咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 469 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 627 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
669 条 记 录,以下是271-280 订阅
排序:
Constructing benchmarks for supporting explainable evaluations of static application security testing tools  13
Constructing benchmarks for supporting explainable evaluatio...
收藏 引用
13th International Symposium on Theoretical Aspects of Software Engineering, TASE 2019
作者: Hao, Gaojian Li, Feng Huo, Wei Sun, Qing Wang, Wei Li, Xinhua Zou, Wei Institute of Information Engineering Chinese Academy of Sciences China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology China School of Cyber Security University of Chinese Academy of Sciences China
When evaluating Static Application security Testing (SAST) tools, benchmarks based on real-world softwares are considered more representative than synthetic micro benchmarks. Generated from real-world software, the te... 详细信息
来源: 评论
Vulnerability Assessment for ICS system Based on Zero-day Attack Graph
Vulnerability Assessment for ICS system Based on Zero-day At...
收藏 引用
2020 International Conference on Intelligent Computing, Automation and Systems, ICICAS 2020
作者: Wang, Wenhui Chen, Liandong Han, Longxi Zhou, Zhihong Xia, Zhengmin Chen, Xiuzhen State Grid Key Laboratory of Information Network Security Global Energy Interconnection Research Institute Co. Ltd Beijing102209 China Network and Information Security Center State Grid Hebei Information Telecommunication Branch Shijiazhuang China Institute of Cyber Science and Technology Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai Jiao Tong University Shanghai China Institute of Cyber Science and Technology Shanghai Jiao Tong University Shanghai China
The numerous attacks on ICS systems have made severe threats to critical infrastructure. Extensive studies have focussed on the risk assessment of discovering vulnerabilities. However, to identify Zero-day vulnerabili... 详细信息
来源: 评论
Fast Gumbel-Max Sketch and its Applications
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yuanming Wang, Pinghui Qi, Yiyan Cheng, Kuankuan Zhao, Junzhou Tian, Guangjian Guan, Xiaohong The MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University P.O. Box 1088 No. 28 Xianning West Road Shaanxi Xi'An710049 China The Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Tsinghua University Beijing100084 China Huawei Noah's Ark Lab Hong Kong
The well-known Gumbel-Max Trick for sampling elements from a categorical distribution (or more generally a non-negative vector) and its variants have been widely used in areas such as machine learning and information ... 详细信息
来源: 评论
A secure deduplication scheme based on data popularity with fully random tags
A secure deduplication scheme based on data popularity with ...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Guanxiong Ha Hang Chen Chunfu Jia Ruiqi Li Qiaowen Jia College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Institute of Software Chinese Academy of Sciences Beijing China
It is difficult to provide semantic security for user data while using deduplication to save storage space in cloud storage. Some studies attempt to provide different levels of security for data according to their pop... 详细信息
来源: 评论
A federated sleep staging method based on adaptive re-aggregation and double prototype-contrastive using single-channel electroencephalogram
收藏 引用
Engineering Applications of Artificial Intelligence 2025年 156卷
作者: Ma, Bian Duan, Lijuan Huang, Zhaoyang Qiao, Yuanhua College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing100053 China Beijing Key Laboratory of Neuromodulation Beijing100053 China School of Mathematics Statistics and Mechanics Beijing University of Technology Beijing100124 China
The limited availability of sleep data collected by individual institutions poses a significant challenge in developing automatic sleep staging models, especially given that most existing models rely heavily on data-d... 详细信息
来源: 评论
Orbital-selective effect of spin reorientation on the Dirac fermions in a non-charge-ordered kagome ferromagnet Fe3Ge (vol 15, 9823, 2024)
收藏 引用
NATURE COMMUNICATIONS 2024年 第1期15卷 9823页
作者: Lou, Rui Zhou, Liqin Song, Wenhua Fedorov, Alexander Tu, Zhijun Jiang, Bei Wang, Qi Li, Man Liu, Zhonghao Chen, Xuezhi Rader, Oliver Buechner, Bernd Sun, Yujie Weng, Hongming Lei, Hechang Wang, Shancai Leibniz Institute for Solid State and Materials Research IFW Dresden 01069 Dresden Sachsen Germany Helmholtz-Zentrum Berlin für Materialien und Energie Albert-Einstein-Straße 15 12489 Berlin Germany Joint Laboratory “Functional Quantum Materials” at BESSY II 12489 Berlin Germany Institute of Solid State and Materials Physics TU Dresden 01062 Dresden Sachsen Germany Beijing National Laboratory for Condensed Matter Physics and Institute of Physics Chinese Academy of Sciences Beijing 100190 China University of Chinese Academy of Sciences Beijing 100049 China Songshan Lake Materials Laboratory Dongguan Guangdong 523808 China Shanghai Institute of Applied Physics Chinese Academy of Sciences Shanghai 201800 China Department of Physics Key Laboratory of Quantum State Construction and Manipulation (Ministry of Education) and Beijing Key Laboratory of Opto-electronic Functional Materials & Micro-nano Devices Renmin University of China Beijing 100872 China School of Physical Science and Technology ShanghaiTech University Shanghai 201210 China ShanghaiTech Laboratory for Topological Physics ShanghaiTech University Shanghai 201210 China School of Information Network Security People’s Public Security University of China Beijing 100038 China Institute of High-Pressure Physics and School of Physical Science and Technology Ningbo University Ningbo 315211 China Department of Physics and Guangdong Basic Research Center of Excellence for Quantum Science Southern University of Science and Technology (SUSTech) Shenzhen 518055 China Quantum Science Center of Guangdong-Hong Kong-Macao Greater Bay Area (Guangdong) Shenzhen 518045 China Institute of Advanced Science Facilities Shenzhen Guangdong 518107 China
Kagome magnets provide a fascinating platform for the realization of correlated topological quantum phases under various magnetic ground states. However, the effect of the magnetic spin configurations on the character...
