咨询与建议

限定检索结果

文献类型

  • 339 篇 会议
  • 337 篇 期刊文献

馆藏范围

  • 676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 479 篇 工学
    • 335 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 112 篇 信息与通信工程
    • 58 篇 电气工程
    • 58 篇 电子科学与技术(可...
    • 50 篇 控制科学与工程
    • 46 篇 网络空间安全
    • 45 篇 生物工程
    • 19 篇 仪器科学与技术
    • 19 篇 安全科学与工程
    • 18 篇 光学工程
    • 17 篇 机械工程
    • 17 篇 土木工程
    • 16 篇 材料科学与工程(可...
    • 16 篇 生物医学工程(可授...
    • 15 篇 动力工程及工程热...
    • 15 篇 建筑学
    • 15 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 13 篇 环境科学与工程(可...
  • 211 篇 理学
    • 94 篇 数学
    • 56 篇 物理学
    • 51 篇 生物学
    • 27 篇 系统科学
    • 20 篇 统计学(可授理学、...
    • 16 篇 化学
  • 107 篇 管理学
    • 66 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 19 篇 法学
  • 16 篇 医学
    • 13 篇 临床医学
  • 10 篇 军事学
  • 7 篇 经济学
  • 7 篇 农学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 28 篇 authentication
  • 23 篇 cryptography
  • 20 篇 protocols
  • 19 篇 information secu...
  • 18 篇 deep learning
  • 16 篇 privacy
  • 14 篇 security
  • 13 篇 access control
  • 13 篇 laboratories
  • 12 篇 federated learni...
  • 12 篇 cloud computing
  • 11 篇 intrusion detect...
  • 11 篇 network security
  • 10 篇 internet of thin...
  • 10 篇 data privacy
  • 10 篇 computer securit...
  • 10 篇 computational mo...
  • 10 篇 feature extracti...
  • 9 篇 servers
  • 8 篇 internet

机构

  • 59 篇 information secu...
  • 35 篇 key laboratory o...
  • 28 篇 state key labora...
  • 21 篇 beijing key labo...
  • 20 篇 faculty of infor...
  • 20 篇 national enginee...
  • 20 篇 school of cyber ...
  • 19 篇 institute of inf...
  • 19 篇 key laboratory o...
  • 18 篇 state key labora...
  • 14 篇 shandong provinc...
  • 12 篇 national enginee...
  • 11 篇 college of compu...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 10 篇 information secu...
  • 9 篇 college of compu...
  • 8 篇 henan key labora...
  • 7 篇 key laboratory o...
  • 7 篇 state key labora...

作者

  • 31 篇 yixian yang
  • 28 篇 yang yixian
  • 16 篇 xin yang
  • 16 篇 duan lijuan
  • 10 篇 zhang yuqing
  • 10 篇 wang wei
  • 10 篇 niu xinxin
  • 10 篇 yang yi-xian
  • 9 篇 zhang ru
  • 8 篇 lijuan duan
  • 8 篇 kangfeng zheng
  • 8 篇 xinxin niu
  • 7 篇 zhou yajian
  • 7 篇 shen yulong
  • 7 篇 weng jian
  • 7 篇 wei huo
  • 7 篇 wang changwei
  • 7 篇 xu shibiao
  • 7 篇 guoai xu
  • 7 篇 xu rongtao

