咨询与建议

限定检索结果

文献类型

  • 2,042 篇 期刊文献
  • 1,979 篇 会议
  • 1 册 图书

馆藏范围

  • 4,022 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,919 篇 工学
    • 1,729 篇 计算机科学与技术...
    • 1,438 篇 软件工程
    • 502 篇 信息与通信工程
    • 309 篇 土木工程
    • 282 篇 控制科学与工程
    • 267 篇 电气工程
    • 229 篇 电子科学与技术(可...
    • 228 篇 材料科学与工程(可...
    • 217 篇 机械工程
    • 217 篇 生物工程
    • 213 篇 化学工程与技术
    • 205 篇 建筑学
    • 149 篇 交通运输工程
    • 130 篇 动力工程及工程热...
    • 124 篇 安全科学与工程
    • 121 篇 网络空间安全
    • 119 篇 力学(可授工学、理...
    • 110 篇 光学工程
    • 104 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,428 篇 理学
    • 750 篇 数学
    • 399 篇 物理学
    • 239 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 120 篇 地球物理学
  • 609 篇 管理学
    • 404 篇 管理科学与工程(可...
    • 229 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 108 篇 法学
  • 76 篇 医学
  • 41 篇 军事学
  • 38 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 71 篇 cryptography
  • 65 篇 authentication
  • 65 篇 feature extracti...
  • 61 篇 training
  • 57 篇 security
  • 56 篇 deep learning
  • 54 篇 privacy
  • 52 篇 laboratories
  • 48 篇 information secu...
  • 47 篇 computational mo...
  • 47 篇 protocols
  • 43 篇 data mining
  • 40 篇 software
  • 40 篇 cloud computing
  • 38 篇 machine learning
  • 36 篇 optimization
  • 35 篇 blockchain
  • 35 篇 accuracy
  • 32 篇 computer science

