咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3731-3740 订阅
排序:
A Naive Feature Selection Method and Its Application in Network Intrusion Detection
A Naive Feature Selection Method and Its Application in Netw...
收藏 引用
International Conference on Computational Intelligence and security
作者: Tieming Chen Xiaoming Pan Yiguang Xuan Jixia Ma Jie Jiang College of Computer Science & Technology Zhejiang University of Technology Hangzhou China State Key Laboratory of Software Development Environment Beihang University Beijing China Zhejiang Key Laboratory of Information Security Hangzhou China
Network intrusion detection system needs to handle huge data selected from network environments which usually contain lots of irrelevant or redundant features. It makes intrusion detection with high resource consumpti... 详细信息
来源: 评论
New resampling algorithm for generic particle filters
New resampling algorithm for generic particle filters
收藏 引用
作者: Fu, X. Jia, Y. Du, J. Yu, F. Beijing 100191 China Ministry of Education Beijing 100191 China Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper is devoted to the resampling problem of particle filters. We firstly demonstrate the performance of classical Resampling algorithm (also called as systematic resampling algorithm) using a novel metaphor, th... 详细信息
来源: 评论
LyDAR: A LYrics Density based Approach to non-homogeneous music Resizing
LyDAR: A LYrics Density based Approach to non-homogeneous mu...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Zhang Liu Chaokun Wang Lu Guo Yiyuan Bai Jianmin Wang School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory of Information System Security Ministry of Education China
In many scenarios, such as TV/radio advertising production, animation production, and presentation, music pieces are constrained in the metric of time. For example, an editor wants to use a 320s song to fit a 280s ani... 详细信息
来源: 评论
Dynamically Analyzing Time Constraints in Workflow Systems with Fixed-Date Constraint
Dynamically Analyzing Time Constraints in Workflow Systems w...
收藏 引用
International Asia-Pacific Web Conference (APWEB)
作者: Rui Han Yingbo Liu Lijie Wen Jianmin Wang School of Software Tsinghua University Beijing China Ministry of Education Key Laboratory of Information System Security China Tsinghua National Laboratory for Information Science and Technology China
In workflow management systems (WFMSs), time management plays an essential role in controlling the lifecycle of business processes. Especially, run-time analysis of time constraints is necessary to help process manage... 详细信息
来源: 评论
Application of Logical Petri Nets in Web service composition
Application of Logical Petri Nets in Web service composition
收藏 引用
International Conference on Mechatronics and Automation
作者: Zhu, ChangYan Du, YuYue College of Information Science and Engineering ShanDong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China Shandong University of Science and Techonology Qingdao 266510 China
In the process of Web service composition, there are several cases about working up an atomic Web service;as well as the outputs of Web service have many possibilities because of the different requirements from users.... 详细信息
来源: 评论
A Face-Based Shape Matching Method for IGES Surface Model
A Face-Based Shape Matching Method for IGES Surface Model
收藏 引用
International Conference on Shape Modeling and Applications
作者: Kai-Mo Hu Bin Wang Yi Gao Qi-Ming Yuan Jun-Hai Yong Key Laboratory of Information System Security Ministry of Education Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China
IGES is a widely used standard for mechanical data exchange. In this paper, we present a new method for the retrieval task of IGES surface model. Based on this method, a novel distinctive face selection strategy is pr... 详细信息
来源: 评论
Runtime Protecting System for Java Applications with Dynamic Data Flow Analyzing
Runtime Protecting System for Java Applications with Dynamic...
收藏 引用
The 2010 2nd International Conference on Future Computer and Communication(第二届未来计算机与通信国际会议 ICFCC 2010)
作者: Bo Feng Miao Zhang Guoai Xu Xinxin Niu Zhengming Hu Information Security Center State Key Laboratory of Networking and Switching Technology/ National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
With the rapidly development of the computer and internet technology, the security problem of software is more and more concerned. In this paper we present a runtime protecting system for java applications with dynami... 详细信息
来源: 评论
Research on systematic metrics of network survivability
Research on systematic metrics of network survivability
收藏 引用
International Conference on Information Science and engineering (ICISE)
作者: Liang Ming Dongxia Wang Lufeng Zhang Chunlei Wang Jian Tang Jinjing Zhao Nation Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineering Beijing China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarize... 详细信息
来源: 评论
A Framework for the Elicitation and Analysis of Information technology Service Requirements and Their Alignment with Enterprise Business Goals
A Framework for the Elicitation and Analysis of Information ...
收藏 引用
IEEE Annual Computer software and Applications Conference Workshops (COMPSACW)
作者: Didar Zowghi Zhi Jin School of Software Faculty of Engineering and IT Sydney University of Technology Sydney Australia Key Laboratory of High Confidence Software Technologies Peking University Beijing China
As the economies of the world have become increasingly dependant on Information technology (IT) services, there is a need for service designers and developers to focus on co-value creation between service providers an...
来源: 评论
On an attack on RSA with small CRT-exponents
收藏 引用
Science China(Information Sciences) 2010年 第8期53卷 1511-1518页
作者: HAN LiDong 1,2 , WANG XiaoYun 3 & XU GuangWu 3,4 1 key laboratory of Cryptologic technology and Information security, Ministry of Education, Shandong University, Jinan 250100, China 2 School of Mathematics, Shandong University, Jinan 250100, China 3 Institute for Advanced Study, Tsinghua University, beijing 100084, China 4 Department of Electrical engineering and Computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53201, USA 1. Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan 250100 China2. School of Mathematics Shandong University Jinan 250100 China3. Institute for Advanced Study Tsinghua University Beijing 100084 China4. Department of Electrical Engineering and Computer Science University of Wisconsin-Milwaukee Milwaukee WI 53201 USA
This paper concerns the RSA system with private CRT-exponents. Since Chinese remainder representation provides efficiency in computation, such system is of some practical significance. In this paper, an existing attac... 详细信息
来源: 评论