咨询与建议

限定检索结果

文献类型

  • 108 篇 会议
  • 92 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 145 篇 工学
    • 113 篇 计算机科学与技术...
    • 102 篇 软件工程
    • 29 篇 信息与通信工程
    • 25 篇 生物工程
    • 12 篇 电子科学与技术(可...
    • 12 篇 控制科学与工程
    • 7 篇 光学工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 安全科学与工程
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 6 篇 电气工程
    • 5 篇 化学工程与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 建筑学
  • 71 篇 理学
    • 31 篇 数学
    • 26 篇 生物学
    • 22 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 系统科学
    • 6 篇 化学
  • 42 篇 管理学
    • 25 篇 图书情报与档案管...
    • 19 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 5 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 8 篇 access control
  • 8 篇 trusted computin...
  • 6 篇 semantics
  • 6 篇 cloud computing
  • 5 篇 training
  • 4 篇 indexes
  • 4 篇 authentication
  • 4 篇 hash functions
  • 4 篇 network security
  • 4 篇 quantum cryptogr...
  • 4 篇 cryptography
  • 3 篇 data privacy
  • 3 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 side channel att...
  • 3 篇 contrastive lear...
  • 3 篇 computational mo...
  • 3 篇 feature extracti...
  • 3 篇 security
  • 3 篇 protocols

机构

  • 48 篇 beijing key labo...
  • 38 篇 faculty of infor...
  • 20 篇 key laboratory o...
  • 15 篇 college of compu...
  • 13 篇 trusted computin...
  • 12 篇 key laboratory o...
  • 11 篇 school of inform...
  • 11 篇 beijing key labo...
  • 10 篇 national enginee...
  • 9 篇 university of ch...
  • 8 篇 tencent youtu la...
  • 8 篇 guangxi key labo...
  • 8 篇 school of comput...
  • 6 篇 school of medici...
  • 6 篇 beijing key labo...
  • 5 篇 peng cheng labor...
  • 5 篇 china industrial...
  • 5 篇 state key labora...
  • 5 篇 state key labora...
  • 4 篇 national enginee...

作者

  • 18 篇 duan lijuan
  • 14 篇 zhang jianbiao
  • 12 篇 ji rongrong
  • 9 篇 zhang yan
  • 9 篇 zheng xiawu
  • 8 篇 hu runze
  • 8 篇 shen yunhang
  • 8 篇 li xudong
  • 8 篇 li ke
  • 7 篇 lijuan duan
  • 6 篇 liu yutao
  • 6 篇 tu shanshan
  • 6 篇 qiao yuanhua
  • 6 篇 jianbiao zhang
  • 6 篇 feng dengguo
  • 5 篇 zhan jing
  • 5 篇 zheng jingyuan
  • 5 篇 dai pingyang
  • 5 篇 dengguo feng
  • 5 篇 yang zhen