机构

  • 225 篇 state key labora...
  • 154 篇 school of cyber ...
  • 150 篇 key laboratory o...
  • 106 篇 university of ch...
  • 91 篇 institute of inf...
  • 89 篇 key laboratory o...
  • 86 篇 state key labora...
  • 77 篇 department of co...
  • 77 篇 state key labora...
  • 76 篇 information secu...
  • 75 篇 school of softwa...
  • 69 篇 school of comput...
  • 64 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 54 篇 state key labora...
  • 53 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 37 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 32 篇 cao xiaochun
  • 32 篇 yingmin jia
  • 30 篇 xiuli du
  • 25 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,699 篇 英文
  • 206 篇 中文
  • 119 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4022 条 记 录,以下是51-60 订阅
排序:
NDFuzz:a non-intrusive coverage-guided fuzzing framework for virtualized network devices
收藏 引用
Cybersecurity 2023年 第1期6卷 54-74页
作者: Yu Zhang Nanyu Zhong Wei You Yanyan Zou Kunpeng Jian Jiahuan Xu Jian Sun Baoxu Liu Wei Huo Institute of Information Engineering Chinese Academy of SciencesBejingChina School of Cyber Security University of Chinese Academy of SciencesBejingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Renmin University of China BeijingChina
Network function virtualization provides programmable in-network middlewares by leveraging virtualization tech-nologies and commodity hardware and has gained popularity among all mainstream network device *** it is ch... 详细信息
来源: 评论
Seismic response comparison and sensitivity analysis of pile foundation in liquefiable and non-liquefiable soils
收藏 引用
Earthquake engineering and engineering Vibration 2023年 第1期22卷 87-104页
作者: Jia Kemin Xu Chengshun Du Xiuli Cui Chunyi Dou Pengfei Song Jia Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing 100124China Transportation Engineering College Dalian Maritime University Dalian 116026China North China University of Technology School of Civil Engineering Beijing 100144China
Case history investigations have shown that pile foundations are more critically damaged in liquefiable soils than non-liquefiable *** study examines the differences in seismic response of pile foundations in liquefia... 详细信息
来源: 评论
Analytical solution for longitudinal response of cross-fault mountain tunnels based on foundation beam model
Analytical solution for longitudinal response of cross-fault...
收藏 引用
ITA-AITES World Tunnel Congress, WTC 2024
作者: Tao, Lianjin Qiu, Mingyang Zhang, Haixiang Jia, Zhibo Shi, Cheng The Key Laboratory of Urban Security and Disaster Engineering Ministry of Education Beijing University of Technology Beijing China Beijing Key Laboratory of Earthquake Engineering and Structural Retrofit Beijing University of Technology Beijing China
Tunnel crossing active fault is a common issue in mountain tunnels. Researching the analytical solutions for the longitudinal response of tunnels under fault dislocation is of great importance for disaster prevention ... 详细信息
来源: 评论
A Survey of security Protection Methods for Deep Learning Model
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1533-1553页
作者: Peng, Haipeng Bao, Shuang Li, Lixiang Beijing University of Posts and Telecommunications Information Security Center State Key Laboratory of Networking and Switching Technology Beijing100876 China Beijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing100876 China
In recent years, deep learning (DL) models have attracted widespread concern. Due to its own characteristics, DL has been successfully applied in the fields of object detection, superresolution reconstruction, speech ... 详细信息
来源: 评论
Utilization of Basalt Saw Mud as a Spherical Porous Functional Aggregate for the Preparation of Ordinary Structure Concrete
收藏 引用
Journal of Wuhan University of technology(Materials Science) 2024年 第2期39卷 364-375页
作者: 周永祥 关青锋 LENG Faguang WANG Jing LI Tianjun Faculty of Architecture Civil and Transportation EngineeringBeijing University of TechnologyBeijing 100124China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of TechnologyBeijing 100012China School of Materials Science and Engineering Southeast UniversityNanjing 211189China Institute of Building Materials China Academy of Building ResearchBeijing 100013China State Key Laboratory of Building Safety and Built Environment Beijing 100013China Zhejiang Chinavigor E.P.Technology Co. Ltd.Zhejiang 315043China
To promote the production and application of artificial aggregates,save natural sand resources and protect the ecological environment,we evaluated the feasibility of using spherical porous functional aggregates(SPFAs)... 详细信息
来源: 评论
Multi-field Coupling Simulation of Impact of Temperature and Density of Heat Injection Well on Carbon Budget during Hydrate Exploitation in Qilian Mountain Permafrost Region
收藏 引用
Journal of Earth Science 2024年 第6期35卷 1934-1943页
作者: Zhenhua Han Ruirui Li Luqing Zhang Jian Zhou Song Wang Key Laboratory of Shale Gas and Geoengineering Institute of Geology and GeophysicsChinese Academy of SciencesBeijing100029China Innovation Academy for Earth Science Chinese Academy of SciencesBeijing100029China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of TechnologyBeijing100124China
Permafrost regions of Qilian Mountains in China are rich in gas hydrate *** greenhouse gases in deep frozen layer are released into the atmosphere during hydrate mining,a series of negative consequences *** study aims... 详细信息
来源: 评论
A bitcoin service community classification method based on Random Forest and improved KNN algorithm
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 276-286页
作者: Gao, Muyun Lin, Shenwen Tian, Xin He, Xi He, Ketai Chen, Shifeng School of Mechanical Engineering University of Science and Technology Beijing Beijing China Internet Financial Security Technology Key Laboratory National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulati... 详细信息
来源: 评论
Design of a 9-DOF Radiation Resistant Robot for Nuclear Reactors’ Decommissioning  2nd
Design of a 9-DOF Radiation Resistant Robot for Nuclear Reac...
收藏 引用
2nd International Conference on the Frontiers of Robotics and software engineering, FRSE 2024
作者: Wu, Tong Wang, Deying Yang, Haiyan Chen, Xu Zhang, Liang Mi, Zhifeng Beijing100048 China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing China
Due to the expiration of the design service life of some nuclear facilities, a large number of hazardous radioactive devices need to be dismantled. Therefore, special attention needs to be paid to the safety and relia... 详细信息
来源: 评论
Robot Path Optimization Method for Nuclear Reactor Decommissioning  2nd
Robot Path Optimization Method for Nuclear Reactor Decommiss...
收藏 引用
2nd International Conference on the Frontiers of Robotics and software engineering, FRSE 2024
作者: Wu, Tong Wang, Deying Chen, Fengjuan Lv, Kefu Wang, Jin Lu, Fan Mi, Zhifeng Beijing100048 China Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing China
Addressing the issues of complex demolition environments in nuclear facility decommissioning projects, the difficulty of achieving multi-axis linkage for robotic arms, and low work efficiency, an optimization method t... 详细信息
来源: 评论
Multivariate Time Series Anomaly Detection Based on Spatial-Temporal Network and Transformer in Industrial Internet of Things
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2815-2837页
作者: Mengmeng Zhao Haipeng Peng Lixiang Li Yeqing Ren Information Security Center State Key Laboratory ofNetworking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and TelecommunicationsBeijing100876China Department of Information Science and Engineering Zaozhuang UniversityZaozhuang277160China
In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working *** the systems are attacked,timely identification of outliers in time series is critical to ensure *** many anomaly ... 详细信息
来源: 评论