咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 330 篇 期刊文献

馆藏范围

  • 669 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 469 篇 工学
    • 327 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 48 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 627 篇 英文
  • 24 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
669 条 记 录,以下是321-330 订阅
排序:
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment
收藏 引用
China Communications 2018年 第2期15卷 122-137页
作者: Jing Zhan Xudong Fan Lei Cai Yaqi Gao Junxi Zhuang College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... 详细信息
来源: 评论
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with Partial CSI in Smart Factory
On the ADEP and DOR Analysis of RIS-aided URLLC Systems with...
收藏 引用
IEEE Globecom Workshops
作者: Tingnan Bao Haiming Wang Hong-Chuan Yang Wen-Jing Wang Mazen O. Hasna Lenovo Research + Institute Of Computing Technology Chinese Academy of Sciences Beijing China Lenovo Reseach Lenovo Group Limited Bejiing China Department of Electrical and Computer Engineering University of Victoria Victoria Canada Shaanxi Key Laboratory of Information Communication Network and Security XUPT Xi'an China Department of Electrical Engineering Qatar University Doha Qatar
Factory automation applications impose stringent quality of service (QoS) over ultra-reliable and low-latency communication (URLLC) system. However, the existing wireless systems cannot meet the requirement for these ... 详细信息
来源: 评论
Train delays prediction based on feature selection and random forest
Train delays prediction based on feature selection and rando...
收藏 引用
International Conference on Intelligent Transportation
作者: Yuanyuan Ji Wei Zheng Hairong Dong Pengfei Gao National Research Center of Railway Safety Assessment Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing
Although trains are more efficient and convenient than other transportation, delays often occur. Accurately predicting the delay time of trains is of great significance to both dispatchers and passengers. The method f... 详细信息
来源: 评论
Efficient Malware Originated Traffic Classification by Using Generative Adversarial networks
Efficient Malware Originated Traffic Classification by Using...
收藏 引用
IEEE Symposium on Computers and Communications (ISCC)
作者: Zhicheng Liu Shuhao Li Yongzheng Zhang Xiaochun Yun Zhenyu Cheng Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
With the booming of malware-based cyber-security incidents and the sophistication of attacks, previous detections based on malware sample analysis appear powerless due to time-consuming and labor-intensive analysis pr...
来源: 评论
Generating superpixels for high-resolution images with Decoupled Patch Calibration
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi'an Jiaotong University Xi'an710049 China School of Computer and Information Technology Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an710049 China The SMILES Laboratory Xi'an Jiaotong University Xi'an710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi'an Jiaotong University Xi'an710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
Superpixel segmentation has recently seen important progress benefiting from the advances in differentiable deep learning. However, the very high-resolution superpixel segmentation still remains challenging due to the... 详细信息
来源: 评论
False data injection attacks against smart grid state estimation:Construction, detection and defense
收藏 引用
Science China(Technological Sciences) 2019年 第12期62卷 2077-2087页
作者: ZHANG Meng SHEN Chao HE Ning HAN SiCong LI Qi WANG Qian GUAN XiaoHong Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiao tong UniversityXi'an 710049China Faculty of Electronic and Information Engineering Xi'an Jiaotong UniversityXi'an 710049China School of Mechanical and Electrical Engineering Xi'an University of Architecture and TechnologyXi'an 710049China Institute for Network Sciences and Cyberspace Tsinghua UniversityBeijing 100084China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China
As a typical representative of the so-called cyber-physical system,smart grid reveals its high efficiency,robustness and reliability compared with conventional power ***,due to the deep integration of electrical compo... 详细信息
来源: 评论
Dynamic NOMA-Based Computation Offloading in Vehicular Platoons
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Dongsheng Chen, Yingyang Wei, Lai Jiao, Bingli Hanzo, Lajos The Department of Electronics Peking University Beijing100871 China The College of Information Science and Technology Jinan University Guangzhou510632 China The Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Guangzhou510632 China The School of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
Both the Mobile edge computing (MEC)-based and fog computing (FC)-aided Internet of Vehicles (IoV) constitute promising paradigms of meeting the demands of low-latency pervasive computing. To this end, we construct a ... 详细信息
来源: 评论
Microplastics Pose an Elevated Antimicrobial Resistance Risk Than Natural Surfaces via a Systematic Comparative Study of Surface Biofilms in Rivers
收藏 引用
Environmental science & technology 2025年 第22期59卷 2025 May 26页
作者: Kai Yang Fei Xu Xinyu Xing Jing Wei Qing-Lin Chen Jian-Qiang Su Li Cui State Key Laboratory for Ecological Security of Regions and Cities Institute of Urban Environment Chinese Academy of Sciences Xiamen 361021 China. University of Chinese Academy of Sciences 19A Yuquan Road Beijing 100049 China. Environmental Protection Key Laboratory of Soil Environmental Management and Pollution Control Nanjing Institute of Environmental Sciences Ministry of Ecology and Environment of China Nanjing 210042 China. Zhejiang Key Laboratory of Urban Environmental Processes and Pollution Control CAS Haixi Industrial Technology Innovation Center in Beilun Ningbo 315830 China.
The pervasive presence of antimicrobial resistance (AMR) in various ecosystems threatens global health, especially in persistent biofilm states. Both anthropogenic and natural surfaces in environments provide ideal ha... 详细信息
来源: 评论
A Dynamic Fault Tree Based CBTC Onboard ATP System Safety Analysis Method*
A Dynamic Fault Tree Based CBTC Onboard ATP System Safety An...
收藏 引用
International Conference on Intelligent Transportation
作者: Pengfei Gao Chao Liu Hairong Dong Wei Zheng National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment Beijing Jiaotong University Beijing China State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing China
To obtain refined safety requirements during system architecture design stage, the traditional static fault tree analysis mothed is widely used to analyse the logical relationship between basic hazardous events leadin... 详细信息
来源: 评论
Factors correlation mining on railway accidents using association rule learning algorithm
Factors correlation mining on railway accidents using associ...
收藏 引用
International Conference on Intelligent Transportation
作者: Yakun Wang Wei Zheng Hairong Dong Pengfei Gao National Research Center of Railway Safety Assessment Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing China State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing China
Although much research work for the operation safety has been taken in the railway domain, some accidents still occur because past experiences of accident analysis were not fully accumulated for safety improvement. Th... 详细信息
来源: 评论