咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是341-350 订阅
排序:
A Dynamic Fault Tree Based CBTC Onboard ATP System Safety Analysis Method*
A Dynamic Fault Tree Based CBTC Onboard ATP System Safety An...
收藏 引用
International Conference on Intelligent Transportation
作者: Pengfei Gao Chao Liu Hairong Dong Wei Zheng National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment Beijing Jiaotong University Beijing China State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing China
To obtain refined safety requirements during system architecture design stage, the traditional static fault tree analysis mothed is widely used to analyse the logical relationship between basic hazardous events leadin... 详细信息
来源: 评论
Factors correlation mining on railway accidents using association rule learning algorithm
Factors correlation mining on railway accidents using associ...
收藏 引用
International Conference on Intelligent Transportation
作者: Yakun Wang Wei Zheng Hairong Dong Pengfei Gao National Research Center of Railway Safety Assessment Beijing Jiaotong University Beijing China National Research Centre of Railway Safety Assessment and the Beijing Key Laboratory of Intelligent Traffic Data Security and Privacy Protection Technology Beijing Jiaotong University Beijing China State Key Lab of Rail Traffic Control & Safety Beijing Jiaotong University Beijing China
Although much research work for the operation safety has been taken in the railway domain, some accidents still occur because past experiences of accident analysis were not fully accumulated for safety improvement. Th... 详细信息
来源: 评论
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
B2SFinder: Detecting Open-Source Software Reuse in COTS Soft...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Zimu Yuan Muyue Feng Feng Li Gu Ban Yang Xiao Shiyang Wang Qian Tang He Su Chendong Yu Jiahuan Xu Aihua Piao Jingling Xuey Wei Huo Institute of Information Engineering Chinese Academy of Sciences Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology and School of Cyber Security University of Chinese Academy of Sciences University of New South Wales
COTS software products are developed extensively on top of OSS projects, resulting in OSS reuse vulnerabilities. To detect such vulnerabilities, finding OSS reuses in COTS software has become imperative. While scalabl... 详细信息
来源: 评论
Two new families of quantum synchronizable codes
arXiv
收藏 引用
arXiv 2019年
作者: Luo, Lan Ma, Zhi Lin, Dongdai Henan Key Laboratory of Network Cryptography Technology Zhengzhou450001 State Key Laboratory of Information Security Beijing100093
In this paper, we present two new ways of quantum synchronization coding based on the (u + v\u - v) construction and the product construction respectively and greatly enrich the varieties of available quantum synchro-...
来源: 评论
ReGO: Reference-Guided Outpainting for Scenery Image
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Yaxiong Wei, Yunchao Qian, Xueming Zhu, Li Yang, Yi The School of Software Engineering Xi’an Jiaotong University Xi'An710049 China Institute of Information Science Beijing Jiaotong University Beijing100000 China The Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi’an Jiaotong University Xi'An710049 China The SMILES Laboratory Xi’an Jiaotong University Xi'An710049 China Zhibian Technology Co. Ltd. Taizhou317000 China The School of Software Xi’an Jiaotong University Xi'An710049 China School of Computer Science and Technology Zhejiang University Hangzhou310000 China
We aim to tackle the challenging yet practical scenery image outpainting task in this work. Recently, generative adversarial learning has significantly advanced the image outpainting by producing semantic consistent c... 详细信息
来源: 评论
How Does Knowledge Graph Embedding Extrapolate to Unseen Data: A Semantic Evidence View
arXiv
收藏 引用
arXiv 2021年
作者: Li, Ren Cao, Yanan Zhu, Qiannan Bi, Guanqun Fang, Fang Liu, Yi Li, Qian Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China Gaoling School of Artificial Intelligence Renmin University of China China Beijing Key Laboratory of Big Data Management and Analysis Methods China National Computer Network Emergency Response Technical Team Coordination Center of China China University of Technology Sydney Australia
Knowledge Graph Embedding (KGE) aims to learn representations for entities and relations. Most KGE models have gained great success, especially on extrapolation scenarios. Specifically, given an unseen triple (h, r, t... 详细信息
来源: 评论
Investigating Bi-level optimization for learning and vision from a unified perspective: A survey and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Liu, Risheng Gao, Jiaxin Zhang, Jin Meng, Deyu Lin, Zhouchen DUT-RU International School of Information Science & Engineering Dalian University of Technology Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian116024 China Department of Mathematics Southern University of Science and Technology National Center for Applied Mathematics Shenzhen China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an Shaanxi China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Cooperative Medianet Innovation Center Shanghai Jiao Tong University Shanghai200240 China
Bi-Level Optimization (BLO) is originated from the area of economic game theory and then introduced into the optimization community. BLO is able to handle problems with a hierarchical structure, involving two levels o... 详细信息
来源: 评论
Is AI Robust Enough for Scientific Research?
