咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是31-40 订阅
排序:
Solving Modular Linear Equations via Automated Coppersmith and Its Applications  20th
Solving Modular Linear Equations via Automated Coppersmith ...
收藏 引用
20th International Conference on Information security and Cryptology, Inscrypt 2024
作者: Feng, Yansong Liu, Zhen Nitaj, Abderrahmane Pan, Yanbin State Key Laboratory of Mathematical Sciences Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing China Hubei Provincial Engineering Research Center of Intelligent Connected Vehicle Network Security School of Cyber Science and Technology Hubei University Wuhan 430062 China Normandie Univ UNICAEN CNRS LMNO Caen 14000 France
At Asiacrypt’23, Meers and Nowakowski introduced a new automated method called Automated Coppersmith, which can be viewed as a generalization of Jochemsz-May Strategy for systems of polynomial equations. It selects m... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
RoPA: Robust Privacy-Preserving Forward Aggregation for Split Vertical Federated Learning
收藏 引用
IEEE Transactions on network and Service Management 2025年
作者: Wang, Lingling Zhang, Zhengyin Huang, Mei Gai, Keke Wang, Jingjing Shen, Yulong Qingdao University of Science and Technology School of Information Science and Technology Shandong Qingdao 266061 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing 100081 China Xidian University School of Computer Science and Technology China Shaanxi Key Laboratory of Network and System Security Xi’an 710071 China
Split Vertical Federated Learning (Split VFL) is an increasingly popular framework for collaborative machine learning on vertically partitioned data. However, it is vulnerable to various attacks, resulting in privacy ... 详细信息
来源: 评论
Privacy-Preserving IoT Image Transmission: Multi-Stage SVD Data Embedding and Heatmap Alignment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Du, Kaixin Ma, Bin Yang, Meihong Wang, Xiaoyu Li, Xiaolong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250101 China Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China
The images transmitted by IoT devices, particularly those used for surveillance or sensor data, are vulnerable to malicious screenshots and unauthorized access, leading to potential privacy breaches. To address this, ... 详细信息
来源: 评论
Research on Loophole with Second Distribution of Real Value Detectors
收藏 引用
Chinese Journal of Electronics 2016年 第6期25卷 1141-1150页
作者: WANG Tianbo ZHANG Fengbin XIA Chunhe Beijing Key Laboratory of Network Technology Beihang University Network and Information Security Laboratory Harbin University of Science and Technology
Traditional anomaly detection algorithm has improved to some degree the mechanism of negative selection. There still remain many problems such as the randomness of detector generation, incompleteness of selfset and th... 详细信息
来源: 评论
CGNet: Classification-Guided Multi-Task Interactive network for Hyperspectral and Multispectral Image Fusion
CGNet: Classification-Guided Multi-Task Interactive Network ...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Yanlong Xu Yongbiao Gao Guixin Zhao Guotao Wang Xiangcheng Sun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China Shandong Key Laboratory of Ubiquitous Intelligent Computing China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
The goal of fusing hyperspectral images (HSI) and multispectral images (MSI) is to generate high-resolution hyperspectral images for downstream tasks. However, most existing methods overlook the specific requirements ... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-indistinguishable Approach
收藏 引用
IEEE Transactions on Information Forensics and security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Anhui University of Science and Technology State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining the School of Computer Science and Engineering Anhui University of Science and Technology Huainan 232001 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan 650221 China Qilu University of Technology (Shandong Academy of Sciences) Key Laboratory of Equipment Data Security and Guarantee Technology Ministry of Education Key Laboratory of Computing Power Network and Information Security Ministry of Education China Beijing University of Posts and Telecommunications China Zhejiang University China Nanjing University of Aeronautics and Astronautics China University of Southern Queensland China
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Cross-Layer security for Semantic Communications: Metrics and Optimization
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui Nanjing University of Posts and Telecommunications College of Science Nanjing210003 China Nanjing University of Posts and Telecommunications College of Communication and Information Engineering Nanjing210003 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China Tsinghua University Department of Electronic Engineering Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
Full-scale studies are closer to reality than lab-scale ones: Tertiary treatment constructed wetlands maintain robust removal capability for pharmaceuticals and personal care products in cold weather conditions
收藏 引用
Bioresource technology 2025年 432卷 132661页
作者: Wang, Jiaxi Ye, Beibei Yu, Xia Yan, Ruiqi Lin, Hui Man, Ying Sui, Qian State Environmental Protection Key Laboratory of Environmental Risk Assessment and Control on Chemical Process School of Resources and Environmental Engineering East China University of Science and Technology Shanghai200237 China Beijing100015 China School of Chemistry and Environment Guangdong Ocean University Zhanjiang524088 China Shanghai Institute of Pollution Control and Ecological Security Shanghai200092 China
In contrast to previous lab-scale studies, full-scale studies show that low temperatures do not significantly hinder pharmaceutical and personal care product (PPCP) removal in tertiary treatment constructed wetland (C... 详细信息
来源: 评论
A Grouping Strategy-Based Progressive Fusion network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论