咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是181-190 订阅
排序:
Classification of epilepsy period based on combination feature extraction methods and spiking swarm intelligent optimization algorithm
Classification of epilepsy period based on combination featu...
收藏 引用
作者: Duan, Lijuan Lian, Zhaoyang Chen, Juncheng Qiao, Yuanhua Miao, Jun Li, Mingai Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing University of Technology Beijing China Applied Sciences Beijing University of Technology Beijing China School of Computer Science Beijing Information Science and Technology University Beijing China
Epilepsy seriously damages the physical and mental health of patients. Detection of epileptic EEG signals in different periods can help doctors diagnose the disease. The change of frequency components during epilepsy ... 详细信息
来源: 评论
Multi-action self-healing coatings with simultaneous recovery of corrosion resistance and adhesion strength
收藏 引用
Journal of Materials Science & technology 2022年 第6期101卷 18-27页
作者: Chenhao Ren Yao Huang Wenkui Hao Dawei Zhang Xiejing Luo Lingwei Ma Jinke Wang Thee Chowwanonthapunya Chaofang Dong Xiaogang Li Beijing Advanced Innovation Center for Materials Genome Engineering Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing 100083China National Materials Corrosion and Protection Data Center University of Science and Technology BeijingBeijing 100083China State Key Laboratory of Advanced Power Transmission Technology(Global Energy Interconnection Research Institute Co.Ltd.) Beijing 100083China Faculty of International Maritime Studies Kasetsart UniversitySriracha Campus199 TungsuklaSrirachaChonburi 20230Thailand BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan 528300China
In this study, a new self-healing strategy that can simultaneously recover the corrosion resistance and the adhesion strength of coatings was introduced. The coating was based on a shape memory epoxy resin containing ... 详细信息
来源: 评论
Photothermal and pH dual-responsive self-healing coating for smart corrosion protection
收藏 引用
Journal of Materials Science & technology 2022年 第12期107卷 34-42页
作者: Yao Huang Panjun Wang Weimin Tan Wenkui Hao Lingwei Ma Jinke Wang Tong Liu Fan Zhang Chenhao Ren Wei Liu Dawei Zhang Beijing Advanced Innovation Center for Materials Genome Engineering Institute for Advanced Materials and TechnologyUniversity of Science and Technology BeijingBeijing 100083China National Materials Corrosion and Protection Data Center University of Science and Technology BeijingBeijing 100083China National Engineering Research Center for Coatings CNOOC Changzhou Paint and Coatings Industry Research InstituteChangzhou 213016China State Key Laboratory of Advanced Power Transmission Technology(Global Energy Interconnection Research Institute Co.Ltd. )Beijing 100083China BRI Southeast Asia Network for Corrosion and Protection(MOE) Shunde Graduate School of University of Science and Technology BeijingFoshan 528300China
A novel self-healing coating with photothermal and pH dual-responsive properties has been designed to protect carbon steel against corrosion by loading the stimuli-responsive microcapsules into a shape memory epoxy co... 详细信息
来源: 评论
An application-oriented efficient encapsulation system for trusted software development  7th
An application-oriented efficient encapsulation system for t...
收藏 引用
7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Tao, Zheng Hu, Jun Zhan, Jing Li, Mo Chen, Chunzi College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
Trusted computing provides an efficient and practical way out for system security problems based on a trusted hardware, namely the root of trust, e.g., Trusted Platform Module (TPM), Trusted Cryptographic Module (TCM)... 详细信息
来源: 评论
New optimistic fair exchange protocol based on VE-RSA signature
New optimistic fair exchange protocol based on VE-RSA signat...
收藏 引用
2nd International Workshop on Education technology and Computer Science, ETCS 2010
作者: Gu, Lize Sun, Yanbin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
Recently, Zhou et al. proposed a verifiably encrypted RSA (VE-RSA) signature scheme, which was used to convince that an encrypted message is a certain party's signature on a message while without revealing the sig... 详细信息
来源: 评论
Multidimensional particle swarm optimization based long short-term memory method for human activity recognition  4
Multidimensional particle swarm optimization based long shor...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Zuo, Peiliang Li, Haoliang Zhang, Yuanli Yang, Tao Ministry of Education Beijing University of Posts and Telecommunications Key Laboratory of Universal Wireless Communication Beijing China Department of Network Space Security Beijing Electronic Science and Technology Institute Beijing China
Human activity recognition (HAR) is indispensable for human-machine interaction. Related applications in many fields, e.g. medical, military, and security, facilitate and even change the lives of human beings. However... 详细信息
来源: 评论
A mathematical approach to disaster recovery planning
A mathematical approach to disaster recovery planning
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Yin, Zhonghai Yuan, Feng Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
Study of secure complicated information system architecture model
Study of secure complicated information system architecture ...
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Su, Ruidan Li, Zengxin Cai, Zhen Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
security on a knapsack-type encryption scheme based upon hybrid-model assumption
收藏 引用
International Journal of network security 2017年 第4期19卷 644-647页
作者: Jin, Zhengping Zhang, Hong Li, Zhongxian State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China National Cybernet Security Limited Tianjin300384 China
Provable security is a reduction that breaking the scheme is usually reduced to solving some basic hard problems, thus the foundation of the scheme's security is the assumption that it is hard to solve the based p... 详细信息
来源: 评论
A novel key management method for wireless sensor networks
A novel key management method for wireless sensor networks
收藏 引用
2010 3rd IEEE International Conference on Broadband network and Multimedia technology, IC-BNMT2010
作者: Tian, Bin Xin, Yang Luo, Shoushan Yang, Xiou Li, Dong Gong, Zhe Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China Beijing Safe-Code Technology Co. Ltd. Beijing China
key management is one of the most important issues of any secure communication. With the increasing demand for the transmission security in wireless sensor networks (WSNs), it is urgent to introduce the secure and rel... 详细信息
来源: 评论