咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是141-150 订阅
排序:
A Revocable Pairing-Free Certificateless Signature Scheme Based on RSA Accumulator
A Revocable Pairing-Free Certificateless Signature Scheme Ba...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Zhuowei Shen Xiao Kou Taiyao Yang Haoqin Xu Dongbin Wang Shaobo Niu School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Intergration Minster of Education Nanjing China School of Cyberspace Security Beijing University of Post and Telecommunications Beijing China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education Beijing China
Certificateless public key cryptography (CL-PKC) has garnered significant attention in recent years due to its ability to address the complex certificate management requirements inherent in public key infrastructure (... 详细信息
来源: 评论
A Survey of Output Feedback Robust MPC for Linear Parameter Varying Systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1717-1751页
作者: Xubin Ping Jianchen Hu Tingyu Lin Baocang Ding Peng Wang Zhiwu Li the Department of Automation School of Electro-Mech-anical EngineeringXidian UniversityXi’an 710071China the Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Automation Science and EngineeringFaculty of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an 710049China the State Key Laboratory of Intelligent Manufacturing System Technology Beijing Institute of Electronic System EngineeringBeijing 100854China the College of Automation Chongqing University of Posts and TelecommunicationsChongqing 400065China the Information and Navigation College Air Force Engineering UniversityXi’an 710077China IEEE the School of Electro-Mechanical Engineering Xidian UniversityXi’an 710071 the Institute of System Engineering Macao University of Science and TechnologyMacao SARChina
For constrained linear parameter varying(LPV)systems,this survey comprehensively reviews the literatures on output feedback robust model predictive control(OFRMPC)over the past two decades from the aspects on motivati... 详细信息
来源: 评论
6G-Enabled Edge AI for Metaverse:Challenges, Methods,and Future Research Directions
收藏 引用
Journal of Communications and Information networks 2022年 第2期7卷 107-121页
作者: Luyi Chang Zhe Zhang Pei Li Shan Xi Wei Guo Yukang Shen Zehui Xiong Jiawen Kang Dusit Niyato Xiuquan Qiao Yi Wu School of Data Science and Technology Heilongjiang UniversityHarbin 150080China Institute for Cryptology and Network Security Heilongjiang UniversityHarbin 150080China SenseTime Group Limited Shenzhen 518000China Pillar of Information Systems Technology and Design Singapore University of Technology and Design.Singapore 487372Singapore School of Automation.Guangdong University of Technology and Center for Intelligenl Batch Manufacturing based on IoT TechnologyGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798.Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications.Beijing 100876China
Sixth generation(6G)enabled edge intelligence opens up a new era of Internet of everything and makes it possible to interconnect people-devices-cloud anytime,*** and more next-generation wireless network smart service... 详细信息
来源: 评论
A Nature-Inspired Energy-Efficient Clustering Protocol Based on Improved Hybrid Grey Wolf Optimization for FANETs  7
A Nature-Inspired Energy-Efficient Clustering Protocol Based...
收藏 引用
7th IEEE International Conference on Electronics and Communication Engineering, ICECE 2024
作者: Xu, Mengying Zu, Yunxiao Zhou, Jie Dai, Jiapeng Chen, Jing Liu, Meiru School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China Shihezi University Department of Information Science and Technology Shihezi China
Flying ad hoc networks (FANETs) are composed of multiple UA V nodes that are distributed across a wide area and linked via wireless communication to gather and transmit environmental data. However, the battery-powered... 详细信息
来源: 评论
A Survey of Deep Visual Cross-Domain Few-Shot Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Wenjian Duan, Lijuan Wang, Yuxi Fan, Junsong Gong, Zhi Zhang, Zhaoxiang Faculty of Information Technology Beijing University of Technology China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China Centre for Artificial Intelligence and Robotics HKISI_CAS Institute of Automation Chinese Academy of Sciences [NLPR CASIA UCAS China
Few-Shot transfer learning has become a major focus of research as it allows recognition of new classes with limited labeled data. While it is assumed that train and test data have the same data distribution, this is ... 详细信息
来源: 评论
A Nature-Inspired Energy-Efficient Clustering Protocol Based on Improved Hybrid Grey Wolf Optimization for FANETs
A Nature-Inspired Energy-Efficient Clustering Protocol Based...
