咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,979 篇 会议
  • 10 册 图书

馆藏范围

  • 4,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,924 篇 工学
    • 1,733 篇 计算机科学与技术...
    • 1,438 篇 软件工程
    • 502 篇 信息与通信工程
    • 309 篇 土木工程
    • 282 篇 控制科学与工程
    • 267 篇 电气工程
    • 230 篇 电子科学与技术(可...
    • 228 篇 材料科学与工程(可...
    • 217 篇 机械工程
    • 217 篇 生物工程
    • 213 篇 化学工程与技术
    • 205 篇 建筑学
    • 149 篇 交通运输工程
    • 130 篇 动力工程及工程热...
    • 124 篇 安全科学与工程
    • 121 篇 网络空间安全
    • 119 篇 力学(可授工学、理...
    • 110 篇 光学工程
    • 104 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,428 篇 理学
    • 750 篇 数学
    • 399 篇 物理学
    • 239 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 120 篇 地球物理学
  • 609 篇 管理学
    • 404 篇 管理科学与工程(可...
    • 229 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 108 篇 法学
  • 76 篇 医学
  • 41 篇 军事学
  • 38 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 71 篇 cryptography
  • 65 篇 authentication
  • 65 篇 feature extracti...
  • 61 篇 training
  • 57 篇 security
  • 56 篇 deep learning
  • 54 篇 privacy
  • 52 篇 laboratories
  • 48 篇 information secu...
  • 47 篇 computational mo...
  • 47 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 38 篇 machine learning
  • 36 篇 optimization
  • 36 篇 blockchain
  • 35 篇 accuracy
  • 32 篇 computer science

