咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是4061-4070 订阅
排序:
An ID-based watermarking scheme for Java programs
An ID-based watermarking scheme for Java programs
收藏 引用
EUC 2006: Embedded and Ubiquitous Computing Workshops
作者: Yuan, Zheng Wen, Qiaoyan Wu, Wenling Zhang, Qing School of Science Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Electronic Science and Technology Institute Beijing 100036 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100080 China
In this paper, we propose an identities(JD) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants' identities, embedded via the watermarked opaque predicates, and v... 详细信息
来源: 评论
Access control model for P2P file-sharing systems based on trust and recommendation
Access control model for P2P file-sharing systems based on t...
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Yue, Guang-Xue Yu, Fei Chen, Yi-Jun Wu, Rong-Hui An, Ji-Yao Li, Ren-Fa College of Information Engineering JiaXing University JiaXing 314000 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China School of Computer and Communication Hunan University Changsha 410082 China
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Ronghui, Wu Renfa, Li Fei, Yu Guangxue, Yue Cheng, Xu School of Computer and Communication Hunan University Changsha410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Wu, Ronghui Li, Renfa Yu, Fei Yue, Guangxue Xu, Cheng School of Computer and Communication Hunan University Changsha 410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
Narrowband audio hiding algorithm based on human auditory system
收藏 引用
beijing Youdian Daxue Xuebao/Journal of beijing University of Posts and Telecommunications 2006年 第SUPPL. 2期29卷 101-104+121页
作者: Yuan, Kai-Guo Yang, Ya-Tao Zhang, Ru Niu, Xin-Xin Yang, Yi-Xian Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Switching and Networking Beijing University of Posts and Telecommunications Beijing 100876 China Department of Communication Engineering Beijing Electronic Science and Technology Institute Beijing 100070 China
After studying about human auditory system and narrowband communications system model, a narrowband audio hiding algorithm based on human auditory system was presented. A lot of experiments proved that the algorithm h... 详细信息
来源: 评论
Data distribution algorithm of high-speed intrusion detection system based on network processor
Data distribution algorithm of high-speed intrusion detectio...
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Xu, Cheng Yu, Fei Dai, Zhenghui Yue, Guangxue Li, Renfa School of Computer and Communication Hunan University Changsha 410082 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou Jiangsu 2150063 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin... 详细信息
来源: 评论
security analysis of some batch verifying signatures from pairings
收藏 引用
International Journal of Network security 2006年 第2期3卷 138-143页
作者: Cao, Tianjie Lin, Dongdai Xue, Rui School of Computer Science and Technology China University of Mining and Technology Xuzhou 221008 China State Key Laboratory of Information Security of Institute of Software Chinese Academy of Sciences Beijing 100080 China Graduate School of the Chinese Academy of Sciences Beijing 100039 China
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from bilinear pairings. In this paper, we ... 详细信息
来源: 评论
The intelligent research of image recognition used for unattended substation
The intelligent research of image recognition used for unatt...
收藏 引用
2006 China International Conference on Electricity Distribution, CICED 2006
作者: Yang, Jun Ai, Xin Jia, Xiufang Li, Yansong Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control Ministry of Education North China Electric Power University Deshengmenwaizhuxinzhuang Beijing 102206 China Electric Power Company Jinzhou Engineering Technology Department Liaohe Petroleum Exploration Bureau Liaoning Province Linghai 121209 China
It is a trend to construct unattended substation in power system *** paper systematically analyses the superiority and limitation of MATLAB and Visual C++ and illustrates how to compile m-files to cpp-files by MATLAB ... 详细信息
来源: 评论
News video story segmentation
News video story segmentation
收藏 引用
International Conference on Multimedia Modeling (MMM)
作者: Yong Fang Xiaofei Zhai Jingwang Fan Electronic Science and Technology Institution Key Laboratory of Security and Secrecy of Information Beijing Beijing China School of Telecommunication Engineering Beijing University of Posts and Telecommunications Beijing China School of Communication Engineering Yanshan University슠 Qinhuangdao China
This paper presents a two-level framework for news video segmentation. Our framework is established-based upon a similar framework as in. We extended the original framework by adding rule-based pre-segmentation module... 详细信息
来源: 评论
Research on Network anomaly Detection Based on Clustering and Classifier
Research on Network anomaly Detection Based on Clustering an...
收藏 引用
International Conference on Computational Intelligence and security
作者: Hongyu Yang Feng Xie Yi Lu Software Research Center Tianjin Key Laboratory for Advanced Signal Processing Civil Aviation University of China Tianjin China Institute of Computing Technology Chinese Academy and Sciences Beijing China Security and Cryptography Laboratory Swiss Federal Institute of Technology Lausanne Switzerland
In this paper, we propose a method to find the anomalous behaviors in network traffic. We map the network connection records into different feature spaces typically of high dimension according to their protocols and s... 详细信息
来源: 评论