咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是161-170 订阅
排序:
A SUPERVISED INFORMATION ENHANCED MULTI-GRANULARITY CONTRASTIVE LEARNING FRAMEWORK FOR EEG BASED EMOTION RECOGNITION
arXiv
收藏 引用
arXiv 2024年
作者: Li, Xiang Song, Jian Zhao, Zhigang Wang, Chunxiao Song, Dawei Hu, Bin Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Institute of Engineering Medicine Beijing Institute of Technology Beijing China
This study introduces a novel Supervised Info-enhanced Contrastive Learning framework for EEG based Emotion Recognition (SI-CLEER). SI-CLEER employs multi-granularity contrastive learning to create robust EEG contextu... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
Demand Response Scheme: Achieving Sustainability in Distributed Data Processing
Demand Response Scheme: Achieving Sustainability in Distribu...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xueying Zhai Yunfeng Peng Xiuping Guo Liang Zhang Wei Zhang School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Guizhou Key Laboratory of Electric Power Big Data Guizhou Institute of Technology Guizhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
The rapid development of Internet of Things (IoT) technology has driven the intelligent transformation of various industries, including manufacturing, agriculture, and healthcare, etc., significantly enhancing their m... 详细信息
来源: 评论
A Method Based on Hierarchical Spatiotemporal Features for Trojan Traffic Detection
arXiv
收藏 引用
arXiv 2023年
作者: Xie, Jiang Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Li, Jia Institute of Information Engineering Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology IIE CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Trojans are one of the most threatening network attacks currently. HTTP-based Trojan, in particular, accounts for a considerable proportion of them. Moreover, as the network environment becomes more complex, HTTP-base... 详细信息
来源: 评论
Hard-Label Cryptanalytic Extraction of Neural network Models
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Yi Dong, Xiaoyang Guo, Jian Shen, Yantian Wang, Anyu Wang, Xiaoyun Institute for Advanced Study Tsinghua University Beijing China Institute for Network Sciences and Cyberspace BNRist Tsinghua University Beijing China School of Physical and Mathematical Sciences Nanyang Technological University Singapore Department of Computer Science and Technology Tsinghua University Beijing China Zhongguancun Laboratory Beijing China Shandong Key Laboratory of Artificial Intelligence Security Shandong China
The machine learning problem of extracting neural network parameters has been proposed for nearly three decades. Functionally equivalent extraction is a crucial goal for research on this problem. When the adversary ha... 详细信息
来源: 评论
security is Readily to Interpret: Quantitative Feature Analysis for Botnet Encrypted Malicious Traffic
Security is Readily to Interpret: Quantitative Feature Analy...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Long Chen Qiaojuan Wang Yanqing Song Jianguo Chen Beijing Key Laboratory of Network Technology QI-AN XIN Group China Applied Sciences and Technologies Research Beihang University Beijing Topsec Network Security Technology Co. Innovation Technology Research Institute China Applied Sciences and Technologies Research Beijing Aerospace Information Sciences and Technologies Geophysical Laboratory Hebei Seismological Observatories China Applied Sciences and Technologies Research Beijing Aerospace Information Sciences and Technologies
Nowadays, there are two problems in the network traffic analysis. One is that it’s difficult to detect the encrypted threat traffic resulting in the ineffective analysis and detection of attack characteristics of com...
来源: 评论
Impossible Differential Analysis on 8-Round PRINCE  9th
Impossible Differential Analysis on 8-Round PRINCE
收藏 引用
9th International Conference on Computer Engineering and networks, CENet2019
作者: Ding, Yaoling Jia, Keting Wang, An Shi, Ying School of Computer Science Beijing Institute of Technology Beijing100081 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a... 详细信息
来源: 评论
Recommendation Model Based on Social Homogeneity Factor and Social Influence Factor  17th
Recommendation Model Based on Social Homogeneity Factor and ...
收藏 引用
17th EAI International Conference on Collaborative Computing: networking, Applications, and Worksharing, CollaborateCom 2021
作者: Ying, Weizhi Yu, Qing Wang, Zuohua Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin300384 China China Everbright Bank CO. LTD. Beijing100035 China
In recent years, more and more recommendation algorithms incorporate social information. However, most social recommendation algorithms often only consider the social homogeneity factor between users and do not consid... 详细信息
来源: 评论
Several new classes of optimal ternary cyclic codes with two or three zeros
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Gaofei You, Zhuohui Zha, Zhengbang Zhang, Yuqing The State Key Laboratory of Integrated Service Networks School of Cyber Engineering Xidian University Xi’an710071 China The Advanced Cryptography System Security Key Laboratory of Sichuan Province China The College of Mathematics and System Sciences Xinjiang University Urumqi830046 China The National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing101408 China
Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let α be a gener... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论