语言

  • 633 篇 英文
  • 25 篇 其他
  • 18 篇 中文
检索条件"机构=Beijing Key Laboratory of Network Security and Protection Technology"
676 条 记 录,以下是81-90 订阅
排序:
A federated sleep staging method based on adaptive re-aggregation and double prototype-contrastive using single-channel electroencephalogram
收藏 引用
Engineering Applications of Artificial Intelligence 2025年 156卷
作者: Bian Ma Lijuan Duan Zhaoyang Huang Yuanhua Qiao College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing 100053 China Beijing Key Laboratory of Neuromodulation Beijing 100053 China School of Mathematics Statistics and Mechanics Beijing University of Technology Beijing 100124 China
The limited availability of sleep data collected by individual institutions poses a significant challenge in developing automatic sleep staging models, especially given that most existing models rely heavily on data-d... 详细信息
来源: 评论
A Fair and Efficient Protocol for the Millionaires' Problem
收藏 引用
电子学报(英文版) 2009年 第2期18卷 249-254页
作者: LI Ronghua WU Chuankun ZHANG Yuqing Graduate University of Chinese Academy of Sciences ( GUCAS) Beijing 100039 China National Computer Network Intrusion Protection Center GUCAS Beijing 100039 China State Key Laboratory of Information Security Institute of Software Beijing 100039 China
In the semi-honest model, Lin and Tzeng proposed an efficient solution to the millionaires' problem based on homomorphic encryption. They reduced the problem to the set intersection problem by encoding the private... 详细信息
来源: 评论
A New Triage Process Model for Digital Investigations
A New Triage Process Model for Digital Investigations
收藏 引用
2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Bo Yang Ning Li Jianguo Jiang Institute of Information Engineering Chinese Academy of Sciences Beijing Key Laboratory of Network Security Technology
As the amount of crimes involving the digital dimension grows,an ever increasing number of digital artifacts collected from a forensic investigation needs plenty of resources to process in a forensically sound *** for... 详细信息
来源: 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology,beijing University of technology,beijing 100124,China 2 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,China 3 State key laboratory of Information security (Graduate University of Chinese Academy of Sciences),beijing 100049,China 4 State key laboratory of networking and Switching technology,beijing University of Posts and Tele-communications,beijing 100876,China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 评论
Quantum threshold group signature
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology, beijing University of technology, beijing 100124, China 2 State key laboratory of Integrated Services network, Xidian University, Xi’an 710071, China 3 State key laboratory of Information security (Graduate University of Chinese Academy of Sciences), beijing 100049, China 4 State key laboratory of networking and Switching technology, beijing University of Posts and Tele-communications, beijing 100876, China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China State Key Laboratory of Integrated Services Network Xidian University Xi’an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 评论
Efficient quantum state transmission via perfect quantum network coding
收藏 引用
Science China(Information Sciences) 2019年 第1期62卷 191-204页
作者: Zhen-Zhen LI Gang XU Xiu-Bo CHEN Zhiguo QU Xin-Xin NIU Yi-Xian YANG Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology
Quantum network coding with the assistance of auxiliary resources can achieve perfect transmission of the quantum state. This paper suggests a novel perfect network coding scheme to efficiently solve the quantum k-pai... 详细信息
来源: 评论
A Digital Interface-based Digital Rights Management Scheme for Digital Cinema
收藏 引用
电子学报(英文版) 2010年 第3期19卷 481-485页
作者: FAN Kefeng MA Zhaofeng YANG Yixiani NIU Xinxin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China
Digital rights management (DRM) is indispensable to prevent various kinds of illegal content usage. In this paper, we present a Digital interface-based DRM scheme (DI-DRM) for digital cinema, which can provide a new m... 详细信息
来源: 评论
An attack graph based network security evaluation model for hierarchical network
An attack graph based network security evaluation model for ...
收藏 引用
2010 IEEE International Conference on Information Theory and Information security, ICITIS 2010
作者: Ge, Haihui Gu, Lize Yang, Yixian Liu, Kewei Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China Laboratory of network security Information Technology Security Evaluation Center Beijing China
To evaluate the security situation of hierarchical network, a novel evaluation algorithm based on the method of constructing a security risk function is proposed. The proposed algorithm is the aggregation of qualitati... 详细信息
来源: 评论
Constructing benchmarks for supporting explainable evaluations of static application security testing tools  13
Constructing benchmarks for supporting explainable evaluatio...
收藏 引用
13th International Symposium on Theoretical Aspects of Software Engineering, TASE 2019
作者: Hao, Gaojian Li, Feng Huo, Wei Sun, Qing Wang, Wei Li, Xinhua Zou, Wei Institute of Information Engineering Chinese Academy of Sciences China Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology China School of Cyber Security University of Chinese Academy of Sciences China
When evaluating Static Application security Testing (SAST) tools, benchmarks based on real-world softwares are considered more representative than synthetic micro benchmarks. Generated from real-world software, the te... 详细信息
来源: 评论
Performance analysis of sign quantized projection
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2010年 第1期17卷 62-66页
作者: YE Tian-yu NIU Xin-xin MA Zhao-feng YANG Yi-xian Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
Quantized projection technology (QP) is the version of quantization index modulation (QIM) working in the projection domain. It essentially belongs to a double-sided additive embedder. In this article, the concept... 详细信息
来源: 评论