咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 623 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
665 条 记 录,以下是201-210 订阅
排序:
Fairness of Large Music Models: From a Culturally Diverse Perspective
Fairness of Large Music Models: From a Culturally Diverse Pe...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Qinyuan Wang Bruce Gu He Zhang Yunfeng Li School of Music University of Sydney NSW Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China CNPIEC KEXIN Ltd Beijing China
This paper explores the fairness of large music models in generating culturally diverse musical compositions, emphasizing the need for inclusivity and equity in AI-generated music. By analyzing popular datasets such a... 详细信息
来源: 评论
HCF-Net: Hierarchical Context Fusion network for Infrared Small Object Detection
HCF-Net: Hierarchical Context Fusion Network for Infrared Sm...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Shibiao Xu Shuchen Zheng Wenhao Xu Rongtao Xu Changwei Wang Jiguang Zhang Xiaoqiang Teng Ao Li Li Guo School of Artificial Intelligence Beijing University of Posts and Telecommunications CASIA MAIS School of Artificial Intelligence University of Chinese Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science School of Computer Science and Technology Harbin University of Science and Technology
Infrared small object detection is an important computer vision task involving the recognition and localization of tiny objects in infrared images, which usually contain only a few pixels. However, it encounters diffi... 详细信息
来源: 评论
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing technology  14th
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based o...
收藏 引用
14th EAI International Conference on Communications and networking in China, ChinaCom 2019
作者: Wang, Zhiqiang Li, Quanqi Liu, Qian Liu, Biao Zhang, Jianyi Yang, Tao Liu, Qixu Beijing Electronic Science and Technology Institute Beijing China State Information Center Beijing China Key Lab of Information Network Security Ministry of Public Security Shanghai China Key Laboratory of Network Assessment Technology Institute of Information Engineering Chinese Academy of Sciences Beijing China
In recent years, the medical equipment and related information systems show the characteristics of mobility, networking, intelligence. At the same time, security incidents caused by medical equipment emerge in an endl... 详细信息
来源: 评论
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet
Contrastive Learning for Chest X-ray Classification: A Fusio...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Hao Ren Zeyu Luo Fengshi Jing Xinyue Zhang Han He Yonghao Yu Dawei Zhao Faculty of Data Science City University of Macau China Minzu University of China Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Lung diseases such as pneumonia and tuberculosis present significant global health challenges, leading to millions of deaths annually. Chest X-ray imaging is crucial for diagnosing these conditions, but interpretation... 详细信息
来源: 评论
Unsupervised Pixel-level Crack Detection Based on Generative Adversarial network  20
Unsupervised Pixel-level Crack Detection Based on Generative...
收藏 引用
5th International Conference on Multimedia Systems and Signal Processing, ICMSSP 2020
作者: Duan, Lijuan Geng, Huiling Pang, Junbiao Zeng, Jun Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Automatic crack detection from pavement images is an import research field. Meanwhile, crack detection is a challenge task: (1) manual labels are subjective because of low contrast between crack and the surrounding pa... 详细信息
来源: 评论
Multi-view Contrastive Learning for Medical Question Summarization
Multi-view Contrastive Learning for Medical Question Summari...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Sibo Wei Xueping Peng Hongjiao Guan Lina Geng Ping Jian Hao Wu Wenpeng Lu Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Key Laboratory of Computing Power Network and Information Security Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Australia Department of Blood Purification Qilu Hospital of Shandong University Jinan China School of Computer Science and Technology Beijing Institute of Technology Beijing China
Most Seq2Seq neural model-based medical question summarization (MQS) systems have a severe mismatch between training and inference, i.e., exposure bias. However, this problem remains unexplored in the MQS task. To bri... 详细信息
来源: 评论
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated network
StinAttack: A Lightweight and Effective Adversarial Attack S...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Shangyuan Zhuang Jiyan Sun Hangsheng Zhang Xiaohui Kuang Ling Pang Haitao Liu Yinlong Liu School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China Computer Network Information Center Chinese Academy of Sciences Beijing China
Effective adversarial attacks simulation is essential for the deployment of ensemble Intrusion Detection Systems (en- semble IDSs) in Satellite-Terrestrial Integrated network (STIN). This is because it can automatical... 详细信息
来源: 评论
DFMC:Feature-Driven Data-Free Knowledge Distillation
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Zhang, Zherui Xu, Rongtao Wang, Changwei Xu, Wenhao Chen, Shunpeng Xu, Shibiao Xu, Guangyuan Guo, Li Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Data-Free Knowledge Distillation (DFKD) enables knowledge transfer from teacher networks without access to the real dataset. However, generator-based DFKD methods often suffer from insufficient diversity or low-confid... 详细信息
来源: 评论
Symbiosis Rather Than Aggregation: Towards Generalized Federated Learning via Model Symbiosis
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Liu, Yuange Liu, Yuru Zhang, Weishan Zheng, Chaoqun Jiang, Wei Luo, Daobin Qiao, Qiao Meng, Lingzhao Zhao, Hongwei Yang, Su College of Computer Science and Technology Qingdao266580 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China Information Science Academy of China Electronics Technology Group Corporation Beijing100036 China Fudan University School of Computer Science Shanghai200433 China
Federated Learning (FL) faces significant challenges in scenarios with non-IID (non-independent and identically distributed) data distributions across participating clients. Traditional aggregation-based approaches of... 详细信息
来源: 评论
Detecting Inconsistent Vulnerable Software Version in security Vulnerability Reports  1
收藏 引用
4th International Conference on Frontiers in Cyber security, FCS 2021
作者: Ren, Hansong Li, Xuejun Lei, Liao Ou, Guoliang Sun, Hongyu Wu, Gaofei Tian, Xiao Hu, Jinglu Zhang, Yuqing School of Cyber Engineering Xidian University Shaanxi Xian710126 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541010 China National Computer Network Intrusion Prevention Center University of Chinese Academy of Sciences Beijing100049 China School of Information Production and Systems Waseda University Tokyo169-805 Japan College of Computer and Cyberspace Security Hainan University Haikou570228 China
At present, the vulnerability database research has mainly focused on whether the disclosed information is accurate. However, the information differences between the various vulnerability databases have received littl... 详细信息
来源: 评论