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Jun-Jie Song, Jiahao Wang, Xiu-Cheng Li, Fu-Peng Liu, Zehan Chen, Jian-Nan Dang, Haoning Wang, Shiyao Zhang, Yiyan Xu, Jianhui Shi, Chunxiang Wang, Fei Pang, Long-Gang Cheng, Nan Zhang, Weiwei Zhang, Duo Meng, Deyu Northwest Institute of Nuclear Technology No. 28 Pingyu Road Shaanxi Xi’an710024 China School of Telecommunications Engineering Xidian University No. 2 South Taibai Road Shaanxi Xi’an710071 China State Key Laboratory of ISN No. 2 South Taibai Road Shaanxi Xi’an710071 China Institute of Particle Physics Central China Normal University No. 152 Luoyu Road Hubei Wuhan30079 China School of Computer Science and Technology Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China Guangzhou Institute of Geography Academy of Sciences No. 100 Xianlie Road Guangdong Guangzhou510070 China National Meteorological Information Center Beijing100044 China MDX Research Center for Element Strategy Institute of Integrated Research Institute of Science Tokyo Midori-ku Yokohama226-8503 Japan School of Physics and Information Technology Shaanxi Normal University No. 620 West Chang’an Avenue Shaanxi Xi’an710119 China School of Aeronautics Northwestern Polytechnical University No. 127 West Youyi Road Shaanxi Xi’an710072 China AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China School of Mathematics and Statistics Xi’an Jiaotong University No. 28 Xianning West Road Shaanxi Xi’an710049 China
We uncover a phenomenon largely overlooked by the scientific community utilizing AI: neural networks exhibit high susceptibility to minute perturbations, resulting in significant deviations in their outputs. Through a... 详细信息
来源: 评论
In-situ data scheduling optimization based on rainbow DQN for IIoT
收藏 引用
Future Generation Computer Systems 2026年 174卷
作者: Peiying Zhang Siyi Li Lizhuang Tan Neeraj Kumar Jian Wang Kai Liu Qingdao Institute of Software College of Computer Science and Technology China University of Petroleum (East China) Qingdao 266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao 266580 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala 147004 India Department of Computer Science University of Economics and Human Sciences Warszawa 01-043 Poland Department of Networks and Communications College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University Dammam 31441 Saudi Arabia College of Science China University of Petroleum (East China) Qingdao 266580 China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing 100084 China State Key Laboratory of Space Network and Communications Tsinghua University Beijing 100084 China
In industrial systems, in-situ computing refers to a mode of local or proximate data processing within the cloud–edge-terminal architecture. In the Industrial Internet of Things (IIoT) environment, servers are typica...
来源: 评论
Golden grain: Building a secure and decentralized model marketplace for MLaaS
arXiv
收藏 引用
arXiv 2020年
作者: Weng, Jiasi Weng, Jian Cai, Chengjun Huang, Hongwei Wang, Cong The College of Information Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes the lives of people. A natural requirement for MLaaS is, however, to provide highly accurate prediction services. To achieve this, current MLaaS ... 详细信息
来源: 评论