咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3911-3920 订阅
排序:
Liveness Analysis of Parallel Program's Petri Net Models
Liveness Analysis of Parallel Program's Petri Net Models
收藏 引用
International Conference on Information engineering and Computer Science (ICIECS)
作者: Wei Liu YuYue Du HuanQing Cui Chun Yan College of Information Science and Engineering Shandong University of Science and Technology Qingdao China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China
The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion proble... 详细信息
来源: 评论
Formal analysis and testing of trusted platform module
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 646-653页
作者: Chen, Xiao-Feng State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center of Information Security Beijing 100190 China
Trusted platform module is the core component of trusted computing platform, the functional testing and validation is an important method to ensure the correctness and specification compliance of the trusted platform ... 详细信息
来源: 评论
H∞ Filtering for Neutral Stochastic Systems with Time-Varying Delays
H∞ Filtering for Neutral Stochastic Systems with Time-Varyi...
收藏 引用
Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
作者: Lin Li Yingmin Jia Junping Du Hideki Kokame the Department of Systems and Control Beihang University (BUAA) the Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and TechnologyBeijing University of Posts and Telecommunications the College of Engineering Osaka Prefecture University
This paper is devoted to the problem of H filtering for a class of neutral stochastic systems with both discrete and distributed time-varying *** objective is to design a full order filter such that the resulting filt... 详细信息
来源: 评论
Conflict and redundancy analysis method for XACML rules
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第3期32卷 516-530页
作者: Wang, Ya-Zhe Feng, Deng-Guo State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center of Information Security Beijing 100190 China
XACML is a kind of declarative policy language which has flexible expressive functions based on attributes and satisfies complex security requirements of access management in the open environment, but it lacks the cap... 详细信息
来源: 评论
Analysis of the Logistic Model for Accident Severity on Urban Road Environment
Analysis of the Logistic Model for Accident Severity on Urba...
收藏 引用
IEEE Intelligent Vehicles Symposium (IV)
作者: Zhuanglin MA Hao YUE Chunfu SHAO Sheqiang MA MOE Key Laboratory for Transportation Complex Systems Theory and Technology School of Traffic and Transportation Beijing Jiaotong University Traffic Management Engineering Department Chinese People's Public Security University
In order to identify the possible contributory factors on urban road environment to accident severity, the logistic regression model was applied to traffic accident data collected from police-reports. A total of 2117 ... 详细信息
来源: 评论
Research on Regional Road Safety Evaluation Based on Fuzzy Theory
Research on Regional Road Safety Evaluation Based on Fuzzy T...
收藏 引用
International Conference on Intelligent Computation technology and Automation, ICICTA
作者: Zhuanglin Ma Chunfu Shao Yalong Wang Sheqiang Ma MOE Key Laboratory of Urban Transportation Complex Systems Theory and Technology Beijing Jiaotong University Beijing China School of Traffic & Transportation Beijing Jiaotong University Beijing China Traffic Management Engineering Department Chinese People's Public Security University Beijing China
According to the principle of theory combining with practice, preliminary indicators of road safety evaluation are selected by integrating the characteristics of road traffic safety in China. On the basis of prelimina... 详细信息
来源: 评论
Differential Fault Analysis on SHACAL-1
Differential Fault Analysis on SHACAL-1
收藏 引用
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
作者: Ruilin Li Chao Li Chunye Gong Department of Mathematics and System Science Science College National University of Defense Technology Changsha China State Key Laboratory of Information Security Institute of Software Chinese Academy and Sciences Beijing China School of Computer National University of Defense Technology Changsha China
SHACAL-1, known as one of the finalists of the NESSIE project, originates from the compression component of the widely used hash function SHA-1. The requirements of confusion and diffusion are implemented through mixi... 详细信息
来源: 评论
Enhanced authentication and key exchange protocols for roaming service
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 61-68页
作者: Zhou, Tao Xu, Jing State Key Laboratory of Information Security Graduate University of Chinese Academy of Science Beijing 100190 China National Engineering Research Center of Information Security Beijing 100190 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Science Beijing 100190 China
The emerging wireless network has called for new requirements for designing authentication protocols due to its dynamic nature and vulnerable-to-attack structure. In 2006, two mutual authentication and key exchange pr... 详细信息
来源: 评论
Frequency-domain approach to robust iterative learning controller design for uncertain time-delay systems
Frequency-domain approach to robust iterative learning contr...
收藏 引用
Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
作者: Deyuan Meng Yingmin Jia Junping Du Fashan Yu the Department of Systems and Control Beihang University (BUAA) the Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and TechnologyBeijing University of Posts and Telecommunications the School of Electrical Engineering and Automation Henan Polytechnic University
This paper deals with the robust iterative learning control(ILC) for time-delay systems(TDS) with both model and delay *** ILC algorithm with anticipation in time is considered,and a frequency-domain approach to its d... 详细信息
来源: 评论
Gene Selection of Multiple Cancer Types via Huberized Multi-class Support Vector Machine
Gene Selection of Multiple Cancer Types via Huberized Multi-...
收藏 引用
Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
作者: Juntao Li Yingmin Jia Junping Du Fashan Yu the Department of Systems and Control Beihang University (BUAA) the Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and TechnologyBeijing University of Posts and Telecommunications the School of Electrical Engineering and Automation Henan Polytechnic University
This paper proposes a new type of regularization in the context of multi-class support vector machine for simultaneous classification and gene *** combining the huberized hinge loss function and the elastic net penalt... 详细信息
来源: 评论