咨询与建议

限定检索结果

文献类型

  • 106 篇 会议
  • 91 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 141 篇 工学
    • 111 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 27 篇 信息与通信工程
    • 25 篇 生物工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 控制科学与工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 安全科学与工程
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 6 篇 光学工程
    • 5 篇 电气工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
  • 70 篇 理学
    • 31 篇 数学
    • 26 篇 生物学
    • 21 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
  • 41 篇 管理学
    • 25 篇 图书情报与档案管...
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 8 篇 access control
  • 8 篇 trusted computin...
  • 6 篇 semantics
  • 6 篇 cloud computing
  • 5 篇 training
  • 4 篇 indexes
  • 4 篇 authentication
  • 4 篇 hash functions
  • 4 篇 network security
  • 4 篇 quantum cryptogr...
  • 4 篇 cryptography
  • 3 篇 data privacy
  • 3 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 side channel att...
  • 3 篇 contrastive lear...
  • 3 篇 computational mo...
  • 3 篇 security
  • 3 篇 protocols
  • 3 篇 privacy

机构

  • 48 篇 beijing key labo...
  • 38 篇 faculty of infor...
  • 19 篇 key laboratory o...
  • 15 篇 college of compu...
  • 13 篇 trusted computin...
  • 11 篇 beijing key labo...
  • 11 篇 key laboratory o...
  • 10 篇 school of inform...
  • 10 篇 national enginee...
  • 9 篇 university of ch...
  • 8 篇 guangxi key labo...
  • 8 篇 school of comput...
  • 7 篇 tencent youtu la...
  • 6 篇 school of medici...
  • 6 篇 beijing key labo...
  • 5 篇 peng cheng labor...
  • 5 篇 china industrial...
  • 5 篇 state key labora...
  • 5 篇 state key labora...
  • 4 篇 national enginee...

作者

  • 18 篇 duan lijuan
  • 14 篇 zhang jianbiao
  • 12 篇 ji rongrong
  • 8 篇 zhang yan
  • 8 篇 zheng xiawu
  • 7 篇 hu runze
  • 7 篇 lijuan duan
  • 7 篇 shen yunhang
  • 7 篇 li xudong
  • 7 篇 li ke
  • 6 篇 liu yutao
  • 6 篇 tu shanshan
  • 6 篇 qiao yuanhua
  • 6 篇 jianbiao zhang
  • 6 篇 feng dengguo
  • 5 篇 zhan jing
  • 5 篇 zheng jingyuan
  • 5 篇 dai pingyang
  • 5 篇 dengguo feng
  • 5 篇 yang zhen

