咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 469 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 627 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
669 条 记 录,以下是221-230 订阅
排序:
Covert Communication in Satellite-Terrestrial Systems with a Full-Duplex Receiver
Covert Communication in Satellite-Terrestrial Systems with a...
收藏 引用
Satellite Internet (SAT-NET), International Conference on
作者: Zewei Guo Ranran Sun Ji He Yulong Shen Xiaohong Jiang School of Systems Information Science Future University Hakodate Hakodate Japan Hangzhou Institute of Technology Xidian University Hangzhou China School of Computer Science and Technology Xidian University Xi’an China Academy of Military Sciences Institute of Systems General Academy of Systems Engineering Beijing China Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China
This paper investigates the covert communication in a satellite-terrestrial system, including a satellite transmitter Alice, a terrestrial full-duplex receiver Bob and a terrestrial warden Willie. To help the covert t... 详细信息
来源: 评论
Cross-Layer security for Semantic Communications: Metrics and Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui College of Science Nanjing University of Posts and Telecommunications Nanjing210003 China College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing210000 China Department of Electronic Engineering Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China The State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
Full-scale studies are closer to reality than lab-scale ones: Tertiary treatment constructed wetlands maintain robust removal capability for pharmaceuticals and personal care products in cold weather conditions
收藏 引用
Bioresource technology 2025年 432卷 132661页
作者: Wang, Jiaxi Ye, Beibei Yu, Xia Yan, Ruiqi Lin, Hui Man, Ying Sui, Qian State Environmental Protection Key Laboratory of Environmental Risk Assessment and Control on Chemical Process School of Resources and Environmental Engineering East China University of Science and Technology Shanghai200237 China Beijing100015 China School of Chemistry and Environment Guangdong Ocean University Zhanjiang524088 China Shanghai Institute of Pollution Control and Ecological Security Shanghai200092 China
In contrast to previous lab-scale studies, full-scale studies show that low temperatures do not significantly hinder pharmaceutical and personal care product (PPCP) removal in tertiary treatment constructed wetland (C... 详细信息
来源: 评论
Deep Learning Algorithms Design and Implementation Based on Differential Privacy  3rd
Deep Learning Algorithms Design and Implementation Based on ...
收藏 引用
3rd International Conference on Machine Learning for Cyber security, ML4CS 2020
作者: Xu, Xuefeng Yao, Yanqing Cheng, Lei Key Laboratory of Aerospace Network Security Ministry of industry and information technology School of Cyberspace Science and Technology Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Beijing Key Laboratory of Network Technology Beihang University Beijing China Shenzhen Research Institute of Big Data Shenzhen518000 China
Deep learning models bear the risks of privacy leakage. Attackers can obtain sensitive information contained in training data with some techniques. However, existing differentially private methods such as Differential... 详细信息
来源: 评论
Multi-dimensional Intelligent network Asset Identification
Multi-dimensional Intelligent Network Asset Identification
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yi Xiong Xiaoyan Zhang Ling Pang Zhechao Lin Topsec Network Technology Inc. Beiijng China National Key Laboratory of Science and Technology on Information System Security BeijingChina
In the field of cyberspace detection and identification, how to improve the accuracy of asset identification is always a great challenge for people. This paper proposes a multi-input fusion model based on TextRCNN, wh... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
A joint call for actions to advance taxonomy in China
收藏 引用
Zoological Systematics 2022年 第3期47卷 188-197页
