咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 328 篇 期刊文献

馆藏范围

  • 667 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 325 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 47 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 19 篇 法学
  • 14 篇 医学
    • 12 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 11 篇 federated learni...
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 626 篇 英文
  • 23 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
667 条 记 录,以下是361-370 订阅
排序:
Global context aware RCNN for object detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Wenchao Fu, Chong Xie, Haoyu Zhu, Mai Tie, Ming Chen, Junxin School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China Science and Technology on Space Physics Laboratory Beijing100076 China College of Medicine and Biological Information Engineering Northeastern University Shenyang110819 China
RoIPool/RoIAlign is an indispensable process for the typical two-stage object detection algorithm, it is used to rescale the object proposal cropped from the feature pyramid to generate a fixed size feature map. Howev... 详细信息
来源: 评论
Building an efficient intrusion detection system based on feature selection and ensemble classifier
arXiv
收藏 引用
arXiv 2019年
作者: Zhou, Yuyang Cheng, Guang Jiang, Shanqing Dai, Mian School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Jiangsu Provincial Key Laboratory of Computer Network Technology Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsup... 详细信息
来源: 评论
An Intelligent Learning Method and System for Cybersecurity Threat Detection
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Yuan Tao Wei Hu Moyan Li The Third Research Institute of Ministry of Public Security Shanghai China National Engineering Laboratory for Key Technology of Classified Information Security Protection Beijing China
To protect information system and data effectively is the core of cybersecurity. At present, most technologies are based on known static protection strategies. Through the cybersecurity threat is dynamic, so it is nec...
来源: 评论
Research on Knowledge Graph Model for Cybersecurity Logs Based on Ontology and Classified protection
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1575卷
作者: Yuan Tao Moyan Li Wei Hu The Third Research Institute of Ministry of Public Security Shanghai China National Engineering Laboratory for Key Technology of Classified Information Security Protection Beijing China
In order to audit and analyse cybersecurity events from massive logs, the knowledge graph model for cybersecurity logs is proposed. The data layer and the pattern layer of the knowledge graph model for cybersecurity l...
来源: 评论
Secure medical data collection via local differential privacy  4
Secure medical data collection via local differential privac...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Wang, Zhiqiang Ma, Pingchuan Wang, Ruming Zhang, Jianyi Chi, Yaping Ma, Yanzhe Yang, Tao Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei China Beijing Electronic Science and Technology Institute Beijing China Hainan University Haikou China Ministry of Public Security Key Lab of Information Network Security Shanghai China
As the volume of medical data mining increases, so do the need to preserve patient privacy. And the exposure of medical data may degrade the level of health care service and reduce the trust of patients. Local Differe... 详细信息
来源: 评论
Device-independent quantum private query protocol without the assumption of perfect detectors
arXiv
收藏 引用
arXiv 2019年
作者: Li, Dan-Dan Huang, Xiao-Hong Huang, Wei Gao, Fei Institute of Network Technology Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Cryptology P. O. Box 5159 Beijing100878 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China
The first device-independent quantum private query protocol (MRT17) which is proposed by Maitra et al. [Phys. Rev. A 95, 042344 (2017)] to enhance the security through the certification of the states and measurements....
来源: 评论
Multidimensional particle swarm optimization based long short-term memory method for human activity recognition  4
Multidimensional particle swarm optimization based long shor...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Zuo, Peiliang Li, Haoliang Zhang, Yuanli Yang, Tao Ministry of Education Beijing University of Posts and Telecommunications Key Laboratory of Universal Wireless Communication Beijing China Department of Network Space Security Beijing Electronic Science and Technology Institute Beijing China
Human activity recognition (HAR) is indispensable for human-machine interaction. Related applications in many fields, e.g. medical, military, and security, facilitate and even change the lives of human beings. However... 详细信息
来源: 评论
An energy efficient authentication scheme using chebyshev chaotic map for smart grid environment
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Liping Zhu, Yue Ren, Wei Wang, Yinghan Xiong, Neal N. Zhang, Yan School of Computer Science China University of Geosciences Wuhan430074 China School of Computer Science China University of Geosciences Guangxi Key Laboratory of Cryptography and Information Security Guilin541004 China Key Laboratory of Network Assessment Technology CAS [Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Mathematics and Computer Science Northeastern State University OK74464 United States Department of Informatics University of Oslo Norway
Smart grid (SG) is an automatic electric power transmission network with bidirectional flows of both energy and information. As one of the important applications of smart grid, charging between electric vehicles has a... 详细信息
来源: 评论
A new dance generation task from start to end
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1651卷
作者: Xiao Xu Lijuan Duan Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China
The dance generation task is an interesting task. The general task is to predict the next dance sequence through a given initial frame, or to convert from music to dance through audio information. However, these works...
来源: 评论
A note on self-dual generalized reed-solomon codes
arXiv
收藏 引用
arXiv 2020年
作者: Fang, Weijun Zhang, Jun Xia, Shu-Tao Fu, Fang-Wei Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen518055 China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518055 China School of Mathematical Sciences Capital Normal University Beijing100048 China Chern Institute of Mathematics and LPMC Nankai University Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China
A linear code is called an MDS self-dual code if it is both an MDS code and a self-dual code with respect to the Euclidean inner product. The parameters of such codes are completely determined by the code length. In t... 详细信息
来源: 评论