咨询与建议

限定检索结果

文献类型

  • 345 篇 会议
  • 339 篇 期刊文献

馆藏范围

  • 684 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 484 篇 工学
    • 339 篇 计算机科学与技术...
    • 278 篇 软件工程
    • 111 篇 信息与通信工程
    • 58 篇 电子科学与技术(可...
    • 53 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 生物工程
    • 44 篇 网络空间安全
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 化学工程与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 14 篇 建筑学
    • 14 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 216 篇 理学
    • 96 篇 数学
    • 56 篇 物理学
    • 52 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 17 篇 化学
  • 109 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 20 篇 法学
    • 12 篇 法学
  • 14 篇 医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 13 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 computer securit...
  • 10 篇 feature extracti...
  • 9 篇 data privacy
  • 9 篇 computational mo...
  • 8 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 24 篇 key laboratory o...
  • 21 篇 beijing key labo...
  • 21 篇 school of cyber ...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 19 篇 institute of inf...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 9 篇 shandong provinc...
  • 8 篇 henan key labora...
  • 8 篇 university of ch...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 17 篇 duan lijuan
  • 16 篇 xin yang
  • 10 篇 zhang yuqing
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 wang changwei
  • 9 篇 xu shibiao
  • 9 篇 zhang ru
  • 9 篇 xu rongtao
  • 8 篇 wang wei
  • 8 篇 weng jian
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 guo li
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 guoai xu

语言

  • 628 篇 英文
  • 37 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
684 条 记 录,以下是441-450 订阅
排序:
Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction
arXiv
收藏 引用
arXiv 2017年
作者: Zhao, Yijia Zhang, Yichen Xu, Bingjie Yu, Song Guo, Hong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Advanced Optical Communication System and Network School of Electronics Engineering and Computer Science Center for Quantum Information Technology Peking University Beijing100871 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified. In continuous-variable measurement-device-independent quantu... 详细信息
来源: 评论
Research on trusted bootstrap based on the universal smart card  7th
Research on trusted bootstrap based on the universal smart c...
收藏 引用
7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Yan, Lin Zhang, Jianbiao College of Computer Science Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
The trusted boot is a hot spot in trusted computing field. User’s identity authentication and trusted measurement are used to deal with security threats. But it is difficult to implement the general trusted boot base... 详细信息
来源: 评论
RbacIP: A RBAC-based method for intercepting and processing malicious applications in android platform  7th
RbacIP: A RBAC-based method for intercepting and processing ...
收藏 引用
7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Lin, Li Ni, Jian Hu, Jian Zhang, Jianbiao College of Computer Science Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
With the rapid development of Android-based smart phones and pads, android applications show explosive growth. Because third-party application market regulation is lax, many normal applications are embedded malicious ... 详细信息
来源: 评论
A novel RNN-GBRBM based feature decoder for anomaly detection technology in industrial control network
A novel RNN-GBRBM based feature decoder for anomaly detectio...
收藏 引用
作者: Zhang, Hua Zhu, Shixiang Ma, Xiao Zhao, Jun Shou, Zeng State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications 100876 China Data Network of Power Dispatch Safety Protection of Electric Power Supervisory Control System State Gird Jiangsu Electric Power Company Shanghai Road No 215 Nanjing Jiangsu210024 China Safety Protection of Electric Power Supervisory Control System NARI Group Corporation No. 19 Chengxin Rd Jiangning Nanjing Jiangsu211000 China Dispatching Data Network and Secondary Safty Protection Electric Power Science Research Institute State Gird Jiangsu Electric Power Company Jiangning Paweier Road No 1 Nanjing Jiangsu211103 China
As advances in networking technology help to connect industrial control networks with the Internet, the threat from spammers, attackers and criminal enterprises has also grown accordingly. However, traditional network... 详细信息
来源: 评论
QoE Assessment and Prediction Method for HighDefinition Video Stream Using Image Damage Accumulation
收藏 引用
China Communications 2016年 第7期13卷 48-59页
作者: Yang Geng Luoming Meng Yao Wang Yu Yang Zhiguo Qu State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Global Energy Interconnection Research Institute Nanjing 210003China Information Security Center Beijing University of Posts and TelecommunicationsBeijing 100876China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China
The accuracy of the traditional assessment method of the quality of experience(Qo E) has been facing challenges with the growth of high-definition(HD) video streaming *** display-quality damage is the main factor that... 详细信息
来源: 评论
A Performance Evaluation of Classification Algorithms for Big Data
收藏 引用
Procedia Computer Science 2017年 122卷 1100-1107页
作者: Mo Hai You Zhang Yuejin Zhang School of Information Central University of Finance and Economics Beijing China Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Chengdu China School of Information Systems &Management Heinz College Carnegie Mellon University Pittsburgh PA 1521 USA
The performance of two typical classification algorithms in Spark: random forest and naïve bayes are evaluated by using four metrics: classification accuracy, speedup, scaleup and sizeup. Experiments are performe... 详细信息
来源: 评论
An application-oriented efficient encapsulation system for trusted software development  7th
An application-oriented efficient encapsulation system for t...
收藏 引用
7th International Conference on the Theory, Technologies and Applications of Trusted Systems, INTRUST 2015
作者: Tao, Zheng Hu, Jun Zhan, Jing Li, Mo Chen, Chunzi College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
Trusted computing provides an efficient and practical way out for system security problems based on a trusted hardware, namely the root of trust, e.g., Trusted Platform Module (TPM), Trusted Cryptographic Module (TCM)... 详细信息
来源: 评论
Angle-domain doppler pre-compensation for high-mobility OFDM uplink with a massive ULA
arXiv
收藏 引用
arXiv 2017年
作者: Guo, Wei Zhang, Weile Mu, Pengcheng Gao, Feifei Yao, Bobin MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Electronic and Control Engineering Chang'an University Xi'an China
In this paper, we propose a Doppler pre-compensation scheme for high-mobility orthogonal frequency division multiplexing (OFDM) uplink, where a high-speed terminal transmits signals to the base station (BS). Consideri... 详细信息
来源: 评论
Exploiting Meta-Path with Attention Mechanism for Fine-Grained User Location Prediction in LBSNs
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1284卷
作者: Zhixiao Wang Wenyao Yan Wendong Wang Ang Gao Lei Yu Shaobo Yang GaoYang Nie School of Computer Science and Engineering Xi'an University of Technology 710048 Xi'an China Telematics Group the University of Goettingen 37077 Goettingen Germany Shaanxi Key Laboratory of Network Computing and Security 710048 Xi'an China School of Electronic and Information Engineering Xi'an Jiaotong University 710048 Xi'an China College of Xi'an Innovation Yan'an University 710100 Xi'an China Yan'an University Yan'an 716000 China National Satellite Meteorological Center China Meteorological Administration Beijing 100081 China
Based on the huge volumes of user check-in data in LBSNs, users' intrinsic mobility patterns can be well explored, which is fundamental for predicting where a user will visit next given his/her historical check-in...
来源: 评论
A novel quantum image compression method based on JPEG
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Jian Jiang, Nan Zhao, Na School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Department of Computer Science Purdue University West Lafayette47907 United States Department of Chemistry Purdue University West Lafayette47907 United States College of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
Quantum image processing has been a hot topic. The first step of it is to store an image into qubits, which is called quantum image preparation. Different quantum image representations may have different preparation m... 详细信息
来源: 评论