咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是241-250 订阅
排序:
INTELLIGENT INFORMATION network security AND MANAGEMENT
收藏 引用
China Communications 2016年 第7期13卷 3-6页
作者: Yixian Yang Zhongshan Zhang Wenjing Li Information Security Center(ISC) Beijing University of Posts and Telecommunications(BUPT) National Engineering Laboratory for Disaster Backup and Recovery the School of Computer and Communication Engineering in the University of Science and Technology Beijing(USTB) State Key Lab of Networking and Switching Technologies Network Management Research Center at BUPT National Innovation Research Group of China
Intelligent Information network security and Management(IINSM)is an emerging direction in future Internet architecture research,which has gained significant tractions among academia and *** the rapid development of mo... 详细信息
来源: 评论
A near reversible image watermarking algorithm
A near reversible image watermarking algorithm
收藏 引用
International Conference on Machine Learning and Cybernetics
作者: Zhang, Bin Xin, Yang Niu, Xin-Xin Yuan, Kai-Guo Jiang, Hui-Bai Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing 100086 China China Information Security Certification Center Beijing 100020 China Beijing Safe-Code Technology CO. LTD. Beijing 100086 China
Being a novel category of watermarking schemes, reversible watermarking algorithms were developed in recent years. As it can recover the watermarked data back to the original host signal, reversible watermarking algor... 详细信息
来源: 评论
MICABAC: Multidimensional Industrial Control Attribute-Based Access Control Model
MICABAC: Multidimensional Industrial Control Attribute-Based...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Wang, Hangyu Lv, Fei Chen, Yuqi Si, Shuaizong Pan, Zhiwen Sun, Degang Sun, Limin Institute of Information Engineering Cas Beijing Key Laboratory of Iot Information Security Technology Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Shanghai Tech University Shanghai China Computer Network Information Center Chinese Academy of Sciences Beijing China
As the Industrial Control System (ICS) increasingly merges with the Internet, the security threats have been increasing from internal users and external hackers. These challenges are further intensified by the facts: ... 详细信息
来源: 评论
Changes of net primary productivity in China during recent 11 years detected using an ecological model driven by MODIS data
收藏 引用
Frontiers of Earth Science 2013年 第1期7卷 112-127页
作者: Yibo LIU Weimin JU Honglin HE Shaoqiang WANG Rui SUN Yuandong ZHANG Jiangsu Provincial Key Laboratory of Geographic Information Science and Technology Nanjing University Nanjing 210093 China International Institute for Earth System Science Nanjing University Nanjing 210093 China Key Laboratory of Ecosystem Network Observation and Modeling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing 100101 China State Key Laboratory of Remote Sensing Science Jointly Sponsored by Beijing Normal University and Institute of Remote Sensing Applications of Chinese Academy of Sciences Beijing 100875 China Key Laboratory of Forest Ecology and Environment State Forestry Administration Institute of Forest Ecology Environment and Protection Chinese Academy of Forestry Beijing 100091 China
Net primary productivity (NPP) is an important component of the terrestrial carbon cycle. Accurately mapping the spatial-temporal variations of NPP in China is crucial for global carbon cycling study. In this study ... 详细信息
来源: 评论
Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing  1
收藏 引用
2nd International Conference on Machine Learning for Cyber security, ML4CS 2019
作者: Zhang, Lili Wang, Wenjie Zhang, Yuqing National Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China Henan International Joint Laboratory of Cyberspace Security Applications Information Engineering College Henan University of Science and Technology Luoyang471023 China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing100049 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
In cloud computing model, the data are usually encrypted before outsourced to the cloud server, which protects the data privacy, but also leaves keyword searches over ciphertext data a challenging problem. A keyword s... 详细信息
来源: 评论
Recent advances on electroactive CNT-based membranes for environmental applications:The perfect match of electrochemistry and membrane separation
收藏 引用
Chinese Chemical Letters 2020年 第10期31卷 2539-2548页
作者: Yanbiao Liu Fuqiang Liu Ning Ding Xuemei Hu Chensi Shen Fang Li Manhong Huang Zhiwei Wang Wolfgang Sand Chong-Chen Wang Textile Pollution Controlling Engineering Center of Ministry of Environmental Protection College of Environmental Science and EngineeringDonghua UniversityShanghai 201620China Shanghai Institute of Pollution Control and Ecological Security Shanghai 200092China Key Laboratory of Cleaner Production and Integrated Resource Utilization of China National Light Industry Beijing Technology and Business UniversityBeijing 100048China State Key Laboratory of Pollution Control and Resource Reuse School of Environmental Science and EngineeringTongji UniversityShanghai 200092China Institute of Biosciences Freiberg University of Mining and TechnologyFreiberg 09599Germany Beijing Key Laboratory of Functional Materials for Building Structure and Environment Remediation Beijing University of Civil Engineering and ArchitectureBeijing 100044China
Global climate change,growing population,and environmental pollution underscore the need for a greater focus on providing advanced water treatment *** electrochemical basedprocesses are becoming promising solutions,th... 详细信息
来源: 评论
Impossible Differential Analysis on 8-Round PRINCE  9th
Impossible Differential Analysis on 8-Round PRINCE
收藏 引用
9th International Conference on Computer Engineering and networks, CENet2019
作者: Ding, Yaoling Jia, Keting Wang, An Shi, Ying School of Computer Science Beijing Institute of Technology Beijing100081 China Department of Computer Science and Technology Tsinghua University Beijing100084 China Key Laboratory of Network Assessment Technology CAS Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China
PRINCE is a lightweight block cipher, which was proposed by Borghoff et al. in Asiacrypt 2012. Various cryptanalytic techniques have been employed to evaluate the security of PRINCE. In 2017, Ding et al. constructed a... 详细信息
来源: 评论
Recommendation Model Based on Social Homogeneity Factor and Social Influence Factor  17th
Recommendation Model Based on Social Homogeneity Factor and ...
收藏 引用
17th EAI International Conference on Collaborative Computing: networking, Applications, and Worksharing, CollaborateCom 2021
作者: Ying, Weizhi Yu, Qing Wang, Zuohua Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin300384 China China Everbright Bank CO. LTD. Beijing100035 China
In recent years, more and more recommendation algorithms incorporate social information. However, most social recommendation algorithms often only consider the social homogeneity factor between users and do not consid... 详细信息
来源: 评论
Multisequence synthesis over an integral domain  1
收藏 引用
International Conference on Cryptography and Lattices, CaLC 2001
作者: Wang, Li-Ping Zhu, Yue-Fei State Key Laboratory of Information Security Graduate School University of Science and Technology of China Beijing100039 China Department of Network Engineering Information Engineering University Zhengzhou450002 China
We first give an extension of F[x]-lattice basis reduction algorithm to the polynomial ring R[x] where F is a field and R an arbitrary integral domain. So a new algorithm is presented for synthesizing minimum length l... 详细信息
来源: 评论
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
Engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论