机构

  • 226 篇 state key labora...
  • 154 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 106 篇 university of ch...
  • 91 篇 institute of inf...
  • 89 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 state key labora...
  • 77 篇 department of co...
  • 76 篇 information secu...
  • 75 篇 school of softwa...
  • 70 篇 school of comput...
  • 64 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 54 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 37 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 32 篇 cao xiaochun
  • 32 篇 yingmin jia
  • 30 篇 xiuli du
  • 25 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,713 篇 英文
  • 206 篇 中文
  • 119 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4036 条 记 录,以下是1-10 订阅
E-PRedictor: an approach for early prediction of pull request acceptance
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 380-395页
作者: Kexing CHEN Lingfeng BAO Xing HU Xin XIA Xiaohu YANG State Key Laboratory of Blockchain and Data Security Zhejiang University Software Engineering Application Technology Lab
A pull request(PR) is an event in Git where a contributor asks project maintainers to review code he/she wants to merge into a project. The PR mechanism greatly improves the efficiency of distributed software developm... 详细信息
来源: 评论
An Enhanced Clustering-Based (k, t)-Anonymity Algorithm for Graphs
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 365-372页
作者: Yuanyuan Wang Xing Zhang Zhiguang Chu Wei Shi Xiang Li School of Electronics and Information Engineering Liaoning University of Technology Key Laboratory of Security for Network and Data in Industrial Internet of Liaoning Province Faculty of Information Technology Beijing University of Technology
As people become increasingly reliant on the Internet, securely storing and publishing private data has become an important issue. In real life, the release of graph data can lead to privacy breaches, which is a highl... 详细信息
来源: 评论
SMP-NoC: A Flexible and Efficient Shared Memory Protection Unit on Network-on-Chip  24th
SMP-NoC: A Flexible and Efficient Shared Memory Protection ...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Teng He, Ying Wei, Shengjun Hu, Changzhen School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology Beijing China
Network-on-Chip (NoC) is crucial for modern multicore systems, offering high throughput and low latency. However, its shared memory faces threats like illegal access and DDoS attacks. To enhance security, Memory Prote... 详细信息
来源: 评论
ICCG:low-cost and efficient consistency with adaptive synchronization for metadata replication
收藏 引用
Frontiers of Computer Science 2025年 第1期19卷 53-70页
作者: Chenhao ZHANG Liang WANG Jing SHANG Zhiwen XIAO Limin XIAO Meng HAN Bing WEI Runnan SHEN Jinquan WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China School of Cyberspace Security Hainan UniversityHaikou 570228China China Mobile Information Technology Center Beijing 100033China
The rapid growth in the storage scale of wide-area distributed file systems (DFS) calls for fast and scalable metadata management. Metadata replication is the widely used technique for improving the performance and sc... 详细信息
来源: 评论
Minimizing CNOT-count in quantum circuit of the extended Shor’s algorithm for ECDLP
收藏 引用
Cybersecurity 2025年 第1期8卷 153-179页
作者: Xia Liu Huan Yang Li Yang State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Beijing Youzhuju Network Technology Co. Ltd.BeijingChina
The elliptic curve discrete logarithm problem(ECDLP)is a popular choice for cryptosystems due to its high level of ***,with the advent of the extended Shor’s algorithm,there is concern that ECDLP may soon be *** the ... 详细信息
来源: 评论
Deep learning-based software engineering: progress,challenges, and opportunities
收藏 引用
Science China(Information Sciences) 2025年 第1期68卷 57-144页
作者: Xiangping CHEN Xing HU Yuan HUANG He JIANG Weixing JI Yanjie JIANG Yanyan JIANG Bo LIU Hui LIU Xiaochen LI Xiaoli LIAN Guozhu MENG Xin PENG Hailong SUN Lin SHI Bo WANG Chong WANG Jiayi WANG Tiantian WANG Jifeng XUAN Xin XIA Yibiao YANG Yixin YANG Li ZHANG Yuming ZHOU Lu ZHANG School of Journalism and Communication Sun Yat-sen University School of Software Technology Zhejiang University School of Software Engineering Sun Yat-sen University School of Software Dalian University of Technology School of Computer Science and Technology Beijing Institute of Technology Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of EducationSchool of Computer Science Peking University State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering Beihang University Institute of Information Engineering Chinese Academy of Sciences School of Computer Science Fudan University State Key Laboratory of Complex & Critical Software Environment (CCSE) School of Software Beihang University School of Computer and Information Technology Beijing Jiaotong University School of Computer Science and Technology Harbin Institute of Technology School of Computer Science Wuhan University Huawei Technologies
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r... 详细信息
来源: 评论
An efficient conversion model between acceleration and pseudo-acceleration response spectra considering effects of magnitude,distance,and site class
收藏 引用
Earthquake engineering and engineering Vibration 2025年 第1期24卷 15-30页
作者: Liu Zheng Zhao Yan-Gang Zhang Haizhong Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of TechnologyBeijing 100124China Faculty of Agriculture Yamagata University1-23Wakaba-machiTsuruoka-shiYamagata 997-8555Japan
Both acceleration and pseudo-acceleration response spectra play important roles in structural seismic ***,only one of them is generally provided in most seismic ***,many studies have attempted to develop conversion mo... 详细信息
来源: 评论
Design of a 9-DOF Radiation Resistant Robot for Nuclear Reactors’ Decommissioning  2nd
Design of a 9-DOF Radiation Resistant Robot for Nuclear Reac...
收藏 引用
2nd International Conference on the Frontiers of Robotics and software engineering, FRSE 2024
作者: Wu, Tong Wang, Deying Yang, Haiyan Chen, Xu Zhang, Liang Mi, Zhifeng Beijing100048 China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing China
Due to the expiration of the design service life of some nuclear facilities, a large number of hazardous radioactive devices need to be dismantled. Therefore, special attention needs to be paid to the safety and relia... 详细信息
来源: 评论
Robot Path Optimization Method for Nuclear Reactor Decommissioning  2nd
Robot Path Optimization Method for Nuclear Reactor Decommiss...
收藏 引用
2nd International Conference on the Frontiers of Robotics and software engineering, FRSE 2024
作者: Wu, Tong Wang, Deying Chen, Fengjuan Lv, Kefu Wang, Jin Lu, Fan Mi, Zhifeng Beijing100048 China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing China
Addressing the issues of complex demolition environments in nuclear facility decommissioning projects, the difficulty of achieving multi-axis linkage for robotic arms, and low work efficiency, an optimization method t... 详细信息
来源: 评论
A Comprehensive Review on Deep Learning System Testing  24th
A Comprehensive Review on Deep Learning System Testing
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Ying Shan, Chun Liu, Zhen Liao, Shuyan Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Computer School Beijing Information Science and Technology University Beijing China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China
Deep learning(DL) systems exhibit multiple behavioral characteristics such as correctness, robustness, and fairness. Ensuring that these behavioral characteristics function properly is crucial for maintaining the accu... 详细信息
来源: 评论