咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3871-3880 订阅
排序:
Solid texture synthesis using Position Histogram Matching
Solid texture synthesis using Position Histogram Matching
收藏 引用
IEEE International Conference on Computer-Aided Design and Computer Graphics
作者: Jiating Chen Bin Wang Department of Computer Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Information System Security Beijing China School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China
In the past, several approaches have been proposed to produce high quality solid textures. Unfortunately, they often suffer from several synthesis artifacts, such as color blurry, bad texture structures, introducing a... 详细信息
来源: 评论
DYNAMIC DATA FLOW GRAPH-BASED software WATERMARKING
DYNAMIC DATA FLOW GRAPH-BASED SOFTWARE WATERMARKING
收藏 引用
2009 IEEE International Conference on Network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Xinxin Niu Zhengming Hu Bo Feng Miao Zhang Guoai Xu Information Security Center State Key Laboratory of Networking and Switching Technology Beijing Un Key Laboratory of network and information attack & defense technology of MOE Beijing University of National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Te
In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds wat... 详细信息
来源: 评论
An efficient fair off-line E-cash system based on a fully hierarchical proxy blind signature
收藏 引用
Journal of Information and Computational Science 2009年 第1期6卷 407-414页
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China State Key Laboratory of Information Security Institute of Software CAS Beijing 100190 China Jiangxi Research Center of E-Commerce Engineering and Technology Nanchang 330013 China
We design a fully hierarchical proxy blind signature scheme. Then we propose an efficient fair off-line electronic cash system based on the fully hierarchical proxy blind signature scheme with provable security. Our e... 详细信息
来源: 评论
Synthesis of 3D Aging Faces Based on Color Gabor Wavelet and Texture Transplant
Synthesis of 3D Aging Faces Based on Color Gabor Wavelet and...
收藏 引用
International Conference on Computational Intelligence and software engineering (CiSE)
作者: Huilin Si Dehui Kong Baocai Yin Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Computer Beijing University of Technology Beijing China College of Computer Science and Information Engineering Beijing Technology and Business University Beijing China
Facial aging synthesis is one of the main topics in computer graphics. This paper proposes a synthetic approach to 3D aging faces by using color Gabor wavelet and texture transplant techniques. Based on 3D aging templ... 详细信息
来源: 评论
Minimising Native Interference in Still Image Data Hiding
Minimising Native Interference in Still Image Data Hiding
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Jian Jun Guo Xin Xu Zhao Feng Ma Jian Yin Zhang Beijing Key Laboratory of Multimedia and Intelligent Software Technology College of Computer Science and Technology Beijing University of Technology Beijing China Information Security Centre Beijing University of Posts and Telecommunications Beijing China Digital Video Networks (Beijing) Company Limited Beijing China
The technique of using orthogonal sequences to embed digital watermarks is described. It is shown that embedding with sequences which are orthogonal to the cover image can enhance the detection reliability and improve... 详细信息
来源: 评论
The reaction path of CO and Fe2O3 in a chemical-looping combustion system
The reaction path of CO and Fe2O3 in a chemical-looping comb...
收藏 引用
International Conference on Sustainable Power Generation and Supply, SUPERGEN
作者: Xiaolei Zhang Changqing Dong Junjiao Zhang Dalong Jiang Yongping Yang National Engineering Laboratory for Biomass Power Generation Equipment Beijing Key laboratory of security & clean energy technology North China Electric Power University Beijing China
The reaction mechanism of CO and Fe 2 O 3 in a chemical-looping combustion (CLC) was studied based on density functional theory (DFT) at B3LYP level in this paper. The structures of all reactants, intermediate, trans... 详细信息
来源: 评论
TBDRM: A TPM-Based Secure DRM Architecture
TBDRM: A TPM-Based Secure DRM Architecture
收藏 引用
IEEE International Conference on Computational Science and engineering, CSE
作者: Aimin Yu Dengguo Feng Ren Liu National Engineering Research Center for Information Security Beijing China State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China School of Business Administration North China Electric Power University Beijing China
Digital rights management (DRM) is the technological solution to control the distribution and usage of digital assets. However, existing solutions are vulnerable to various attacks in the context where the consumer ca... 详细信息
来源: 评论
A NEW CREDENTIAL ROUTING MODEL BASED ON TRUST THEORY
A NEW CREDENTIAL ROUTING MODEL BASED ON TRUST THEORY
收藏 引用
2009 IEEE International Conference on Network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Daofeng Li Lize Gu Bin Sun Xinxin Niu Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defense technology of MOE National Engineering Laboratory for Disaster Backup and RecoveryBeijing University of Po
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing ... 详细信息
来源: 评论
An access-context based method to detect network scanning event in LAN
An access-context based method to detect network scanning ev...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Di Wu Ping Yin Xiao-Hua Chen Ning Bu State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China Electronic Engineering Department Shanghai Jiaotong University Shanghai China China Information Security Certification Center Beijing 100020 China
Usually there are leading DNS resolution operations in normal network access scenarios and at the same time the relative connection success ratio is very high; but there is no leading DNS resolution operation in netwo... 详细信息
来源: 评论
A Static Method for Detection of Information Theft Malware
A Static Method for Detection of Information Theft Malware
收藏 引用
Second International Symposium on Electronic Commerce and security(第二届电子商务与安全国际研究大会)(ISECS 2009)
作者: Tao Wei JiaJing Li Wei Zou Jian Mao Key Laboratory of Network and Software Security Assurance Peking University Ministry of Education B Department of Electronic and Information Engineering of BeiHang University Beijing 10083 China
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ... 详细信息
来源: 评论