咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 469 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 627 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
669 条 记 录,以下是301-310 订阅
排序:
Research on Electric Micro-Meteorological Monitoring and Early Warning System  2
Research on Electric Micro-Meteorological Monitoring and Ear...
收藏 引用
2019 2nd International Symposium on Power Electronics and Control Engineering, ISPECE 2019
作者: Zhang, Zehao Yu, Zhen Xu, Xiyuan Guan, Cheng Zhang, Song Global Energy Interconnection Research Institute Co. Ltd Research Institute of Information Technology and Communication Beijing102206 China State Grid Key Laboratory of Information and Network Security China State Grid FuJian Electric Power Co. LTD Switzerland
This paper studies and analyzes the influence of micro-meteorological disasters on power system, points out the main problems in the establishment of power micro-meteorological monitoring and early warning system, put... 详细信息
来源: 评论
MedSteGAN: Medical Embedding-Optimized Steganography with Improved GAN
SSRN
收藏 引用
SSRN 2023年
作者: Peng, Yuxiang Fu, Chong Zheng, Yu Tian, Yunjia Cao, Guixing Chen, Junxin School of Computer Science and Engineering Northeastern University Liaoning Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang110819 China Department of Information Engineering The Chinese University of Hong Kong Ma Liu Shui Shatin New Territories Hong Kong Institute of Telecommunication Satellite China Academy of Space Technology Beijing100094 China School of Software Dalian University of Technology Liaoning Dalian116621 China
Medical diagnosing systems contain sensitive information, especially the resulting certificate of diagnosis that involves the patient’s privacy, required to be protected carefully. An effective way is to secretly emb... 详细信息
来源: 评论
Double JPEG Compression Detection Based on Markov Model  18th
Double JPEG Compression Detection Based on Markov Model
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yung-Qing Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images ... 详细信息
来源: 评论
Orbital-selective effect of spin reorientation on the Dirac fermions in a non-charge-ordered kagome ferromagnet Fe3Ge
arXiv
收藏 引用
arXiv 2023年
作者: Lou, Rui Zhou, Liqin Song, Wenhua Fedorov, Alexander Tu, Zhijun Jiang, Bei Wang, Qi Li, Man Liu, Zhonghao Chen, Xuezhi Rader, Oliver Büchner, Bernd Sun, Yujie Weng, Hongming Lei, Hechang Wang, Shancai Leibniz Institute for Solid State and Materials Research IFW Dresden Dresden01069 Germany Helmholtz-Zentrum Berlin für Materialien und Energie Albert-Einstein-Straße 15 Berlin12489 Germany Joint Laboratory "Functional Quantum Materials" BESSY II Berlin12489 Germany Beijing National Laboratory for Condensed Matter Physics Institute of Physics Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Beijing Key Laboratory of Opto-electronic Functional Materials & Micro-nano Devices Renmin University of China Beijing100872 China School of Physical Science and Technology ShanghaiTech University Shanghai201210 China ShanghaiTech Laboratory for Topological Physics ShanghaiTech University Shanghai201210 China School of Information Network Security People’s Public Security University of China Beijing100038 China Institute of High-Pressure Physics School of Physical Science and Technology Ningbo University Ningbo315211 China Shanghai Institute of Applied Physics Chinese Academy of Sciences Shanghai201800 China Institute for Solid State and Materials Physics TU Dresden Dresden01062 Germany Department of Physics Southern University of Science and Technology Shenzhen518055 China Songshan Lake Materials Laboratory Guangdong Dongguan523808 China
Kagome magnets provide a fascinating platform for the realization of correlated topological quantum phases under various magnetic ground states. However, the effect of the magnetic spin configurations on the character... 详细信息
来源: 评论
Collaborative filtering-based recommendation system for big data
Collaborative filtering-based recommendation system for big ...
