咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 469 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 627 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
669 条 记 录,以下是191-200 订阅
排序:
A Coordinated MMC Control Strategy of Integrated Photovoltaic/Battery System
A Coordinated MMC Control Strategy of Integrated Photovoltai...
收藏 引用
IEEE International Conference on Energy Internet (ICEI)
作者: Yuexi Yang Xiao Zhou Sichao Wang Chunpeng Li Junwei Huang Wenzheng Xu State Key Laboratory of Advanced Power Transmission Technology State Grid Smart Grid Research Institute Co.Ltd. Beijing China Fujian Key Laboratory of Protection and Operation Control for Smart Grid State Grid Fujian Electric Power Research Institute. Fuzhou China National Research Center for Active Distribution Network Technology Beijing Jiaotong University. Beijing China
The grid-connecting control and maximum power point tracking control of photovoltaic inverters have long been the research focus in the field of solar power generation. In this paper, a new coordinated modular multile...
来源: 评论
Recommender Systems with Condensed Local Differential Privacy  3rd
Recommender Systems with Condensed Local Differential Privac...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Liu, Ao Yao, Yanqing Cheng, Xianfu State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology School of Cyberspace Science and Technology Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing100191 China
Recommender systems aim at predicting users’ future behaviors by learning the users’ personal information and historical behaviors. Unfortunately, training by the user’s raw data will inevitably cause the user’s p... 详细信息
来源: 评论
Enhanced Practical Byzantine Fault Tolerance for Service Function Chain Deployment: Advancing Big Data Intelligence in Control Systems
收藏 引用
Computers, Materials and Continua 2025年 第3期83卷 4393-4409页
作者: Peiying Zhang Yihong Yu Jing Liu Chong Lv Lizhuang Tan Yulin Zhang Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Library of Shanghai Lixin University of Accounting and Finance Shanghai 201209 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan 250014 China Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance of MOE Minzu University of China Beijing 100081 China Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPU Taicang 215400 China Key Laboratory of Education Informatization for Nationalities (Yunnan Normal University) Ministry of Education Kunming 650092 China
As Internet of Things (IoT) technologies continue to evolve at an unprecedented pace, intelligent big data control and information systems have become critical enablers for organizational digital transformation, facil... 详细信息
来源: 评论
An Improved Privacy-Preserving Stochastic Gradient Descent Algorithm  3rd
An Improved Privacy-Preserving Stochastic Gradient Descent A...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Cheng, Xianfu Yao, Yanqing Liu, Ao State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Key Laboratory of Aerospace Network Security Ministry of Industry and Information Technology School of Cyberspace Science and Technology Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing100191 China
Deep learning techniques based on neural network have made significant achievements in various fields of Artificial Intelligence. However, model training requires large-scale datasets, these datasets are crowd-sourced... 详细信息
来源: 评论
A Semantic-based Replacement for Event Image Privacy  24
A Semantic-based Replacement for Event Image Privacy
收藏 引用
24th IEEE International Conference on Computational Science and Engineering, CSE 2021
作者: Chen, Zhenfei Tianqing, Zhu Tian, Bing Wang, Yu Ren, Wei China University of Geosciences School of Computer Science Wuhan China Institute of Artificial Intelligence and Blockchain Guangzhou University Guangzhou China China University of Geosciences Guangxi Key Laboratory of Cryptography and Information Security Key Laboratory of Network Assessment Technology CAS School of Computer Science Beijing China
Thanks to the continuous development of deep learning and the updating of deep neural networks, the accuracy of various computer vision tasks continue improving. On the one hand, the accuracy of image recognition is s... 详细信息
来源: 评论
Fairness of Large Music Models: From a Culturally Diverse Perspective
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Qinyuan Wang Bruce Gu He Zhang Yunfeng Li School of Music University of Sydney NSW Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China CNPIEC KEXIN Ltd Beijing China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论
HCF-Net: Hierarchical Context Fusion network for Infrared Small Object Detection
HCF-Net: Hierarchical Context Fusion Network for Infrared Sm...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Shibiao Xu Shuchen Zheng Wenhao Xu Rongtao Xu Changwei Wang Jiguang Zhang Xiaoqiang Teng Ao Li Li Guo School of Artificial Intelligence Beijing University of Posts and Telecommunications CASIA MAIS School of Artificial Intelligence University of Chinese Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science School of Computer Science and Technology Harbin University of Science and Technology
Infrared small object detection is an important computer vision task involving the recognition and localization of tiny objects in infrared images, which usually contain only a few pixels. However, it encounters diffi... 详细信息
来源: 评论
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing technology  14th
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based o...
收藏 引用
14th EAI International Conference on Communications and networking in China, ChinaCom 2019
作者: Wang, Zhiqiang Li, Quanqi Liu, Qian Liu, Biao Zhang, Jianyi Yang, Tao Liu, Qixu Beijing Electronic Science and Technology Institute Beijing China State Information Center Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China Key Laboratory of Network Assessment Technology Institute of Information Engineering Chinese Academy of Sciences Beijing China
In recent years, the medical equipment and related information systems show the characteristics of mobility, networking, intelligence. At the same time, security incidents caused by medical equipment emerge in an endl... 详细信息
来源: 评论
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet
Contrastive Learning for Chest X-ray Classification: A Fusio...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Hao Ren Zeyu Luo Fengshi Jing Xinyue Zhang Han He Yonghao Yu Dawei Zhao Faculty of Data Science City University of Macau China Minzu University of China Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Lung diseases such as pneumonia and tuberculosis present significant global health challenges, leading to millions of deaths annually. Chest X-ray imaging is crucial for diagnosing these conditions, but interpretation... 详细信息
来源: 评论
Unsupervised Pixel-level Crack Detection Based on Generative Adversarial network  20
Unsupervised Pixel-level Crack Detection Based on Generative...
收藏 引用
5th International Conference on Multimedia Systems and Signal Processing, ICMSSP 2020
作者: Duan, Lijuan Geng, Huiling Pang, Junbiao Zeng, Jun Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Automatic crack detection from pavement images is an import research field. Meanwhile, crack detection is a challenge task: (1) manual labels are subjective because of low contrast between crack and the surrounding pa... 详细信息
来源: 评论