咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是11-20 订阅
排序:
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4828-4843页
作者: Xu, Xiangrui Zhao, Yiwen Han, Yufei Zhu, Yongsheng Han, Zhen Xu, Guangquan Wang, Bin Ji, Shouling Wang, Wei Qingdao University of Science and Technology School of Information Science and Technology Qingdao266061 China University of Southern California Thomas Lord Department of Computer Science Los AngelesCA90007 United States INRIA Brittany Rennes35042 France Institute of Computing Technologies China Academy of Railway Sciences Corporation Ltd. Beijing100081 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China College of Intelligence and Computing Tianjin300072 China Network and Data Security Hangzhou310053 China Zhejiang University College of Computer Science and Technology Zhejiang 310058 China Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi’an710049 China
Vertical Federated Learning (VFL) is susceptible to various one-party hijacking attacks, such as Replay and Generation attacks, where a single malicious client can manipulate the model to produce attacker-specified re... 详细信息
来源: 评论
Leveraging semantic relations in code and data to enhance taint analysis of embedded systems  24
Leveraging semantic relations in code and data to enhance ta...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Jiaxu Zhao Yuekang Li Yanyan Zou Zhaohui Liang Yang Xiao Yeting Li Bingwei Peng Nanyu Zhong Xinyi Wang Wei Wang Wei Huo Institute of Information Engineering Chinese Academy of Sciences China and School of Cyber Security University of Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China University of New South Wales Australia Institute of Information Engineering Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China
IoT devices have significantly impacted our daily lives, and detecting vulnerabilities in embedded systems early on is critical for ensuring their security. Among the existing vulnerability detection techniques for em...
来源: 评论
Fine-grained Personalized Hierarchical Federated Learning towards Heterogeneous Internet of Vehicles
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16349-16362页
作者: Zhang, Puning Shao, Shuman Wu, Chao Yang, Zhigang Zhang, Ruoying Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China Chongqing400065 China Chongqing Innovation Center of Industrial Big-Data Co. Ltd National Engineering Laboratory for Industrial Big-data Application Technology Chongqing400707 China China Merchants Testing Vehicle Technology Research Institute Co. Ltd Chongqing404100 China Chongqing University of Posts and Telecommunications School of Cyber Security and Information Law Chongqing400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China China China Academy of Information and Communications Beijing100083 China
High mobility and non-independent and identically distributed (non-iid) data in the Internet of Vehicles (IoV) pose challenges for the convergence speed and accuracy of federated learning model training. Traditional f... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
收藏 引用
IEEE Transactions on Image Processing 2025年 34卷 2602-2615页
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong Xi’an Jiaotong University School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Shaanxi Xi’an710049 China SGIT AI Laboratory Xi’an710048 China State Grid Corporation of China State Grid Shaanxi Electric Power Company Ltd. Xi’an710048 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Abu Dhabi United Arab Emirates Baidu Inc. Beijing100085 China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Variability of mechanical properties of geopolymer recycled aggregate concrete: Experimental and numerical study
收藏 引用
Construction and Building Materials 2025年 477卷
作者: Zhou, Hongyuan Mu, Chongyuan Wang, Xiaojuan Song, Tianyi Zhang, Hong Wang, Yonghui Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing100124 China State Key Laboratory of Explosion Science and Safety Protection Beijing Institute of Technology Beijing100081 China Key Laboratory of Structures Dynamic Behaviour and Control of the Ministry of Education Harbin Institute of Technology Harbin150090 China
Despite the extensive research available on the mechanical properties of geopolymer recycled aggregate concrete (GRAC), its variability has received insufficient attention, potentially posing significant risks to the ... 详细信息
来源: 评论
Cu single sites on BO2 as thyroid peroxidase mimicking for iodotyrosine coupling and pharmaceutical assess
收藏 引用
Science Bulletin 2025年 第10期70卷 1611-1618页
作者: Hu, Lijun Li, Ruimin Chen, Chengjie Jia, Xiangkun Li, Xiaotong Jiao, Lei Zhu, Chengzhou Lu, Xiaoquan Zhai, Yanling Guo, Shaojun Institute of Molecular Metrology College of Chemistry and Chemical Engineering Qingdao University Qingdao266071 China School of Materials Science and Engineering Peking University Beijing100871 China Key Laboratory of Water Security and Water Environment Protection in Plateau Intersection Ministry of Education Key Laboratory of Bioelectrochemistry and Environmental Analysis of Gansu Province College of Chemistry and Chemical Engineering Northwest Normal University Lanzhou730070 China National Key Laboratory of Green Pesticide International Joint Research Center for Intelligent Biosensing Technology and Health College of Chemistry Central China Normal University Wuhan430079 China
Designing three-dimensional (3D) catalytic sites in single-atom catalysts (SACs) that mimic thyroid peroxidase (TPO) function for achieving iodotyrosine coupling, although highly desirable for the synthesis of thyroid... 详细信息
来源: 评论
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 4783-4798页
作者: Che, Zheng Shen, Meng Tan, Zhehui Du, Hanbiao Wang, Wei Chen, Ting Zhao, Qinglin Xie, Yong Zhu, Liehuang Beijing Institute of Technology School of Computer Science Beijing100081 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Xi'an Jiaotong University Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an710049 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Macau University of Science and Technology School of Computer Science and Engineering Taipa China Qinghai Institute of Technology School of Computer and Information Science Xining810016 China
With the rapid evolution of Web3.0, cryptocurrency has become a cornerstone of decentralized finance. While these digital assets enable efficient and borderless financial transactions, their pseudonymous nature has al... 详细信息
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论
Research and Implementation of Trusted Blockchain Core technology Based on State Secret Algorithm
收藏 引用
China Communications 2025年 第4期22卷 143-160页
作者: Zheng Qingan Meng Jialin Wu Junjie Li Jingtao Lin Haonan Computer Science and Information Security Management Department Fujian Police CollegeFuzhou 350007China Fujian Province Key Laboratory for Digital Network Crime Supervision and Prevention Fuzhou 350007China ByteDance Technology(Beijing)Co. Ltd.Haidian DistrictBeijing 100080China Dongguan Water Group Co. LtdDongguan 523000China Fuqing Municipal Public Security Bureau Fuzhou 350301China
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... 详细信息
来源: 评论
Mechanical Properties of Bellows Joint-Connected Buried Pipelines Subjected to Normal Fault: Parametric Analysis
收藏 引用
Journal of Pipeline Systems Engineering and Practice 2025年 第3期16卷
作者: Lv, Yang Zhang, Xue-Jie Zhou, Hong-Yuan Li, Fang-Fang Tianjin Key Laboratory of Civil Structure Protection and Reinforcement Tianjin Chengjian Univ. 26 Jinjing Rd. Xiqing Tianjin300384 China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing Univ. of Technology Beijing100124 China
Buried pipelines that cross normal faults are at risk of damage because of insufficient deformation capacity. Bellows joints have been proven to have the potential to significantly increase the deformation capacity of... 详细信息
来源: 评论