收藏 引用
IEEE International Conference on Electronics and Communication Engineering (ICECE)
作者: Mengying Xu Yunxiao Zu Jie Zhou Jiapeng Dai Jing Chen Meiru Liu School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security Shihezi China Department of Information Science and Technology Shihezi University Shihezi China
Flying ad hoc networks (FANETs) are composed of multiple UA V nodes that are distributed across a wide area and linked via wireless communication to gather and transmit environmental data. However, the battery-powered... 详细信息
来源: 评论
Adversarial Training Via Multi-Guidance and Historical Memory Enhancement
SSRN
收藏 引用
SSRN 2024年
作者: Zhao, Chenyu Qian, Yaguan Wang, Bin Gu, Zhaoquan Ji, Shouling Wang, Wei Zhang, Yanchun School of Science Zhejiang University of Science and Technology China Network and Data Security China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China School of Computer Science and Technology Zhejiang University China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University China Institute for Sustainable Industries and Liveable Cities Victoria University Australia Peng Cheng Laboratory China
DNNs are often susceptible to the influence of adversarial examples, potentially leading to severe security issues. Adversarial training stands out as one of the most effective defenses. In this paper, we empirically ... 详细信息
来源: 评论
APTNER: A Specific Dataset for NER Missions in Cyber Threat Intelligence Field  25
APTNER: A Specific Dataset for NER Missions in Cyber Threat ...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Xuren He, Songheng Xiong, Zihan Wei, Xinxin Jiang, Zhengwei Chen, Sihan Jiang, Jun Capital Normal University Information Engineering College Beijing China Xi'an Jiaotong University School of Materials Science and Engineering Xi'an China Chinese Academy of Sciences Key Laboratory of Network Assessment Technology Institute of Information Engineering Beijing China University of Chinese Academy of Sciences School of Cyber Security Beijing China
This paper provides a new dataset for Named Entity Recognition (NER) missions in cyber threat intelligence (CTI) studying. To the best of our knowledge, the proposed dataset is the biggest and challenging one in the f... 详细信息
来源: 评论
Generating Action-conditioned Prompts for Open-vocabulary Video Action Recognition  24
Generating Action-conditioned Prompts for Open-vocabulary Vi...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Jia, Chengyou Luo, Minnan Chang, Xiaojun Dang, Zhuohang Han, Mingfei Wang, Mengmeng Dai, Guang Dang, Sizhe Wang, Jingdong School of Computer Science and Technology MOEKLINNS Lab Xi'an Jiaotong University Shaanxi Xi'an China University of Science and Technology of China Anhui Hefei China School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China ReLER Lab AAII University of Technology Sydney SydneyNSW Australia Zhejiang University of Technology College of Computer Science and Technology China SGIT AI Lab State Grid Corporation of China Beijing China Baidu Inc Beijing China United Arab Emirates Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China SGIT AI Lab State Grid Corporation of China China School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China
Exploring open-vocabulary video action recognition is a promising venture, which aims to recognize previously unseen actions within any arbitrary set of categories. Existing methods typically adapt pretrained image-te... 详细信息
来源: 评论
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Dong, Fangming Wang, Pinghui Li, Rundong Cui, Xueyao Zhao, Junzhou Tao, Jing Zhang, Chen Guan, Xiaohong Zhejiang CreateLink Technology Co. Ltd Guangdong Guangzhou China Xi'an Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Shaanxi Xi'an710049 China Tsinghua University Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Beijing China
Approximate membership query (AMQ) structures represented by the Bloom Filter and its variants have been popularly researched in recent years. Researchers have recently combined machine learning with this type of stru... 详细信息
来源: 评论