咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 623 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
665 条 记 录,以下是91-100 订阅
排序:
Cyber Threat Intelligence Entity Extraction Based on Deep Learning and Field Knowledge Engineering  25
Cyber Threat Intelligence Entity Extraction Based on Deep Le...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Xuren Liu, Runshi Yang, Jie Chen, Rong Ling, Zhiting Yang, Peian Zhang, Kai Capital Normal University Information Engineering College Beijing China Chinese Academy of Sciences Key Laboratory of Network Assessment Technology Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
The typical domain characteristics of Cyber Threat Intelligence (CTI), such as fuzzy entity boundary, polysemy or a single word corresponding to multiple word expressions and so on, makes the entity recognition result... 详细信息
来源: 评论
Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation networks Based on Multi-Head Relational Graph Attention  19
Learning Cyber Threat Intelligence Knowledge Graph Embedding...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Wang, Xuren Chen, Rong Song, Binghua An, Jungang Jiang, Jun Wang, Jian Yang, Peian Capital Normal University Information Engineering College Beijing China Key Laboratory of Network Assessment Technology Institute of Information Engineering Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
Cyber threat intelligence (CTI) Knowledge Graphs Embedding (KGE) complete the tasks such as KG complementation by retaining the structural information of the graph and mining the implicit relations between entities, w... 详细信息
来源: 评论
The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence  25
The Hyperbolic Temporal Attention Based Differentiable Neura...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Song, Binghua Chen, Rong Liu, Baoxu Jiang, Zhengwei Wang, Xuren Chinese Academy of Sciences Key Laboratory of Network Assessment Technology Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China Capital Normal University Information Engineering College Beijing China
Cyber Threat Intelligence (CTI) is an effective approach to solve cyber security problems, finding unknown threats is becoming a problem to be solved. Research based on threat intelligence knowledge graphs has gradual... 详细信息
来源: 评论
Fairness of Large Music Models: From a Culturally Diverse Perspective  9
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Qinyuan Gu, Bruce Zhang, He Li, Yunfeng University of Sydney School of Music NSW2008 Australia Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250031 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan250031 China CNPIEC KEXIN Ltd. Beijing100020 China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论
A New Method of Construction of Permutation Trinomials with Coefficients 1
A New Method of Construction of Permutation Trinomials with ...
收藏 引用
IEEE International Conference on Big Data security on Cloud (BigDatasecurity), High Performance and Smart Computing (HPSC) and Intelligent Data and security (IDS)
作者: Hua Guo Shuo Wang Hutao Song Yiran Han Xiyong Zhang Jianwei Liu Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology Beihang University State Key Laboratory of Software Development Environment Beihang University Beijing China School of Electronic and Information Engineering Beihang University Beijing China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology Beihang University Beijing China Beijing Institute of Satellite Information Engineering Beijing China
While big data technology is developing rapidly, it also brings numerous security and privacy issues, such as the security of communication between devices in Internet of Things and the confidentiality of stored data.... 详细信息
来源: 评论
Construction of Integrated protection System for Industrial Control System Based on Trusted Computing
Construction of Integrated Protection System for Industrial ...
收藏 引用
2021 International Conference on Intelligent Computing, Automation and Applications, ICAA 2021
作者: Tao, Yuan Hu, Wei Li, Sheng Third Research Institute of Ministry of Public Security Shanghai China National Engineering Laboratory for Key Technology of Classified Information Security Protection Beijing China
Industrial control system requires high availability. In principle, security measures should not adversely affect the basic functions of high availability industrial control system. The method of building a secure and... 详细信息
来源: 评论
PPA: Preference Profiling Attack Against Federated Learning  30
PPA: Preference Profiling Attack Against Federated Learning
收藏 引用
30th Annual network and Distributed System security Symposium, NDSS 2023
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Syndey Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
—Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and ...
来源: 评论
Federated Collaborative Filtering Recommendation Based on Semi-Homomorphic Encryption
Federated Collaborative Filtering Recommendation Based on Se...
收藏 引用
IEEE International Conference on Cloud Computing and Big Data Analysis (ICCCBDA)
作者: Xiaohan Niu Xing Zhang Zhiguang Chu Xiang Li School of Electronics and Information Engineering Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Liaoning University of Technology Jinzhou China Faculty of Information Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Beijing University of Technology Jinzhou China
Federated collaborative filtering trains models by uploading gradients to achieve privacy protection. Recent studies have shown that gradients have the risk of compromising user privacy. To address this problem, this ...
来源: 评论
Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm  9th
Research and Implementation of Hybrid Encryption System Base...
收藏 引用
9th International Conference on Computer Engineering and networks, CENet2019
作者: Wang, Zhiqiang Dong, Hongyu Chi, Yaping Zhang, Jianyi Yang, Tao Liu, Qixu Beijing Electronic Science and Technology Institute Beijing China State Information Center Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China Key Laboratory of Network Assessment Technology Institute of Information Engineering Chinese Academy of Sciences Beijing China
In recent years, the mobile platform network communication performance has made significant progress, with an increasingly large user base and market platform. At the same time, it also brings many problems such as th... 详细信息
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论