咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 328 篇 期刊文献

馆藏范围

  • 667 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 467 篇 工学
    • 325 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 105 篇 信息与通信工程
    • 56 篇 电子科学与技术(可...
    • 49 篇 控制科学与工程
    • 47 篇 电气工程
    • 46 篇 生物工程
    • 42 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 18 篇 安全科学与工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 15 篇 化学工程与技术
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 26 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 105 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 19 篇 法学
  • 14 篇 医学
    • 12 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 11 篇 federated learni...
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 21 篇 key laboratory o...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 wang wei
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 lijuan duan
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao
  • 6 篇 gu lize

语言

  • 626 篇 英文
  • 23 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
667 条 记 录,以下是401-410 订阅
排序:
A Design of Direct Memory Access Controller for Wireless Communication SoC in Power Grid
A Design of Direct Memory Access Controller for Wireless Com...
收藏 引用
International Conference on Circuits, System and Simulation (ICCSS)
作者: Yingying Chi Zhe Zheng Research Department of Smart Chip Global Energy Interconnection Research Institute Co. Ltd. Beijing China State Grid Key Laboratory of Information & Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
This paper presents a complete Register Transfer Level (RTL) design of Direct Memory Access (DMA) controller which is compliable with the Advanced Highperformance Bus (AHB). The DMA is integrated in Cortex-M3-based sy... 详细信息
来源: 评论
An underwater image enhancement benchmark dataset and beyond
arXiv
收藏 引用
arXiv 2019年
作者: Li, Chongyi Guo, Chunle Ren, Wenqi Cong, Runmin Hou, Junhui Kwong, Sam Tao, Dacheng Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China School of Electrical and Information Engineering Tianjin University Tianjin China Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China City University of Hong Kong Shenzhen Research Institute Shenzhen51800 China UBTECH Sydney Artificial Intelligence Centre School of Information Technologies Faculty of Engineering and Information Technologies University of Sydney 6 Cleveland St DarlingtonNSW2008 Australia
Underwater image enhancement has been attracting much attention due to its significance in marine engineering and aquatic robotics. Numerous underwater image enhancement algorithms have been proposed in the last few y... 详细信息
来源: 评论
Research on Loophole with Second Distribution of Real Value Detectors
收藏 引用
Chinese Journal of Electronics 2016年 第6期25卷 1141-1150页
作者: WANG Tianbo ZHANG Fengbin XIA Chunhe Beijing Key Laboratory of Network Technology Beihang University Network and Information Security Laboratory Harbin University of Science and Technology
Traditional anomaly detection algorithm has improved to some degree the mechanism of negative selection. There still remain many problems such as the randomness of detector generation, incompleteness of selfset and th... 详细信息
来源: 评论
A design of the common platform of wireless communication based on FPGA
A design of the common platform of wireless communication ba...
收藏 引用
2017 IEEE Conference on Energy Internet and Energy System Integration, EI2 2017
作者: Qiao, Lei Zheng, Zhe Cui, Wenpeng Zhang, Weilong Jiang, Xueping Research Department of Smart Chip Global Energy Interconnection Research Institute Beijing China State Grid Key Laboratory of Information and Network Security State Grid Laboratory of Electric Power Communication Network Technology Beijing China
We present a design of the common platform of wireless communication based on FPGA. The platform, developed by us, allows researchers to modify transport protocols on any layer of an OSI reference model, from physical... 详细信息
来源: 评论
security on a knapsack-type encryption scheme based upon hybrid-model assumption
收藏 引用
International Journal of network security 2017年 第4期19卷 644-647页
作者: Jin, Zhengping Zhang, Hong Li, Zhongxian State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing100029 China National Cybernet Security Limited Tianjin300384 China
Provable security is a reduction that breaking the scheme is usually reduced to solving some basic hard problems, thus the foundation of the scheme's security is the assumption that it is hard to solve the based p... 详细信息
来源: 评论
Polarization attack on continuous-variable quantum key distribution
arXiv
收藏 引用
arXiv 2018年
作者: Zhao, Yijia Zhang, Yichen Huang, Yundi Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China
The shot-noise unit (SNU) is a crucial factor for the practical security of a continuous-variable quantum key distribution system. In the most widely used experimental scheme, the SNU should be calibrated first and ac... 详细信息
来源: 评论
Cubic medium field equation public key cryptosystem
收藏 引用
International Journal of network security 2018年 第3期20卷 472-477页
作者: Lu, Gang Xue, Linyuan Nie, Xuyun Qin, Zhiguang Liu, Bo School of Information and Software Engineering University of Electronic Science and Technology of China 4 Jianshe North Rd 2nd Section Chenghua Qu Chengdu610054 China State Key Laboratory of Information Security Institute of Information Engineering Beijing100093 China Network and Data Security Key Laboratory of Sichuan Province Chengdu610054 China
Medium Field Equation (MFE) multivariate public key cryptosystems were broken by High Order Linearization Equation (HOLE) attack. In order to avoid HOLE attack, we proposed an improvement of MFE, Cubic MFE public key ... 详细信息
来源: 评论
Angle-domain approach for parameter estimation in high-mobility OFDM with fully/partly calibrated massive ULA
arXiv
收藏 引用
arXiv 2018年
作者: Ge, Yinghao Zhang, Weile Gao, Feifei Minn, Hlaing MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi710049 China State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Automation Tsinghua University Beijing100084 China Department of Electrical Engineering University of Texas Dallas United States
In this paper, we consider a downlink orthogonal frequency division multiplexing (OFDM) system from a base station to a high-speed train (HST) equipped with fully/partly calibrated massive uniform linear antenna-array... 详细信息
来源: 评论
TPEFD: an SDN-based efficient elephant flow detection method
收藏 引用
网络与信息安全学报 2017年 第5期3卷 70-76页
作者: TIAN YU LIU Jing LAI Ying-xu BAO Zhen-shan ZHANG Wen-bo Faculty of Information Technology Beijing University of Technology Beijing 100124 China Key Laboratory of Trusted Computing Beijing 100124 China Information Security Rank Protection Key Technology National Engineering Laboratory Beijing 100124 China)
Software-defined networking(SDN) is a new approach to configure and operate programmable switches of the networks(especially the data center networks) through a centralized software controller. Elephant flows normally... 详细信息
来源: 评论
Large branching tree based dynamic provable data possession scheme
Large branching tree based dynamic provable data possession ...
收藏 引用
作者: Li, Yong Yao, Ge Lei, Li-Nan Wang, Hua-Qun Lin, Chang-Lu School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou350007 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing210023 China
As the era of big data is coming, more and more users choose to store data in the cloud. Cloud storage provides users with flexible, dynamic and cost effective data storage service. However, the new paradigm of servic... 详细信息
来源: 评论