作者: Chaodong Zhu Arong Luo Ming Bai Michael COrr Zhonge Hou Siqin Ge Jun Chen Yibo Hu Xuming Zhou Gexia Qiao Hongzhi Kong Limin Lu Xiaohua Jin Lei Cai Xinli Wei Ruilin Zhao Wei Miao Qingfeng Wang Zhongli Sha Qiang Lin Meng Qu Jianping Jiang Jiatang Li Jing Che Xuelong Jiang Xiaoyong Chen Lianming Gao Zongxin Ren Chunlei Xiang Shixiao Luo Donghui Wu Dong Liu Yanqiong Peng Tao Su Chenyang Cai Tianqi Zhu Wanzhi Cai Xingyue Liu Hu Li Huaijun Xue Zhen Ye Xuexin Chen Pu Tang Shujun Wei Hong Pang Qiang Xie Feng Zhang Feng Zhang Xianjin Peng Aibing Zhang Taiping Gao Changfa Zhou Chen Shao Libin Ma Zhaoming Wei Yunxia Luan Ziwei Yin Wu Dai Cong Wei Xiaolei Huang Jingxian Liu Xiangsheng Chen Tianci Yi Zhisheng Zhang Zhulidezi Aishan Qin Li Hongying Hu CAS Key Laboratory of Zoological Systematics and Evolution Institute of ZoologyChinese Academy of SciencesBeijing 100101China CAS Key Laboratory of Animal Ecology and Conservation Biology Institute of ZoologyChinese Academy of SciencesBeijing 100101China State Key Laboratory of Systematic and Evolutionary Botany Institute of BotanyChinese Academy of SciencesBeijing 100093China State Key Laboratory of Mycology(SKLM) Institute of MicrobiologyChinese Academy of SciencesBeijing 100101China CAS Key Laboratory of Aquatic Biodiversity and Conservation Institute of HydrobiologyChinese Academy of SciencesWuhan 430072China Wuhan Botanical Garden Chinese Academy of SciencesWuhan 430074China Department of Marine Organism Taxonomy&Phylogeny Institute of OceanologyChinese Academy of SciencesQingdao 266071China CAS Key Laboratory of Tropical Marine Bio-resources and Ecology South China Sea Institute of OceanologyChinese Academy of SciencesGuangzhou 510301China CAS Key Laboratory of Mountain Ecological Restoration and Bioresource Utilization&Ecological Restoration and Biodiversity Conservation Key Laboratory of Sichuan Province Chengdu Institute of BiologyChinese Academy of SciencesChengdu 610041China State Key Laboratory of Genetic Resources and Evolution&Yunnan Key Laboratory of Biodiversity and Ecological Security of Gaoligong Mountain Kunming Institute of ZoologyChinese Academy of SciencesKunming 650221China CAS Key Laboratory for Plant Diversity and Biogeography of East Asia Kunming Institute of BotanyChinese Academy of SciencesKunming 650201China CAS Key Laboratory of Plant Resource Conservation and Sustainable Utilization South China Botanical GardenChinese Academy of SciencesGuangzhou 510650China CAS Key Laboratory of Wetland Ecology and Environment Northeast Institute of Geography and AgroecologyChinese Academy of SciencesChangchun 130102China CAS Key Laboratory of Tropical Forest Ecology Xishuangbanna Tropical Botanical GardenChinese Academy of SciencesMenglunMenglaYunnan 66630
Taxonomy plays an important role in understanding the origin, evolution, and ecological functionality of biodiversity. There are large number of unknown species yet to be described by taxonomists, which together with ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Towards practical anonymous quantum communication: A measurement-device-independent approach
收藏 引用
Physical Review A 2021年 第5期104卷 052415-052415页
作者: Yu-Guang Yang Xiao-Xiao Liu Shang Gao Yi-Hua Zhou Wei-Min Shi Jian Li Dan Li Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China College of Network Security Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China
The multipartite Greenberger-Horne-Zeilinger (GHZ) entangled state is an important resource for anonymous quantum communication tasks. But its low intensity and fragility limit the practical applications of these anon... 详细信息
来源: 评论
Solving Modular Linear Equations via Automated Coppersmith and Its Applications  20th
Solving Modular Linear Equations via Automated Coppersmith ...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Feng, Yansong Liu, Zhen Nitaj, Abderrahmane Pan, Yanbin State Key Laboratory of Mathematical Sciences Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing China Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Hubei University Wuhan430062 China Normandie Univ UNICAEN CNRS LMNO Caen14000 France
At Asiacrypt’23, Meers and Nowakowski introduced a new automated method called Automated Coppersmith, which can be viewed as a generalization of Jochemsz-May Strategy for systems of polynomial equations. It selects m... 详细信息
来源: 评论