咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 623 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
665 条 记 录,以下是221-230 订阅
排序:
Learning Cyber Threat Intelligence Knowledge Graph Embedding with Heterogeneous Relation networks Based on Multi-Head Relational Graph Attention
Learning Cyber Threat Intelligence Knowledge Graph Embedding...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Xuren Wang Rong Chen Binghua Song Jungang An Jun Jiang Jian Wang Peian Yang Information Engineering College Capital Normal University Beijing China Key Laboratory of Network Assessment Technology Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Cyber threat intelligence (CTI) Knowledge Graphs Embedding (KGE) complete the tasks such as KG complementation by retaining the structural information of the graph and mining the implicit relations between entities, w...
来源: 评论
Extraction Method of Judicial Language Entities Based On Regular Expression
Extraction Method of Judicial Language Entities Based On Reg...
收藏 引用
6th International Conference on Intelligent Computing and Signal Processing (ICSP)
作者: JIAO Kainan LI Xin School of Information Network Security People’s Public Security University of China Beijing China China Security Prevention Technology and Risk Assessment Key Laboratory Ministry of Public Security Beijing China
With the coming of the era of rule of law and intelligence, natural language processing technology plays a pivotal role. At present, a large number of unstructured judicial texts rely on manual processing and archivin... 详细信息
来源: 评论
Robust Resource Allocation for STAR-RIS Assisted SWIPT Systems
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Guangyu Mu, Xidong Guo, Li Huang, Ao Xu, Shibiao The Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The Engineering Research Center Ministry of Education for Chain Network Convergence Technology China The National Engineering Research Center for Mobile Internet Security Technology Beijing University of Posts and Telecommunications Beijing100876 China The School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom
A simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) assisted simultaneous wireless information and power transfer (SWIPT) system is proposed. More particularly, an STAR-RIS is de... 详细信息
来源: 评论
A new dance generation task from start to end  2
A new dance generation task from start to end
收藏 引用
2020 2nd International Conference on Artificial Intelligence Technologies and Application, ICAITA 2020
作者: Xu, Xiao Duan, Lijuan Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
The dance generation task is an interesting task. The general task is to predict the next dance sequence through a given initial frame, or to convert from music to dance through audio information. However, these works... 详细信息
来源: 评论
Generalization Boosted Adapter for Open-Vocabulary Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Wenhao Wang, Changwei Feng, Xuxiang Xu, Rongtao Huang, Longzhao Zhang, Zherui Guo, Li Xu, Shibiao School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250013 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China The Aerospace Information Research Institute Chinese Academy of Sciences China The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China
Vision-language models (VLMs) have demonstrated remarkable open-vocabulary object recognition capabilities, motivating their adaptation for dense prediction tasks like segmentation. However, directly applying VLMs to ... 详细信息
来源: 评论
Covert Communication in Satellite-Terrestrial Systems with a Full-Duplex Receiver
Covert Communication in Satellite-Terrestrial Systems with a...
收藏 引用
Satellite Internet (SAT-NET), International Conference on
作者: Zewei Guo Ranran Sun Ji He Yulong Shen Xiaohong Jiang School of Systems Information Science Future University Hakodate Hakodate Japan Hangzhou Institute of Technology Xidian University Hangzhou China School of Computer Science and Technology Xidian University Xi’an China Academy of Military Sciences Institute of Systems General Academy of Systems Engineering Beijing China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China
This paper investigates the covert communication in a satellite-terrestrial system, including a satellite transmitter Alice, a terrestrial full-duplex receiver Bob and a terrestrial warden Willie. To help the covert t... 详细信息
来源: 评论
Cross-Layer security for Semantic Communications: Metrics and Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui College of Science Nanjing University of Posts and Telecommunications Nanjing210003 China College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing210000 China Department of Electronic Engineering Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China The State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论
Multi-dimensional Intelligent network Asset Identification
Multi-dimensional Intelligent Network Asset Identification
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yi Xiong Xiaoyan Zhang Ling Pang Zhechao Lin Topsec Network Technology Inc. Beiijng China National Key Laboratory of Science and Technology on Information System Security BeijingChina
In the field of cyberspace detection and identification, how to improve the accuracy of asset identification is always a great challenge for people. This paper proposes a multi-input fusion model based on TextRCNN, wh... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论