632China National Joint Engineering Research center of Network security Detection and Protection Technology Jinan UniversityGuangzhou 510632China
Small-state stream ciphers(SSCs),which violate the principle that the state size should exceed the key size by a factor of two,still demonstrate robust security properties while maintaining a lightweight *** ciphers c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(Information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information security Technology Ltd. center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
FL-EASGD:Federated Learning Privacy security Method Based on Homomorphic Encryption
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2361-2373页
作者: Hao Sun Xiubo Chen Kaiguo Yuan Information security center State Key Laboratory ofNetworking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext ***,there is still a potential risk of privacy leakage,for example,attackers can obtain the or... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Exploring the correlation between temperature and crime:A case-crossover study of eight cities in America
收藏 引用
Journal of Safety Science and Resilience 2024年 第1期5卷 13-36页
作者: Jinming Hu Xiaofeng Hu Xin’ge Han Yan Lin Huanggang Wu Bing Shen School of Information Technology and Cyber security People’s Public Security University of ChinaBeijing 100038China center for Capital Social Safety People’s Public Security University of ChinaBeijing 100038China China Association for Public Safety Beijing 100084China School of Emergency Management and Safety Engineering China University of Mining and TechnologyBeijing 100083China School of International Police Studies People’s Public Security University of ChinaBeijing 100038China
Recent years have seen increasing academic interest in exploring the correlation between temperature and ***,it is uncertain whether similar long-term trends or seasonality(rather than causal effect)of temper-ature an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
收藏 引用
Science China(Information Sciences) 2024年 第1期67卷 308-309页
作者: Lisha YAO Lin HOU Jian WENG Feixiang ZHAO College of Cyber security Jinan University
A public-key authenticated encryption with keyword search(PAEKS)[1, 2] system overcomes the problem of an inside adversary forging searchable ciphertexts and guessing the keyword information from the given token. This...
来源: 同方期刊数据库 同方期刊数据库 评论
A New Solution to Intrusion Detection Systems Based on Improved Federated-Learning Chain
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4491-4512页
作者: Chunhui Li Hua Jiang School of Computer and Electronic Information Guangxi UniversityNanning530000China Cyber security and Information center Guangxi UniversityNanning530000China
In the context of enterprise systems,intrusion detection(ID)emerges as a critical element driving the digital transformation of *** systems spanning various sectors of enterprises geographically dispersed,the necessit... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research center of Commercial Cryptography Theory and Technology Innovation State Key Laboratory of Information security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Blockchain-Assisted Unsupervised Learning Method for Crowdsourcing Reputation Management
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第9期140卷 2297-2314页
作者: Tianyu Wang Kongyang Chen Department of Cyberspace security Guangzhou UniversityGuangzhou51006China Institute of Artificial Intelligence Guangzhou UniversityGuangzhou51006China center of Young Scholars Pazhou LabGuangzhou510335China
Crowdsourcing holds broad applications in information acquisition and dissemination,yet encounters challenges pertaining to data quality assessment and user reputation *** mechanisms stand as crucial solutions for app... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
QBIoT:A Quantum Blockchain Framework for IoT with an Improved Proof-of-Authority Consensus Algorithm and a Public-Key Quantum Signature
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1727-1751页
作者: Ang Liu Qing Zhang Shengwei Xu Huamin Feng Xiu-bo Chen Wen Liu Network and Information Management Division Beijing Electronic Science and Technology InstituteBeijing100070China Department of Cyberspace security Beijing Electronic Science and Technology InstituteBeijing100070China Information security Institute Beijing Electronic Science and Technology InstituteBeijing100070China General Office Beijing Electronic Science and Technology InstituteBeijing100070China Information security center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to ***,IoT has become an integral part of our lives,offering convenience and smart ***,the growing numbe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论