咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3921-3930 订阅
排序:
H∞-based design approach to discrete-time learning control systems with iteration-varying disturbances
H∞-based design approach to discrete-time learning control ...
收藏 引用
Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
作者: Deyuan Meng Yingmin Jia Junping Du Fashan Yu the Department of Systems and Control Beihang University (BUAA) the Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and TechnologyBeijing University of Posts and Telecommunications the School of Electrical Engineering and Automation Henan Polytechnic University
This paper is concerned with the iterative learning control(ILC) problem for discrete-time systems with iterationvarying *** the so-called super-vector approach to ILC,the discrete domain bounded real lemma is employe... 详细信息
来源: 评论
Distributed H∞ consensus control for networks of multiple agents with linear coupling dynamics
Distributed H∞ consensus control for networks of multiple a...
收藏 引用
SICE Annual Conference
作者: Yang Liu Yingmin Jia Junping Du Fashan Yu Department of Systems and Control Beihang University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan China
This paper is devoted to the consensus control for a network of autonomous agents with high-dimension linear coupling dynamics and subject to external disturbances. By transforming the consensus control problem into a... 详细信息
来源: 评论
Adaptive multi-class support vector machine for microarray classification and gene selection
Adaptive multi-class support vector machine for microarray c...
收藏 引用
SICE Annual Conference
作者: Juntao Li Yingmin Jia Junping Du Fashan Yu Department of Systems and Control Beihang University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan China
This paper proposes an adaptive multi-class support vector machine for simultaneous microarray classification and gene selection. By evaluating the gene ranking significance, the adaptive multi-class support vector ma... 详细信息
来源: 评论
Detection of drive-by downloads based on dynamic page views
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2126-2132页
作者: Zhang, Huilin Zhuge, Jianwei Song, Chengyu Han, Xinhui Zou, Wei Institute of Computer Science and Technology Peking University Beijing 100871 China Key Laboratory of Network and Software Security Assurance of Ministry of Education Peking University Beijing 100871 China
A dynamic page view based drive-by download detection method was developed to address the challenge hidden drive-by downloads which abuse inline linking dynamics creation and obfuscation. The method uses a script engi... 详细信息
来源: 评论
Analysis and improvement of ZG off-line TTP non-repudiation protocol
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 44-51页
作者: Liu, Dong-Mei Qing, Si-Han Li, Peng-Fei Li, Shang-Jie National Engineering Research Center for Fundamental Software Institute of Software Chinese Academy of Sciences Beijing 100080 China Engineering Research Center for Information Security Technology Institute of Software Chinese Academy of Sciences Beijing 100080 China Graduate School Chinese Academy of Sciences Beijing 100039 China National Key Laboratory of Integrated Information System Technology Chinese Academy of Sciences Beijing 100080 China
Based on the weakness of ZG off-line TTP(trusted third party) non-repudiation protocol because of using protocol deadline, the improvement of the ZG off-line TTP non-repudiation protocol was given, which eliminated th... 详细信息
来源: 评论
A New Support Vector Machine for Microarray Classification and Adaptive Gene Selection
A New Support Vector Machine for Microarray Classification a...
收藏 引用
2009 American Control Conference (ACC 2009)
作者: Juntao Li Yingmin Jia Junping Du Fashan Yu Seventh Research Division Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan China
This paper presents a new support vector machine for simultaneous gene selection and microarray classification. By introducing the adaptive elastic net penalty which is a convex combination of weighted 1-norm penalty ... 详细信息
来源: 评论
Network security situational awareness model based on information fusion
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2009年 第3期46卷 353-362页
作者: Wei, Yong Lian, Yifeng Feng, Dengguo Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situ... 详细信息
来源: 评论
Network security situational awareness model based on log audit and performance correction
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 763-772页
作者: Wei, Yong Lian, Yi-Feng Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm. First, nodes theoretic s... 详细信息
来源: 评论
Verification method of security model based on UML and model checking
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第4期32卷 699-708页
作者: Cheng, Liang Zhang, Yang Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 China Stale Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100190 China
As the development of security operating system, the formal analysis and verification of the security models has been one of the hottest topics now. A new method to verify the correctness of security models is propose... 详细信息
来源: 评论
Fast KD-tree construction method by probing the optimal splitting plane heuristically
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2009年 第2期32卷 185-192页
作者: Fan, Wen-Shan Wang, Bin Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
In the field of ray-tracing based photo-realistic rendering, kd-tree is used as an important acceleration structure. This paper focuses on the effective construction of kd-tree, and proposes a novel and fast construct... 详细信息
来源: 评论