咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是111-120 订阅
排序:
The effects of perfluoroalkyl substance pollution on microbial community and key metabolic pathways in the Pearl River Estuary
收藏 引用
Ecotoxicology and Environmental Safety 2025年 298卷 118293页
作者: Lin, Wei Zhao, Junlin Wu, Xingqi Jiang, Jiakun Zhou, Chunyang Zheng, Jiating Zhang, Cheng Guo, Ying Wang, Li Ng, How Yong Li, Song Wang, Shengrui Guangdong-Hong Kong Joint Laboratory for Water Security Center for Water Research Advanced Institute of Natural Sciences Beijing Normal University Zhuhai 519087 China Center for Statistics and Data Science Beijing Normal University Zhuhai 519087 China Key Laboratory of Poyang Lake Environment and Resource Utilization Ministry of Education School of Resource and Environment Nanchang University Nanchang 330031 China School of Chemical Engineering and Technology Sun Yat-sen University Zhuhai 519082 China Instrumentation and Service Center for Science and Technology Beijing Normal University Zhuhai 519087 China Scientific Institute of Pearl River Water Resources Protection Guangzhou 510610 China Technical Centre for Ecology and Environment of Soil Agriculture and Rural Areas Ministry of Ecology and Environment Beijing 100012 China College of Resources and Environment Yunnan Agricultural University Kunming 650201 China
The extensive use of perfluoroalkyl substances (PFASs) has raised significant concerns regarding their adverse environmental implications. However, the understanding of their behaviors and biological effects in natura... 详细信息
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
Learning EEG synchronization patterns for epileptic seizure prediction using bag-of-wave features
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第11期14卷 15557-15572页
作者: Cui, Song Duan, Lijuan Qiao, Yuanhua Xiao, Ying Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
Epileptic seizure prediction has the potential to promote epilepsy care and treatment. However, the seizure prediction accuracy does not satisfy the application requirements. In this paper, a novel framework for seizu... 详细信息
来源: 评论
Analysis and study on detection of credict fraud in E-commerce
Analysis and study on detection of credict fraud in E-commer...
收藏 引用
International Conference on Future Computer Science and Education
作者: Deng, Kaiyong Zhang, Ru Zhang, Dongfang Jiang, Wen Feng Niu, Xinxin Guo, Hong Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China Key Lab. of Information Network Security of Ministry of Public Security Shanghai China
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is studied. The weakness of the algorithm for detecting financial fraud via Benford correlat... 详细信息
来源: 评论
QoS-oriented packet scheduling scheme for opportunistic networks
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2017年 第3期24卷 51-57页
作者: Yao Wenbin Chen Yin Zong Ming Wang Dongbin Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications School of Computer Science Beijing University of Posts and Telecommunications Yingcai Honors College University of Electronic Science and Technology of China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications
The unique characteristics of opportunistic networks (ONs), such as intermittent connectivity and limited network resources, makes it difficult to support quality of service (QoS) provisioning, particularly to gua... 详细信息
来源: 评论
SHFuzz:A Hybrid Fuzzing Method Assisted by Static Analysis for Binary Programs
收藏 引用
China Communications 2021年 第8期18卷 1-16页
作者: Wenjie Wang Donghai Tian Rui Ma Hang Wei Qianjin Ying Xiaoqi Jia Lei Zuo School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China Key Laboratory of Network Assessment Technology Institute of Information EngineeringChinese Academy of SciencesBeijing 100049China School of Cyber Security University of Chinese Academy of SciencesBeijing 100049China NSFOCUS Inc. Beijing 100089China
Fuzzing is an effective technique to find security bugs in programs by quickly exploring the input space of *** further discover vulnerabilities hidden in deep execution paths,the hybrid fuzzing combines fuzzing and c... 详细信息
来源: 评论
An approach to the formal verification of the three-principal cryptographic protocols
An approach to the formal verification of the three-principa...
收藏 引用
作者: Zhang, Yuqing Liu, Xiuying State Key Laboratory of Information Security GSCAS Beijing 100039 China National Computer Network Intrusion Protection Center GSCAS Beijing 100039 China
Based on the model checking theory, we derive the Running-Mode Analysis of three-principal cryptographic protocols from the Running-Mode Analysis of two-principal cryptographic protocols. To test this method, we analy... 详细信息
来源: 评论
Multi-dimensional Intelligent network Asset Identification  6
Multi-dimensional Intelligent Network Asset Identification
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Xiong, Yi Zhang, Xiaoyan Pang, Ling Lin, Zhechao Topsec Network Technology Inc. Beijing China National Key Laboratory Of Science And Technology On Information System Security Beijing China
In the field of cyberspace detection and identification, how to improve the accuracy of asset identification is always a great challenge for people. This paper proposes a multi-input fusion model based on TextRCNN, wh... 详细信息
来源: 评论
Minimum length key in MST cryptosystems
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 142-152页
作者: Haibo HONG Licheng WANG Haseeb AHMAD Yixian YANG Zhiguo QU School of Computer Science and Information Engineering Zhejiang Gongshang University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
As a special factorization category of finite groups, logarithmic signature(LS) is used as the main component of cryptographic keys that operate within secret key cryptosystems such as PGM and public key cryptosystems... 详细信息
来源: 评论
Unveiling the corrosion evolution and pitting mechanism of X70 pipeline steel in typical near-neutral/bentonite soil environment
收藏 引用
Journal of Materials Science & technology 2025年
作者: Guangming Yang Lulu Zeng Hua Shen Huaiyun Cui Tianqi Chen Zengyao Chen Chengwei Xu Chao Liu Feng Huang Zhiyong Liu Zhichao Che Cuiwei Du Xiaogang Li Key Laboratory for Corrosion and Protection (MOE) Institute of Advanced Materials and Technology University of Science and Technology Beijing Beijing 100083 China National Materials Corrosion and Protection Scientific Data Center University of Science and Technology Beijing Beijing 100083 China Jilin Oilfield Company China National Petroleum Corporation Songyuan 138000 China Corrosion and control Research Center Branch of Science and Technology Research Institute of National Oil and Gas Pipeline Network Group Co Tianjin 300457 China The State Key Laboratory of Refractories and Metallurgy Wuhan University of Science and Technology Wuhan 430081 China School of Metallurgical and Ecological Engineering University of Science and Technology Beijing Beijing 100083 China
This work investigated the effect of dissolved oxygen (DO) on the corrosion behavior and pitting mechanism of X70 pipeline steel in near-neutral soil-bentonite simulated environment. The localized corrosion evolution ...
来源: 评论