收藏 引用
作者: Shen, Jian Zhou, Tianqi Chen, Lina Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology School of Computer and Software Nanjing University of Information Science and Technology Nanjing China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Guangxi Key Laboratory of Cryptography and Information Security Guilin China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Guizhousheng College of Electronics and Information Guizhou China
Collaborative filtering algorithm is widely used in the recommendation system of e-commerce website, which is based on the analysis of a large number of users' historical behaviour data, so as to explore the users... 详细信息
来源: 评论
Underwater image enhancement via medium transmission-guided multi-color space embedding
arXiv
收藏 引用
arXiv 2021年
作者: Li, Chongyi Anwar, Saeed Hou, Junhui Cong, Runmin Guo, Chunle Ren, Wenqi CSIRO Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China College of Computer Science Nankai University Tianjin China Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China
State key laboratory of Information security, Institute of Information Engineering, Chinese Academy of Sciences, China Underwater images suffer from color casts and low contrast due to wavelength- A nd distance-depend... 详细信息
来源: 评论
DAMIA: Leveraging domain adaptation as a defense against membership inference attacks
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Hongwei Luo, Weiqi Zeng, Guoqiang Weng, Jian Zhang, Yue Yang, Anjia College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China
Deep Learning (DL) techniques allow one to train a model from a dataset, and the model can be adopted to solve tasks. DL has attracted much interest given its fancy performance and potential market value, while securi... 详细信息
来源: 评论
Dynamics and Resonance Fluorescence from a Superconducting Artificial Atom Doubly Driven by Quantized and Classical Fields
arXiv
收藏 引用
arXiv 2024年
作者: Ruan, Xinhui Wang, Jia-Heng He, Dong Song, Pengtao Li, Shengyong Zhao, Qianchuan Kuang, L.M. Tsai, Jaw-Shen Zou, Chang-Ling Zhang, Jing Zheng, Dongning Astafiev, O.V. Liu, Yu-Xi Peng, Zhihui Department of Automation Tsinghua University Beijing100084 China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics and Synergetic Innovation Center of Quantum Effects and Applications Hunan Normal University Changsha410081 China School of Integrated Circuits Tsinghua University Beijing100084 China Institute of Physics Chinese Academy of Sciences Beijing100190 China School of Physical Sciences University of Chinese Academy of Sciences Beijing100190 China Center for Quantum Computing RIKEN Saitama351-0198 Japan Graduate School of Science Tokyo University of Science 1-3 Kagurazaka Shinjuku Tokyo162-0825 Japan CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei Anhui230026 China Hefei National Laboratory Hefei230088 China School of Automation Science and Engineering Xi'an Jiaotong University Xi’an710049 China MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi’an710049 China Skolkovo Institute of Science and Technology Nobel str. 3 Moscow143026 Russia Moscow Institute of Physics and Technology Institutskiy Pereulok 9 Dolgoprudny141701 Russia Royal Holloway University of London Surrey EghamTW20 0EX United Kingdom
We report an experimental demonstration of resonance fluorescence in a two-level superconducting artificial atom under two driving fields coupled to a detuned cavity. One of the fields is classical and the other is va... 详细信息
来源: 评论
Identification of important nodes on large-scale Internet based on unsupervised learning  2020
Identification of important nodes on large-scale Internet ba...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Fuyang Fang Daojuan Zhang Chonghua Wang De Zhang Yuanfei Zhang Chao Li Xi Luo Ye Fu Information Science Academy of China Electronics Technology Group Corporation Beijing China State Grid Key Laboratory of Information & Network Security Global Energy Interconnection Research Institute co. Ltd Beijing China China Industrial Control Systems Cyber Emergency Response Team Beijing China Cyber space Institute of Advanced Technology Guangzhou University Guangzhou China
In recent years, scholars have conducted in-depth researches on the robustness, structural vulnerability, and detection and identification of devices in cyberspace from different perspectives such as complex networks ... 详细信息
来源: 评论
Peripheral-free device pairing by randomly switching power
arXiv
收藏 引用
arXiv 2020年
作者: Shao, Zhijian Weng, Jian Zhang, Yue Wu, Yongdong Li, Ming Weng, Jiasi Luo, Weiqi Yu, Shui College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China University of Technology Sydney UltimoNSW Australia
The popularity of Internet-of-Things (IoT) comes with security concerns. Attacks against wireless communication venues of IoT (e.g., Man-in-the-Middle attacks) have grown at an alarming rate over the past decade. Pair... 详细信息
来源: 评论