咨询与建议

限定检索结果

文献类型

  • 2,088 篇 期刊文献
  • 2,005 篇 会议
  • 10 册 图书

馆藏范围

  • 4,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,968 篇 工学
    • 1,752 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 513 篇 信息与通信工程
    • 318 篇 土木工程
    • 292 篇 控制科学与工程
    • 272 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 231 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 218 篇 生物工程
    • 214 篇 建筑学
    • 213 篇 化学工程与技术
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 126 篇 网络空间安全
    • 124 篇 安全科学与工程
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 103 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,443 篇 理学
    • 753 篇 数学
    • 404 篇 物理学
    • 241 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 616 篇 管理学
    • 407 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 59 篇 security
  • 58 篇 deep learning
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 39 篇 machine learning
  • 37 篇 optimization
  • 37 篇 accuracy
  • 35 篇 blockchain
  • 34 篇 robustness

机构

  • 226 篇 state key labora...
  • 162 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 29 篇 xiuli du
  • 24 篇 limin sun
  • 23 篇 wang wei
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 zhang lei
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 tan yang
  • 17 篇 jia yingmin

语言

  • 3,701 篇 英文
  • 209 篇 中文
  • 191 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4103 条 记 录,以下是3771-3780 订阅
排序:
Analysis of Two Robust Learning Control Schemes in the Presence of Random Iteration-Varying Noise
Analysis of Two Robust Learning Control Schemes in the Prese...
收藏 引用
American Control Conference
作者: Deyuan Meng Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper deals with the design problem of robust iterative learning control (ILC), in the presence of noise that is varying randomly from iteration to iteration. Two ILC schemes are considered: one adopts the previo... 详细信息
来源: 评论
A New Resampling Algorithm for Generic Particle Filters
A New Resampling Algorithm for Generic Particle Filters
收藏 引用
American Control Conference
作者: X. Fu Y. Jia J. Du F. Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper is devoted to the resampling problem of particle filters. We firstly demonstrate the performance of classical Resampling algorithm (also called as systematic resampling algorithm) using a novel metaphor, th... 详细信息
来源: 评论
Non-Fragile Control for Trajectory Tracking of Nonholonomic Mobile Robots
Non-Fragile Control for Trajectory Tracking of Nonholonomic ...
收藏 引用
American Control Conference
作者: Na Ni Yingmin Jia Junping Du Fashan Yu Seventh Research Division and the Department of Systems and Control Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper is devoted to the non-fragile controller design for the trajectory tracking of nonholonomic mobile robots. Using non-linear state feedback and proper coordinate transformation, the model of nonholonomic mob... 详细信息
来源: 评论
On Achieving Maximum Secure Throughput Using Network Coding Against Wiretap Attack
On Achieving Maximum Secure Throughput Using Network Coding ...
收藏 引用
IEEE International Conference on Distributed Computing Systems
作者: Xiangmao Chang Jin Wang Jianping Wang Victor Lee Kejie Lu Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Department of Computer Science University of Science and Technology of China Department of Computer Science City University of Hong Kong Department of Electrical and Computer Engineering University of Puerto Rico at Mayaguez
In recent years network coding has attracted significant attention in telecommunication. The benefits of network coding to a communication network include the increased throughput as well as secure data transmission. ... 详细信息
来源: 评论
Study on static and dynamic stress-strain relationship of cement mortar material
收藏 引用
Tumu Gongcheng Xuebao/China Civil engineering Journal 2010年 第SUPPL. 2期43卷 119-126页
作者: Du, Xiuli Wang, Yang Lu, Dechun Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing 100124 China China Three Gorges New Energy Corporation Beijing 100051 China
This paper uses stress-strain relationship of concrete proposed by European Code (CEB-FIP1990) and GB 50010-2002 Code for Design of Concrete Structures to describe the static deformation characteristic of cement morta... 详细信息
来源: 评论
Practical Identity-Based Signature Without Random Oracle
Practical Identity-Based Signature Without Random Oracle
收藏 引用
2010 IEEE International Conference on Information Theory and Information security(2010 IEEE 国际信息论与信息安全会议)
作者: Lifeng Guo Yong Li Lei Hu Yinfang Guo School of Computer and Information Technology Shanxi UniversityTaiyuan Shanxi China School of Ele School of Electronics and Information Engineering Beijing Jiaotong University Beijing China State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesBeij Education Institute of Taiyuan University Taiyuan China
To date, most of the constructions of provably secure identity based signature (IBS) scheme are based on the approach of attaching certificates to non-identity based signatures in the random oracle. In ACISP'06, P... 详细信息
来源: 评论
Quantum State Reduction for Universal Measurement Based Computation
收藏 引用
Physical Review Letters 2010年 第2期105卷 020502-020502页
作者: Xie Chen Runyao Duan Zhengfeng Ji Bei Zeng Department of Physics Massachusetts Institute of Technology Cambridge Massachusetts USA Centre for Quantum Computation and Intelligent Systems (QCIS) Faculty of Engineering and Information Technology University of Technology Sydney NSW Australia Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Perimeter Institute for Theoretical Physics Waterloo Ontario Canada State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Institute for Quantum Computing University of Waterloo Waterloo Ontario Canada Department of Combinatorics and Optimization University of Waterloo Waterloo Ontario Canada
Measurement based quantum computation, which requires only single particle measurements on a universal resource state to achieve the full power of quantum computing, has been recognized as one of the most promising mo... 详细信息
来源: 评论
Improved meet-in-the-middle attacks on 7-round AES-192 and 8-round AES-256
收藏 引用
Tongxin Xuebao/Journal on Communications 2010年 第9 A期31卷 197-201页
作者: Dong, Xiao-Li Hu, Yu-Pu Chen, Jie Li, Shun-Bo Yang, Yang Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100049 China School of Science Xi'an University of Architecture and Technology Xi'an 710055 China
A new variant of 5-round distinguisher of meet-in-the-middle attack on AES was constructed by exploiting the properties of the round transform of AES. Based on the variant of distinguisher, meet-in-the-middle attacks ... 详细信息
来源: 评论
Studies and implementation of the trusted process mechanism in a secure operating system
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2010年 第SUPPL. 1期50卷 1547-1553页
作者: Zhang, Chongbin Li, Fengjuan Liang, Bin China Information Technology Security Evaluation Center Beijing 100085 China Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education School of Information Renming University of China Beijing 100872 China
The trusted process mechanism is an important part of the operating system security mechanism, but there is no uniform definition of the trusted process and there are some limitations in understanding its fundamental ... 详细信息
来源: 评论
ABAR: Automatic bug analyzer based on source code
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2010年 第SUPPL. 1期50卷 1597-1602页
作者: Liang, Hongliang Chen, Zheng Zhang, Puhan School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100190 China Beijing Antaishikong Technology Company Beijing 100070 China China Information Technology Security Evaluation Center Beijing 100085 China
Static analyses of software bugs are more developed than software tests or manual reviews. This paper describes the design and implementation of ABAR (automatic bug analyzer) for source code inspection using the state... 详细信息
来源: 评论