咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是21-30 订阅
排序:
High-precision end-to-end adaptive optics aided orbital angular momentum wireless communication with XFTC-Net
收藏 引用
Optics Letters 2025年 第10期50卷 3265-3268页
作者: Panpan Xu Huan Chang Fei Wang Ran Gao Dong Guo Lei Zhu Zhipei Li Sitong Zhou Qi Xu Jing Chen Xiangjun Xin School of Information and Electronics Beijing Institute of Technology (BIT) Beijing 100081 China National Key Laboratory of Science and Technology on Space-Born Intelligent Information Processing Beijing China School of Electronic Engineering Beijing University of Posts and Telecommunications (BUPT) Beijing 100876 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology 250353 China
In this Letter, we demonstrate high-precision end-to-end adaptive optics (AO) technique based on the X-Shape Fusion Transformer-convolutional neural network (XFTC-Net) without an additional probe path to compensate fo... 详细信息
来源: 评论
A Novel Trustworthy Video Summarization Algorithm Through a Mixture of LoRA Experts
arXiv
收藏 引用
arXiv 2025年
作者: Du, Wenzhuo Wang, Gerun Chen, Guancheng Zhao, Hang Li, Xin Gao, Jian School of Information and Network Security People’s Public Security University of China Beijing102206 China Key Laboratory of Security Prevention Technology and Risk Assessment Ministry of Public Security Beijing100038 China School of Criminal Investigation People’s Public Security University of China Beijing102206 China
With the exponential growth of user-generated content on video-sharing platforms, the challenge of facilitating efficient searching and browsing of videos has garnered significant attention. To enhance users’ ability... 详细信息
来源: 评论
TFLAG: Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Wenhan Chai, Tingting Liu, Hongri Wang, Kai Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China
Advanced Persistent Threat (APT) have grown increasingly complex and concealed, posing formidable challenges to existing Intrusion Detection Systems in identifying and mitigating these attacks. Recent studies have inc... 详细信息
来源: 评论
Protective performance of sacrificial cladding with foamed geopolymer core under impact loading
收藏 引用
International Journal of Impact Engineering 2025年 204卷
作者: Zhou, Hongyuan Liu, Hao Wang, Xiaojuan Lv, Yang Zhang, Hong Song, Tianyi Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing100124 China State Key Laboratory of Explosion Science and Technology Beijing Institute of Technology Beijing100081 China Tianjin Key Laboratory of Civil Structure Protection and Reinforcement Tianjin Chengjian University Tianjin300384 China
In the present study, a novel sacrificial cladding with a foamed geopolymer (FG) energy-absorbing core was proposed for structural protection to resist impact loading. First, the mechanical and energy absorption perfo... 详细信息
来源: 评论
RobustPFL: Robust Personalized Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Guorong Wang, Wei Wu, Yufang Li, Chao Xu, Guangquan Ji, Shouling Li, Tao Shen, Meng Han, Yufei Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Beijing Jiaotong University 3 Shangyuancun Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin300350 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China ITAI Haihe Lab Tianjin China Nankai University College of Computer Science Tianjin300350 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen518066 China INRIA Bretagne Rennes35042 France
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge... 详细信息
来源: 评论
Advanced critical temperature method of concrete-filled steel tubular columns for early warning of fire-induced failure
收藏 引用
Structures 2025年 77卷
作者: Song, Tian-Yi Wang, Yi-Xuan Yu, Wen-Chuan Zhou, Hongyuan Xiang, Kai Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing100124 China Tianjin Fire Science and Technology Research Institute of MEM Tianjin300381 China Key Laboratory of Fire Protection Technology for Industry and Public Building Ministry of Emergency Management Tianjin300381 China
In recent years, building collapses due to fires have become more frequent. Early warning of fire-induced building collapses, along with prompt evacuation, can significantly reduce casualties, particularly among firef... 详细信息
来源: 评论
Burst image super-resolution based on dual branch fusion and adaptive frame selection
收藏 引用
Displays 2025年 89卷
作者: Duan, Lijuan Zuo, Wendi Gu, Ke Gong, Zhi School of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing100124 China School of Information Science and Technology Beijing University of Technology Beijing100124 China Chongqing Research Institute of Beijing University of Technology China
The modern handheld camera is capable of rapidly capturing multiple images and subsequently merging them into a single image. The extant methodologies typically select the first frame as the reference frame, utilising... 详细信息
来源: 评论
Poisoning Attacks and Defenses to Learned Bloom Filters for Malicious URL Detection
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Dong, Fangming Wang, Pinghui Li, Rundong Cui, Xueyao Zhao, Junzhou Tao, Jing Zhang, Chen Guan, Xiaohong Zhejiang CreateLink Technology Co. Ltd Guangdong Guangzhou China Xi'an Jiaotong University MOE Key Laboratory for Intelligent Networks and Network Security Shaanxi Xi'an710049 China Tsinghua University Center for Intelligent and Networked Systems Tsinghua National Lab for Information Science and Technology Beijing China
Approximate membership query (AMQ) structures represented by the Bloom Filter and its variants have been popularly researched in recent years. Researchers have recently combined machine learning with this type of stru... 详细信息
来源: 评论
Splicer+: Secure Hub Placement and Deadlock-Free Routing for Payment Channel network Scalability
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wang, Wei Gao, Sheng Qu, Qiang Tian, Wensheng Shen, Yulong The School of Computer Science and Technology Xidian University Xi’an710071 China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China The Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing100044 China The School of Information Central University of Finance and Economics Beijing100081 China The Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China The Huawei Blockchain Lab Huawei Cloud Tech Co. Ltd. Shenzhen518055 China The Nanhu Lab Jiaxing314001 China The Cryptology and Computer Security Laboratory Shanghai Jiao Tong University Shanghai200240 China
Payment channel hub (PCH) is a promising approach for payment channel networks (PCNs) to improve efficiency by deploying robust hubs to steadily process off-chain transactions. However, existing PCHs, often preplaced ... 详细信息
来源: 评论
Efficiency Boosting of Secure Cross-Platform Recommender Systems Over Sparse Data
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2146-2160页
作者: Ren, Hao Xu, Guowen Zhang, Tianwei Ning, Jianting Huang, Xinyi Li, Hongwei Lu, Rongxing School of Cyber Science and Engineering Sichuan University Chengdu610017 China State Key Laboratory of Cryptology Beijing100878 China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education Chengdu610017 China Cyber Science Research Institute Sichuan University Chengdu610017 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Cyber Science and Engineering Wuhan University Wuhan430072 China Faculty of Data Science City University of Macau 999078 China Colledge of Cyber Security Jinan University Guangzhou510632 China School of Computer Science University of New Brunswick New BrunswickE3B 5A3 Canada
Fueled by its successful commercialization, the recommender system (RS) has gained widespread attention. However, as the training data fed into the RS models are often highly sensitive, it ultimately leads to severe p... 详细信息
来源: 评论