来源: 评论
Ultralow Two-Channel Thermal Conductivity in Aikinite
SSRN
收藏 引用
SSRN 2024年
作者: Li, Jingyu Wei, Liuming Ti, Zhuoyang Zhu, Jianbo Zhai, Wenya Li, Hang Liu, Peng-Fei Institute for Computational Materials Science School of Physics and Electronics International Joint Research Laboratory of New Energy Materials and Devices of Henan Province Henan University Kaifeng475004 China Department of Network Security Henan Police College Zhengzhou450046 China Spallation Neutron Source Science Center Dongguan523803 China Beijing100049 China Science Island Branch of Graduate School University of Science and Technology of China Hefei230026 China State Key Laboratory of Advanced Welding and Joining Harbin Institute of Technology Harbin150001 China Guangzhou510275 China
Realizing glass-like ultralow lattice thermal conductivity κL in an ordered crystalline material is overwhelmingly appealing for various applications in thermoelectrics and thermal barrier coatings. Here, based on fi... 详细信息
来源: 评论
Estimating wetland CH4 emissions on the Qinghai-Tibetan Plateau based on a processed model coupled with inundation dynamics between 1960 and 2100
收藏 引用
Science of the Total Environment 2024年 955卷 177169页
作者: Zhang, Jiang Chen, Huai Peng, Changhui Huang, Yuanyuan Wang, Yike Liu, Xinwei Wang, Meng Wang, Le Yu, Dongxue Zhu, Qiuan Key Laboratory of Ecosystem Network Observation and Modeling Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing100101 China Chengdu Institute of Biology Chinese Academy of Sciences Chengdu610041 China Institute of Environment Sciences Department of Biology Sciences University of Quebec at Montreal Case Postale 8888 Succursale Centre-Ville MontrealQCH3C 3P8 Canada School of Geography Science Hunan Normal University Changsha410081 China Key Laboratory of Geographical Processes and Ecological Security in Changbai Mountains Ministry of Education School of Geographical Sciences Northeast Normal University Changchun130024 China Key Laboratory of Soil and Water Processes in Watershed College of Geography and Remote Sensing Hohai University Nanjing210098 China National Earth System Science Data Center National Science & Technology Infrastructure of China Beijing100101 China
Quantifying the impacts of climate change and wetland area dynamics on methane (CH4) emissions in the Qinghai-Tibetan Plateau (QTP) is crucial for enhancing our understanding of regional and global CH4 budgets. Howeve... 详细信息
来源: 评论
CODH++: Macro-semantic differences oriented instance segmentation network
收藏 引用
Expert Systems with Applications 2022年 202卷 1页
作者: Zhang, Wenchao Fu, Chong Cao, Lin Sham, Chiu-Wing School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China School of Information and Communication Engineering Beijing Information Science and Technology University Beijing100101 China School of Computer Science The University of Auckland New Zealand
With the idea of divide and rule, there exist two different forms of semantic features flowing in the two stage instance segmentation paradigms. They are the global features at the image level and the instance feature... 详细信息
来源: 评论
EEG Source Localization Using Spatio-Temporal Neural network
收藏 引用
China Communications 2019年 第7期16卷 131-143页
作者: Song Cui Lijuan Duan Bei Gong Yuanhua Qiao Fan Xu Juncheng Chen Changming Wang Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China College of Applied Sciences Beijing University of Technology Beijing 100124 China The National Clinical Research Center for Mental Disorders & Beijing Key Laboratory of Mental Disorders Beijing Anding Hospital Capital Medical University Beijing 100088 China Advanced Innovation Center for Human Brain Protection Capital Medical University Beijing 100069 China
Source localization of focal electrical activity from scalp electroencephalogram (sEEG) signal is generally modeled as an inverse problem that is highly ill-posed. In this paper, a novel source localization method is ... 详细信息
来源: 评论