咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是211-220 订阅
排序:
Individual communication transmitter classification of weighted feature set based on RST
Individual communication transmitter classification of weigh...
收藏 引用
作者: Zhou, Yajian Na, Sun Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
Feature extraction for individual communication transmitter identification is one of the major issues in the identifying process. A neighborhood rough set is proposed in this paper, in order to search for the good fea... 详细信息
来源: 评论
Performance evaluation on IEEE 802.11e considering emergency calls in congested situation
收藏 引用
中国邮电高校学报(英文版) 2007年 第S1期14卷 50-54页
作者: CUI Lu-ming OKADA Kazunori KATO Toshihiko CHEN Xing-yi Information Security Center National Institute of Information and Communications Technology Tokyo 184-8795 Japan Department of Information Network System Science The University of Electro-Communications Tokyo 182-8585 Japan States Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing 100876 China
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-ba... 详细信息
来源: 评论
Individual communication transmitter identification using support vector machines with kernels for polyspectrum
Individual communication transmitter identification using su...
收藏 引用
作者: Na, Sun Zhou, Yajian Yang, Yixian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
Polyspectral feature extraction is considered to be a potential method for individual communication transmitter identification. However, the curse of dimensionality caused by higher orders of the features restrains th... 详细信息
来源: 评论
Improved Global and Local Graph Neural network for Session-based Recommendation  25
Improved Global and Local Graph Neural Network for Session-b...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Yifan Yu, Qing Wang, Zuohua Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin China China Everbright Bank Co. Ltd Beijing China
The session-based recommendation(SBR) aims to predict user actions based on anonymous sessions. SBR focuses on recent sessions to make more real-time and reliable recommendations and does not need to extract user IDs,... 详细信息
来源: 评论
Protocol adaption of NAC in mobile telecommunication networks
Protocol adaption of NAC in mobile telecommunication network...
收藏 引用
2009 International Conference on Information Engineering and Computer Science, ICIECS 2009
作者: Bing, Liu Cheng, Song Yang, Xin Yixian, Yang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Safe-Code Technology Co. Ltd. China
The NAC (network Access Control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various co... 详细信息
来源: 评论
Three-level Compact Caching for Search Engines Based on Solid State Drives  23
Three-level Compact Caching for Search Engines Based on Soli...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Rui Sun, Pengyu Tong, Jiancong Zang, Ruirui Qian, Heng Pan, Yu Stones, Rebecca J. Wang, Gang Liu, Xiaoguang Li, Yusen College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Baidu Inc Beijing China
The query processing in search engines can be classified into either disk I/O operations and CPU computation operations. Conventional search engine caching methods mostly aimed at reducing disk I/O operations. However... 详细信息
来源: 评论
Discussion and testing of 802.11ah wireless communication in intelligent substation  2
Discussion and testing of 802.11ah wireless communication in...
收藏 引用
2nd IEEE International Conference on Energy Internet, ICEI 2018
作者: Zheng, Zhe Qiao, Lei Wang, Liang Cui, Wenpeng Guo, Jinghong Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd Beijing China State Grid Key Laboratory of Information and Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
In response to the application and requirements of all things seamless interconnection, International Institute of Electrical and Electronics Engineers (IEEE) has put forward a new generation of standard 802.11 ah, wo... 详细信息
来源: 评论
An improved TPSN algorithm based on doze mechanism  2
An improved TPSN algorithm based on doze mechanism
收藏 引用
2nd IEEE International Conference on Energy Internet, ICEI 2018
作者: Cui, Wenpeng Zheng, Zhe Qiao, Lei Zhang, Weilong Wang, Liang Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd Beijing China State Grid Key Laboratory of Information and Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
With the rapid development of wireless sensor networks, the precision of time synchronization between nodes is becoming increasingly attractive. However, low cost, low power, low technology and other requirements rest... 详细信息
来源: 评论
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware
Semantic-Enhanced Static Vulnerability Detection in Baseband...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Yiming Liu Cen Zhang Feng Li Yeting Li Jianhua Zhou Jian Wang Lanlan Zhan Yang Liu Wei Huo Institute of Information Engineering CAS School of Cyber Security UCAS Beijing China Key Laboratory of Network Assessment Technology CAS Beijing Key Laboratory of Network Security and Protection Technology Nanyang Technological University Singapore
Cellular network is the infrastructure of mobile communication. Baseband firmware, which carries the implementation of cellular network, has critical security impact on its vulnerabilities. To handle the inherent comp... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  6
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
6th International Conference on Electronic Information technology and Computer Engineering, EITCE 2022
作者: Wu, Zejun Lu, Li Jia, Qiong Chen, Zhihao State Key Laboratory of Mathematical Engineering and advanced Computing Zheng zhou China National Local Joint Engineering Laboratory of Network Space Security Technology Zheng zhou China Beijing Institute of Computer Technology and Application BeiJing China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论