咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是51-60 订阅
排序:
Memory access integrity:detecting fine-grained memory access errors in binary code
收藏 引用
Cybersecurity 2019年 第1期2卷 286-303页
作者: Wenjie Li Dongpeng Xu WeiWu Xiaorui Gong Xiaobo Xiang Yan Wang Fangming gu Qianxiang Zeng School of Cyber Security University of Chinese Academy of SciencesBeijingChina University of New Hampshire BeijingChina Key Laboratory of Network Assessment Technology CASBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Institute of Information Engineering Chinese Academy of SciencesBeijingChina
As one of the most notorious programming errors,memory access errors still hurt modern software ***,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.Plenty of work hav... 详细信息
来源: 评论
Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow
收藏 引用
Chinese Journal of Electronics 2017年 第3期26卷 640-646页
作者: ZHAO Qianqian ZHANG Yuqing ZHANG Guanghua WANG He State Key Laboratory of Integrated Services Networks Xidian University National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access *** neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key distribu... 详细信息
来源: 评论
Fairness-Guaranteed Joint Access Control, 3-D UAV Trajectory Planning, and Task Scheduling in AGINs
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Du, Jianbo Yan, Haobo Sun, Aijing Wang, Chong Gao, Yuan Liu, Zhiquan Chu, Xiaoli Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security School of Communications and Information Engineering Xi'an 710121 China Chinese Academy of Sciences Key Laboratory of Space Utilization Beijing 100094 China Chinese Academy of Sciences Technology and Engineering Center for Space Utilization Beijing 100094 China Shanghai University School of Communication and Information Engineering Shanghai China Jinan University College of Cyber Security Guangzhou 510632 China The University of Sheffield Department of Electronic and Electrical Engineering Sheffield S1 3JD United Kingdom
The integration of Multi-access Edge Computing (MEC) with Air-Ground Integrated networks (AGINs) enhances communication coverage and computational capabilities, especially for supporting critical tasks such as emergen... 详细信息
来源: 评论
Deeply Understanding Graph-Based Sybil Detection Techniques via Empirical Analysis on Graph Processing
收藏 引用
China Communications 2020年 第10期17卷 82-96页
作者: Jian Mao Xiang Li Qixiao Lin Zhenyu Guan Laboratory of Aerospace Network Security Ministry of Industry and Information TechnologySchool of Cyber Science and TechnologyBeihang UniversityBeijing 100191China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai 200240China Key Laboratory of Aerospace Network Security Ministry of Industry and Information TechnologyBeihang UniversityBeijing 100191China
Sybil attacks are one of the most prominent security problems of trust mechanisms in a distributed network with a large number of highly dynamic and heterogeneous devices,which expose serious threat to edge computing ... 详细信息
来源: 评论
Packet: a privacy-aware access control policy composition method for services composition in cloud environments
收藏 引用
Frontiers of Computer Science 2016年 第6期10卷 1142-1157页
作者: Li LIN Jian HU Jianbiao ZHANG College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China National Engineering Laboratory for Classified Information Security Protection Beijing 100124 China
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p... 详细信息
来源: 评论
From proof-of-concept to exploitable
收藏 引用
Cybersecurity 2019年 第1期2卷 189-213页
作者: Yan Wang WeiWu Chao Zhang Xinyu Xing Xiaorui Gong Wei Zou School of Cyber Security University of Chinese Academy of SciencesBeijingChina Institute for Network Sciences and Cyberspace Tsinghua UniversityBeijingChina College of Information Sciences and Technology Pennsylvania State UniversityUniversity ParkUnited States Institute of Information Engineering Chinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology CASBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina
Exploitability assessment of vulnerabilities is important for both defenders and *** ultimate way to assess the exploitability is crafting a working ***,it usually takes tremendous hours and significant manual *** add... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Cloud Platform Based Automated security Testing System for Mobile Internet
收藏 引用
Tsinghua Science and technology 2015年 第6期20卷 537-544页
作者: Dan Tao Zhaowen Lin Cheng Lu the School of Electronic and Information Engineering Beijing Jiaotong University Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Network and Information Center Institute of Network TechnologyScience and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryNational Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and Telecommunications
With respect to security, the use of various terminals in the mobile Internet environment is *** terminal testing methods cannot simulate actual testing environments; thus, the test results do not accurately reflect t... 详细信息
来源: 评论
Focus on Local: Finding Reliable Discriminative Regions for Visual Place Recognition
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Changwei Chen, Shunpeng Song, Yukun Xu, Rongtao Zhang, Zherui Zhang, Jiguang Yang, Haoran Zhang, Yu Fu, Kexue Du, Shide Xu, Zhiwei Gao, Longxiang Guo, Li Xu, Shibiao Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences China School of Artificial Intelligence Beijing University of Posts and Telecommunications China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science China MAIS Institute of Automation Chinese Academy of Sciences China Tongji University China College of Computer and Data Science Fuzhou University China Shandong University China
Visual Place Recognition (VPR) is aimed at predicting the location of a query image by referencing a database of geotagged images. For VPR task, often fewer discriminative local regions in an image produce important e... 详细信息
来源: 评论
Quantum broadcast communication with authentication
收藏 引用
Chinese Physics B 2010年 第7期19卷 63-67页
作者: 杨宇光 王叶红 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wan... 详细信息
来源: 评论