咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3891-3900 订阅
排序:
Experimental research on gas-solid flow in a dual fluidized bed
Experimental research on gas-solid flow in a dual fluidized ...
收藏 引用
International Conference on Sustainable Power Generation and Supply, SUPERGEN
作者: Jun Li Changqing Dong Junjiao Zhang Yongping Yang National Engineering Laboratory of Biomass Power Generation Equipment Key Laboratory of Condition Monitoring and Control for Power PlantEquipment Ministry of Education Beijing Key Laboratory of Security & Clean Energy Technology North China Electric Power University Beijing China
Chemical-looping combustion (CLC) is a new method for the combustion of fuel gas with inherent separation of carbon dioxide. The cold interconnected fluidized beds (Oslash100) were set-up for the hot model design in t... 详细信息
来源: 评论
A security-Enhanced Remote Platform Integrity Attestation Scheme
A Security-Enhanced Remote Platform Integrity Attestation Sc...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Song Cheng Liu Bing Xin Yang Yang Yixian Zhongxian Li Yin Han Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing China National Cybernet Security Ltd Beijing China Huawei Technology Ltd Beijing China
Remote platform integrity attestation is a method by which a client attests its hardware and software configuration to a remote server. The goal of remote integrity platform attestation is to enable a remote challenge... 详细信息
来源: 评论
Dynamics of chaotic systems with attractive and repulsive couplings
收藏 引用
Physical Review E 2009年 第4期80卷 046206-046206页
作者: Yuehua Chen Jinghua Xiao Weiqing Liu Lixiang Li Yixian Yang School of Science Beijing University of Posts and Telecommunications Beijing 100876 China School of Science Jiangxi University of Science and Technology Ganzhou 341000 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications P.O. Box 145 Beijing 100876 China Key Laboratory of Networking and Information Attack and Defence Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Together with attractive couplings, repulsive couplings play crucial roles in determining important evolutions in natural systems, such as in learning and oscillatory processes of neural networks. The complex interact... 详细信息
来源: 评论
Dependence Analysis for C Programs with Combinability of Dataflow Facts under Consideration
收藏 引用
Wuhan University Journal of Natural Sciences 2009年 第4期14卷 321-326页
作者: QIAN Ju XU Baowen ZHOU Xiaoyu CHEN Lin SHI Liang College of Information Science and Technology NanjingUniversity of Aeronautics and Astronautics Nanjing 210016Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 Jiangsu China Department of Computer Science and Technology NanjingUniversity Nanjing 210093 Jiangsu China School of Computer Science and Engineering SoutheastUniversity Nanjing 211189 Jiangsu China Microsoft China Research and Development Group Beijing100080 China
To avoid the precision loss caused by combining data- flow facts impossible to occur in the same execution path in dependence analysis for C programs, this paper first proposes a flow-sensitive and context-insensitive... 详细信息
来源: 评论
Cyclic redundancy code check algorithm based on small lookup table
Cyclic redundancy code check algorithm based on small lookup...
收藏 引用
IEEE International Conference on Communications technology and Applications, ICCTA
作者: Jianfen Peng Yajian Zhou Yixian Yang National Engineering Laboratory for Disaster Bacup and Recovery Information Security Group State Key Laboratory of Networking and Switiching Techonolgy Key Laboratory of Information Attack & defence Technology of MOE Beijing University of Posts and Telecommunications China
Real time and low occupation of memory must be satisfied in the error controlling of computer networks. Cyclic redundancy code generation algorithm based on small lookup table (CRCGA) is presented in this paper, which... 详细信息
来源: 评论
The optimized geometric structure of the (0001) surface of α-Fe2O3
The optimized geometric structure of the (0001) surface of ...
收藏 引用
International Conference on Sustainable Power Generation and Supply, SUPERGEN
作者: Xiaolei Zhang Junjiao Zhang Changqing Dong Dalong Jiang Yongping Yang National Engineering Laboratory of Biomass Power Generation Equipment Key Laboratory of Condition Monitoring and Control for Power Plant Equipment Ministry of Education Beijing Key Laboratory of Security & Clean Energy Technology North China Electric Power University Beijing China
A tridimensional model of alpha-Fe 2 O 3 and models of (0001) and (1102) surfaces on it were built. Then the structural optimization of the (0001) surface was presented which explored the influence of the system scal... 详细信息
来源: 评论
The interaction between HCl and Fe2O3 during the chemical looping combustion of MSW
The interaction between HCl and Fe2O3 during the chemical lo...
收藏 引用
International Conference on Sustainable Power Generation and Supply, SUPERGEN
作者: Junjiao Zhang Changqing Dong Liang Wang Yongping Yang National Engineering Laboratory of Biomass Power Generation Equipment Key Laboratory of Condition Monitoring and Control for Power Plant Equipment Ministry of Education Beijing Key Laboratory of Security & Clean Energy Technology North China Electric Power University Beijing China
In order to avoid dioxin emission from municipal solid waste combustion (MSW), chemical looping combustion was considered. The interaction between HCl and Fe 2 O 3 was studied in this paper and experiments were carri... 详细信息
来源: 评论
A REAL-TIME INFORMATION HIDING ALGORITHM BASED ON HTTP PROTOCOL
A REAL-TIME INFORMATION HIDING ALGORITHM BASED ON HTTP PROTO...
收藏 引用
2009 IEEE International Conference on Network Infrastructure and Digital Content(2009年IEEE网络基础设施与数字内容国际会议 IEEE IC-NIDC2009)
作者: Jingzhong Wang Tianling Xu Kaiguo Yuan Xinxin Niu Yixian Yang School of Information Engineering North China University of Technology Beijing 100041 P. R. China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing Un
Based on the structure of HTTP protocol, a real-time information hiding algorithm was proposed in this paper, to solve the problem that embedding a mass of data in the TCP/IP packet. The secret information is embedded... 详细信息
来源: 评论
security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings
Security Analysis of Two Remote User Authentication Schemes ...
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remot... 详细信息
来源: 评论
An improved algorithm for IP alias resolution in network topology measurement
An improved algorithm for IP alias resolution in network top...
收藏 引用
9th International Conference on Electronic Measurement and Instruments, ICEMI 2009
作者: Yong, Zhang Shize, Guo Kangfeng, Zheng Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China
Internet topology measurement is an important part of Network measurement. Nowadays, traceroute probing method is widely used to obtain the original route data, and the IP alias resolution technique is to identify IP ... 详细信息
来源: 评论