咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 326 篇 期刊文献

馆藏范围

  • 665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 623 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
665 条 记 录,以下是261-270 订阅
排序:
Bio-inspired design and stab resistance performance of flexible fiber composites
收藏 引用
Composites Part B: Engineering 2025年
作者: Yuhang Liu Peng Liu Mengqi Yuan Hongyuan Zhou Hong Zhang State Key Laboratory of Explosion Science and Technology Beijing Institute of Technology Beijing 100081 PR China Chongqing Innovation Center Beijing Institute of Technology Chongqing 401120 China Explosion Protection and Emergency Disposal Technology Engineering Research Center of the Ministry of Education Beijing Institute of Technology Beijing 100081 PR China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing 100124 China
Stab resistance clothing can protect personnel from sharp knives, but it is difficult to balance the softness and stab resistance performance. At present, the bionic stab resistance structure still has some shortcomin...
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless networks
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China The Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China The Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
Corrigendum to“Achievements,challenges,and recommendations for waterbird conservation in China's coastal wetlands”[Avian Res.14(2023)100123]
收藏 引用
Avian Research 2023年 第3期14卷 315-316页
作者: Zhijun Ma Chi-Yeung Choi Xiaojing Gan Jing Li Yang Liu David S.Melville Tong Mu Theunis Piersma Zhengwang Zhang Ministry of Education Key Laboratory for Biodiversity Science and Ecological Engineering National Observation and Research Station for Wetland Ecosystems of the Yangtze EstuaryFudan UniversityShanghai200438China Division of Natural and Applied Sciences Environmental Research CentreDuke Kunshan UniversityKunshan215316JiangsuChina The Paulson Institute Beijing Representative Office Beijing100006China Spoon-Billed Sandpiper Shanghai Environmental Protection Technology Co.Ltd.Shanghai201100China State Key Laboratory of Biocontrol School of EcologySun Yat-Sen UniversityGuangzhou510275China Global Flyway Network Wakefield7096New Zealand Princeton School of Public and International Affairs Princeton UniversityPrincetonNJ08544USA NIOZ Royal Netherlands Institute for Sea Research Department of Coastal SystemsP.O.Box 591790 ABDen BurgTexelthe Netherlands BirdEyes Centre for Global Ecological Changeand Conservation Ecology GroupGroningen Institute for Evolutionary Life Sciences(GELIFES)University of Groningen9700 CCGroningenthe Netherlands CEAAF Center for East Asian-Australasian Flyway Studies Beijing Forestry UniversityQinghua East Road 35Haidian DistrictBeijing100083China Ministry of Education Key Laboratory for Biodiversity Science and Ecological Engineering School of Life SciencesBeijing Normal UniversityBeijing100875China
The authors regret that Fig.1 and its caption should be replaced as below.
来源: 评论
Dual Prototypes Contrastive Learning for Semi-Supervised Medical Image Segmentation
SSRN
收藏 引用
SSRN 2024年
作者: Yue, Tianai Xu, Rongtao Wu, Jingqian Yang, Wenjie Du, Shide Wang, Changwei Johns Hopkins University Baltimore21218 United States State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing100190 China The University of Hong Kong Hong Kong999077 Hong Kong College of Computer and Big Data Fuzhou University Fuzhou350108 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan250014 China
Semi-supervised techniques for medical image segmentation have demonstrated potential, effectively training models using scarce labeled data alongside a wealth of unlabeled data. Therefore, semi-supervised medical ima... 详细信息
来源: 评论
Segment Anything Model is a Good Teacher for Local Feature Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Jingqian Xu, Rongtao Wood-Doughty, Zach Wang, Changwei Xu, Shibiao Lam, Edmund Y. The University of Hong Kong Pokfulam Hong Kong The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing100190 China Northwestern University EvanstonIL60201 United States The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250013 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China
Local feature detection and description play an important role in many computer vision tasks, which are designed to detect and describe keypoints in any scene and any downstream task. Data-driven local feature learnin... 详细信息
来源: 评论
Efficient quantum state transmission via perfect quantum network coding
收藏 引用
Science China(Information Sciences) 2019年 第1期62卷 191-204页
作者: Zhen-Zhen LI Gang XU Xiu-Bo CHEN Zhiguo QU Xin-Xin NIU Yi-Xian YANG Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Quantum network coding with the assistance of auxiliary resources can achieve perfect transmission of the quantum state. This paper suggests a novel perfect network coding scheme to efficiently solve the quantum k-pai... 详细信息
来源: 评论
A 2-bit graphene encoder based on the plasmon-induced transparency effect and its sensing characteristics
收藏 引用
Results in Physics 2024年 59卷
作者: Zhu, Aijun Li, Zongteng Hou, Weigang Yang, Xinghua Cheng, Lei Hu, Cong Qiao, Fei Mahapatra, Rabi Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology Guilin 541004 China Shanxi Key Laboratory of Advanced Semiconductor Optoelectronic Devices and Integrated Systems Jincheng Shanxi 048000 China Institute of Intelligent Communication and Network Security Chongqing University of Posts and Telecommunications Chongqing 400000 China College of Science Beijing Forestry University Beijing 100083 China Jincheng Research Institute of Opto-mechatronics Industry Jincheng Shanxi 048000 China Guangxi Key Laboratory of Brain-inspired Computing and Intelligent Chips Guangxi Normal University Guilin 541004 China Department of Electronic Engineering Tsinghua University Beijing 100084 China Department of Computer Science and Engineering Texas A&M University College Station 77843-3112 TX United States
A 2-bit encoder based on the plasmon-induced transparency (PIT) effect was proposed and investigated in the range from 2 to 7 THz. The Lorentz oscillation coupling model was utilized to confirm the simulation. By tuni... 详细信息
来源: 评论
A quantitative framework for network resilience evaluation using dynamic bayesian network
arXiv
收藏 引用
arXiv 2021年
作者: Jiang, Shanqing Yang, Lin Cheng, Guang Gao, Xianming Feng, Tao Zhou, Yuyang School of Cyber Science and Engineering Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China
Measuring and evaluating network resilience has become an important aspect since the network is vulnerable to both uncertain disturbances and malicious attacks. networked systems are often composed of many dynamic com... 详细信息
来源: 评论
PPA: Preference Profiling Attack Against Federated Learning
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Sydney Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and th... 详细信息
来源: 评论