语言

  • 192 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"机构=Beijing Key Laboratory of Trusted Computing"
198 条 记 录,以下是1-10 订阅
排序:
Behavior-based dynamic trusted measurement scheme  3
Behavior-based dynamic trusted measurement scheme
收藏 引用
3rd International Conference on Electronic Information Engineering, Big Data, and Computer Technology, EIBDCT 2024
作者: Han, Xianqun Zhang, Jianbiao Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China
trusted computing is an effective means of system security protection, encompassing various security solutions. However, these solutions exhibit individual shortcomings, such as the co-location of protective code and ... 详细信息
来源: 评论
IOWA-Based Dynamic trusted Assessment Model for System Operational State Behavior  11th
IOWA-Based Dynamic Trusted Assessment Model for System Opera...
收藏 引用
11th International Conference on Communications, Signal Processing, and Systems, CSPS 2022
作者: Huang, Haoxiang Zhang, Jianbiao Liu, Yanhui Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China
In the era of "digital intelligence", the security of critical information systems is vitally important. We propose a trusted assessment model to guarantee the trusted of the system operation process, which ... 详细信息
来源: 评论
Fine-Grained Zero-Shot Object Detection via Semantic Decoupling  24
Fine-Grained Zero-Shot Object Detection via Semantic Decoupl...
收藏 引用
8th International Conference on Computer Science and Artificial Intelligence, CSAI 2024
作者: Duan, Lijuan Zhang, Zichen Gong, Zhi Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China School of Computer Science Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China
Recent deep learning models have advanced object detection capabilities, but their reliance on labeled data limits scalability. Fine-grained zero-shot detection remains challenging due to the need to generalize to uns... 详细信息
来源: 评论
Blockchain-Driven Revocable Ciphertext-Policy Attribute-Based Encryption for Public Cloud Data Sharing  11th
Blockchain-Driven Revocable Ciphertext-Policy Attribute-Base...
收藏 引用
11th International Conference on Communications, Signal Processing, and Systems, CSPS 2022
作者: Zhang, Zhaoqian Zhang, Jianbiao Kang, Shuang Li, Zheng Faculty of Information Technology Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China
Sharing data through the public cloud has turned into a popular way to exploit the data value today, and ciphertext-policy attribute-based encryption (CP-ABE) can protect data confidentiality while improving sharing e... 详细信息
来源: 评论
Analysis and Research on Dynamic Measurements Technology  11th
Analysis and Research on Dynamic Measurements Technology
收藏 引用
11th International Conference on Communications, Signal Processing, and Systems, CSPS 2022
作者: Fu, Yingfang Huang, Haoxiang Zhang, Jianbiao Trusted Native Technology Department of Ant Group Beijing Beijing China Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China
In cloud computing environments characterized by "dynamics", the traditional static measurement to ensure the trust of the platform system is difficult to guarantee the trust of four dimensions in the cloud ... 详细信息
来源: 评论
JSVulExplorer:A JavaScript Vulnerability Detection Model Based on Transfer Learning  5
JSVulExplorer:A JavaScript Vulnerability Detection Model Ba...
收藏 引用
5th International Conference on Computer Information Science and Artificial Intelligence, CISAI 2022
作者: Chen, Shengquan Jiang, Nan Wu, Zheng Wang, Zichen Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China
Software vulnerabilities will make the system vulnerable to attack, affect the reliability of the software and cause information leakage, which will have a huge impact on enterprises or individuals. Vulnerabilities ar... 详细信息
来源: 评论
Quantum Hash Function of Continuous-time Quantum Walk based on Cycle under Broken-line Decoherent Noise
Quantum Hash Function of Continuous-time Quantum Walk based ...
收藏 引用
2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023
作者: Shi, Wei-Min Tian, Pan Zhou, Yi-Hua Yang, Yu-Guang College of Computer Science and Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China
The existing Hash functions based on quantum walk construction are all proposed under the ideal closed environment. In order to better conform to the actual situation and improve the relevant performance of Hash funct... 详细信息
来源: 评论
Adaptive Early Warning Method of Cascading Failures Caused by Coordinated Cyber-Attacks
收藏 引用
CSEE Journal of Power and Energy Systems 2025年 第1期11卷 406-423页
作者: Yufei Wang June Li Jian Qiu Yangrong Chen Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan Hubei430072China China Electric Power Research Institute Beijing102209China Electric Power Planning&Engineering Institute Beijing 100120China
In order to accurately receive early warning of the cascading failures caused by coordinated cyber-attacks(CFCC)in grid cyber-physical systems(GCPS),an adaptive early warning method of CFCC is ***,the evolutionary mec... 详细信息
来源: 评论
Learning EEG synchronization patterns for epileptic seizure prediction using bag-of-wave features
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第11期14卷 15557-15572页
作者: Cui, Song Duan, Lijuan Qiao, Yuanhua Xiao, Ying Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
Epileptic seizure prediction has the potential to promote epilepsy care and treatment. However, the seizure prediction accuracy does not satisfy the application requirements. In this paper, a novel framework for seizu... 详细信息
来源: 评论
Epileptic Spike Detection Based on Deep Learning  23
Epileptic Spike Detection Based on Deep Learning
收藏 引用
9th International Conference on computing and Artificial Intelligence, ICCAI 2023
作者: Duan, Lijuan Cui, Yuanqi Wang, Yao Wang, Zeyu Cao, Min Qiao, Yuanhua Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China College of Applied Science Beijing University of Technology University Beijing China
Epilepsy is a chronic disease with high prevalence and high disease burden. Electroencephalogram (EEG) is one of the most important tools for diagnosing epilepsy. Detection of epileptic spikes from EEG can effectively... 详细信息
来源: 评论