语言

  • 192 篇 英文
  • 6 篇 其他
  • 3 篇 中文
检索条件"机构=Beijing Key Laboratory of Trusted Computing"
201 条 记 录,以下是41-50 订阅
排序:
IRS-Aided Mobile Edge computing for Mine IoT Networks using Deep Reinforcement Learning
IRS-Aided Mobile Edge Computing for Mine IoT Networks using ...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Zhang, Peng Min, Minghui Xiao, Jiayang Li, Shiyin Zhang, Hongliang China University of Mining and Technology School of Information and Control Engineering Xuzhou221116 China Xuzhou First People's Hospital Xuzhou221116 China Ministry of Education School of CyberScience and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China Peking University School of Electronics Beijing100871 China
Recent years have witnessed a growing interest in implementing mobile edge computing (MEC) into mine Internet of Things (IoT) networks to enable real-time monitoring and safety management. However, the spatial blockag... 详细信息
来源: 评论
A Review on Assured Deletion of Cloud Data Based on Cryptography
收藏 引用
Procedia Computer Science 2021年 187卷 580-585页
作者: Guan Wang Yehong Luo Faculty of Information Technology Beijing University of Technology Beijing 100124 Beijing Key Laboratory of Trusted Computing Beijing 100124
In the cloud computing environment, storage is used for users to provide data outsourcing services. After users outsource data to the cloud, privacy protection has become a key concern. As far as we know, there is no ... 详细信息
来源: 评论
An automated method with anchor-free detection and U-shaped segmentation for nuclei instance segmentation  2
An automated method with anchor-free detection and U-shaped ...
收藏 引用
2nd ACM International Conference on Multimedia in Asia, MMAsia 2020
作者: Feng, Xuan Duan, Lijuan Chen, Jie Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China Natl. Engineering Laboratory of Critical Technologies of Information Security Classified Protection Beijing100124 China Peng Cheng Laboratory Shenzhen518055 China
Nuclei segmentation plays an important role in cancer diagnosis. Automated methods for digital pathology become popular due to the developments of deep learning and neural networks. However, this task still faces chal... 详细信息
来源: 评论
The Controlled Sharing Mechanism for Private Data Based on Blockchain  6
The Controlled Sharing Mechanism for Private Data Based on B...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Wenqing, Li Wenjie, Dong Xu, Zhang Yueming, Lu School Of Cyberspace Security Beijing University Of Posts And Telecommunications Beijing China Beijing Aerospace Automatic Control Institute Beijing China Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trusted Distributed Computing And Service Beijing China
In order to solve the problems that private information is easy to be leaked and privacy violations are difficult to be traced in the process of data cross-domain transferring, we propose a blockchain-based controlled... 详细信息
来源: 评论
A Survey of Deep Visual Cross-Domain Few-Shot Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Wenjian Duan, Lijuan Wang, Yuxi Fan, Junsong Gong, Zhi Zhang, Zhaoxiang Faculty of Information Technology Beijing University of Technology China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China Centre for Artificial Intelligence and Robotics HKISI_CAS Institute of Automation Chinese Academy of Sciences [NLPR CASIA UCAS China
Few-Shot transfer learning has become a major focus of research as it allows recognition of new classes with limited labeled data. While it is assumed that train and test data have the same data distribution, this is ... 详细信息
来源: 评论
BPN: Bidirectional Path Network for Instance Segmentation  1st
BPN: Bidirectional Path Network for Instance Segmentation
收藏 引用
1st CAAI International Conference on Artificial Intelligence, CICAI 2021
作者: Xu, Fan Duan, Lijuan Qiao, Yuanhua Faculty of Information Technology Beijing University of Technology Beijing China Peng Cheng Laboratory Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing University of Technology Beijing China College of Mathematics and Physics Beijing University of Technology Beijing China
The feature pyramid network (FPN) has achieved impressive results in the field of object detection and instance segmentation by aggregating features of different scales, especially the detection of small objects. Howe... 详细信息
来源: 评论
A Survey of Deep Models for Cross-Domain Few-Shot Visuallearning
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Wenjian Duan, Lijuan Wang, Yuxi Fan, Junsong Gong, Zhi Zhang, Zhaoxiang Faculty of Information Technology Beijing University of Technology China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China Centre for Artificial Intelligence and Robotics HKISI CAS Hong Kong Institute of Automation Chinese Academy of Sciences NLPR CASIA UCAS China
Few-Shot transfer learning uses limited labeled data to recognise the new classes. Current researches assume that train and test data have the same data distribution. But this setting is strict and difficult to guaran... 详细信息
来源: 评论
BackCache: Mitigating Contention-Based Cache Timing Attacks by Hiding Cache Line Evictions
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Quancheng Zhang, Xige Wang, Han Gu, Yuzhe Tang, Ming Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan430072 China Beijing Smartchip Microelectronics Technology Co. Ltd. Beijing100192 China
Caches are used to reduce the speed gap between the CPU and memory to improve the performance and efficiency of modern processors. However, attackers can use contention-based cache timing attacks to steal sensitive in... 详细信息
来源: 评论
Classification of epilepsy period based on combination feature extraction methods and spiking swarm intelligent optimization algorithm
Classification of epilepsy period based on combination featu...
收藏 引用
作者: Duan, Lijuan Lian, Zhaoyang Chen, Juncheng Qiao, Yuanhua Miao, Jun Li, Mingai Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing University of Technology Beijing China Applied Sciences Beijing University of Technology Beijing China School of Computer Science Beijing Information Science and Technology University Beijing China
Epilepsy seriously damages the physical and mental health of patients. Detection of epileptic EEG signals in different periods can help doctors diagnose the disease. The change of frequency components during epilepsy ... 详细信息
来源: 评论
Research on Cross-Chain Technology Architecture System Based on Blockchain  8th
Research on Cross-Chain Technology Architecture System Based...
收藏 引用
8th International Conference on Communications, Signal Processing, and Systems, CSPS 2019
作者: Zhang, Jianbiao Liu, Yanhui Zhang, Zhaoqian Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China
With the development of blockchain technology, blockchain technology has strong vitality in various industries due to its characteristics of dispersion, anti-mite modification and traceability. Blockchain technology a... 详细信息
来源: 评论