咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是161-170 订阅
排序:
Multi-attribute Context-Aware Item Recommendation Method Based on Deep Learning  5
Multi-attribute Context-Aware Item Recommendation Method Bas...
收藏 引用
5th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2022
作者: Li, Shuxin Duan, Lijuan Zhang, Wenbo Wang, Wenjian Beijing University of Technology Beijing Key Laboratory of Trusted Computing Faculty of Information Technology Beijing China Beijing University of Technology China Natl. Eng. Laboratory for Critical Technologies of Information Security Classified Protection Faculty of Information Technology Beijing China
With the wide application of deep learning in the field of recommendation, item recommendation has gradually become a new hotspot. The existing item recommendation methods ignore the context relationship between multi... 详细信息
来源: 评论
Improved tripartite concurrent signature
Improved tripartite concurrent signature
收藏 引用
2010 2nd International Conference on Computer technology and Development, ICCTD 2010
作者: Ge, Haihui Sun, Yanbin Gu, Lize Zheng, Shihui Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology MOE Beijing University of Posts and Telecommunications Beijing 100876 China
The concrete tripartite concurrent signature scheme designed by Susilo et aI. is found being unambiguity. In other words, any fourth party can identify who is the real signer of the publicly available valid signatures... 详细信息
来源: 评论
BPN: Bidirectional Path network for Instance Segmentation  1st
BPN: Bidirectional Path Network for Instance Segmentation
收藏 引用
1st CAAI International Conference on Artificial Intelligence, CICAI 2021
作者: Xu, Fan Duan, Lijuan Qiao, Yuanhua Faculty of Information Technology Beijing University of Technology Beijing China Peng Cheng Laboratory Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing University of Technology Beijing China College of Mathematics and Physics Beijing University of Technology Beijing China
The feature pyramid network (FPN) has achieved impressive results in the field of object detection and instance segmentation by aggregating features of different scales, especially the detection of small objects. Howe... 详细信息
来源: 评论
Steganalysis of MSU Stego Video based on discontinuous coefficient
Steganalysis of MSU Stego Video based on discontinuous coeff...
收藏 引用
2010 2nd International Conference on Computer Engineering and technology, ICCET 2010
作者: Wu, Jia Zhang, Ru Chen, Ming Niu, Xinxin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
MSU(Moscow State University) Stego Video is a public video steganographic tool. It uses a specific data distribution mode to load secret data, so that the message can be extracted correctly even the stego video are co... 详细信息
来源: 评论
Design of a high security GSM/UMTS inter-system
Design of a high security GSM/UMTS inter-system
收藏 引用
1st International Conference on Information Science and Engineering, ICISE2009
作者: Zhang, Lei Guo, Shize Zheng, Kangfeng Li, Zhongxian Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Post and Telecommunications 100088 Beijing China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Post and Telecommunications 100088 Beijing China National Cybernet Security Ltd. 100088 Beijing China
GSM and UMTS mobile radio network will coexist for a few years. security of interoperation between GSM and UMTS becomes more important. This paper proposes a high security GSM/UMTS inter-system which supports all poss... 详细信息
来源: 评论
A self-supervised feature selection algorithm for spectral embedding based on block HSIC lasso  5
A self-supervised feature selection algorithm for spectral e...
收藏 引用
2022 5th International Conference on Advanced Algorithms and Control Engineering, ICAACE 2022
作者: Guo, Yajing Duan, Lijuan Xie, Chenyao Zhang, Wenbo Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
With the rapid development of information technology, a large amount of unlabeled high-dimensional data has been generated. To be able to better handle these data, we propose a new self-supervised feature selection al... 详细信息
来源: 评论
Knowledge Graph Embedding Method Based on Entity Metric Learning  23
Knowledge Graph Embedding Method Based on Entity Metric Lear...
收藏 引用
9th International Conference on Computing and Artificial Intelligence, ICCAI 2023
作者: He, Meng Duan, Lijuan Zhang, Baochang Han, Shengwen Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Key Technologies of Information Security Level Protection China Institute of Artificial Intelligence Beihang University China Faculty of Information Technology Beijing University of Technology China
A knowledge graph is a knowledge base of graph structure that stores massive facts and their relations in the form of triplets. Embedding entities and relations in knowledge graph into low-dimensional continuous vecto... 详细信息
来源: 评论
Whether android applications broadcast your private information: A naive Bayesian-based analysis approach  30
Whether android applications broadcast your private informat...
收藏 引用
30th International Conference on Software Engineering and Knowledge Engineering, SEKE 2018
作者: Lin, Li Ni, Jian Mao, Xinya Zhang, Jianbiao College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Classified Information Security Protection Beijing100124 China
With the rapid development of android smart terminals, android applications are exhibiting explosive growth. However, there remains a challenging issue facing android system, a malicious application may broadcast user... 详细信息
来源: 评论
A new dance generation task from start to end  2
A new dance generation task from start to end
收藏 引用
2020 2nd International Conference on Artificial Intelligence Technologies and Application, ICAITA 2020
作者: Xu, Xiao Duan, Lijuan Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
The dance generation task is an interesting task. The general task is to predict the next dance sequence through a given initial frame, or to convert from music to dance through audio information. However, these works... 详细信息
来源: 评论
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAYESIAN ALGORITHM WEIGHT OPTIMIZATION  10
OPTIMIZING MULTI-INPUT SCHEDULING FOR FUZZING TEST USING BAY...
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Fang, Junzhe Wang, Liyong Ji, Haojie Guo, Teng Hu, Te Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China Zaozhuang Network Security Guarantee Center Zaozhuang China
As a major software testing method, fuzzing has the potential to enhance testing coverage and detect a great number of software vulnerabilities in complex code programs. The current fuzzy testing for multiple input pa... 详细信息
来源: 评论