咨询与建议

限定检索结果

文献类型

  • 2,060 篇 期刊文献
  • 1,987 篇 会议
  • 10 册 图书

馆藏范围

  • 4,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,939 篇 工学
    • 1,735 篇 计算机科学与技术...
    • 1,438 篇 软件工程
    • 502 篇 信息与通信工程
    • 311 篇 土木工程
    • 282 篇 控制科学与工程
    • 269 篇 电气工程
    • 230 篇 材料科学与工程(可...
    • 230 篇 电子科学与技术(可...
    • 218 篇 机械工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 208 篇 建筑学
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 124 篇 安全科学与工程
    • 121 篇 网络空间安全
    • 119 篇 力学(可授工学、理...
    • 110 篇 光学工程
    • 104 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,432 篇 理学
    • 750 篇 数学
    • 399 篇 物理学
    • 240 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 120 篇 地球物理学
  • 609 篇 管理学
    • 404 篇 管理科学与工程(可...
    • 229 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 108 篇 法学
  • 76 篇 医学
  • 41 篇 军事学
  • 38 篇 经济学
  • 33 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 71 篇 cryptography
  • 65 篇 authentication
  • 65 篇 feature extracti...
  • 61 篇 training
  • 57 篇 deep learning
  • 57 篇 security
  • 54 篇 privacy
  • 52 篇 laboratories
  • 48 篇 information secu...
  • 47 篇 computational mo...
  • 47 篇 protocols
  • 43 篇 data mining
  • 40 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 36 篇 optimization
  • 36 篇 blockchain
  • 35 篇 accuracy
  • 32 篇 computer science

机构

  • 226 篇 state key labora...
  • 154 篇 school of cyber ...
  • 151 篇 key laboratory o...
  • 105 篇 university of ch...
  • 91 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 state key labora...
  • 77 篇 department of co...
  • 76 篇 information secu...
  • 75 篇 school of softwa...
  • 70 篇 school of comput...
  • 64 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 54 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 32 篇 cao xiaochun
  • 32 篇 yingmin jia
  • 30 篇 xiuli du
  • 25 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,734 篇 英文
  • 206 篇 中文
  • 119 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4057 条 记 录,以下是81-90 订阅
排序:
Dynamic response characteristics of ultra-shallow buried metro station structures under surface vibration load
Dynamic response characteristics of ultra-shallow buried met...
收藏 引用
ITA-AITES World Tunnel Congress, WTC 2024
作者: Tao, Lianjin Deng, Lijia Zhang, Yu Jia, Zhibo The Key Laboratory of Urban Security and Disaster Engineering Ministry of Education Beijing University of Technology Beijing China Beijing University of Technology Beijing China Beijing University of Civil Engineering and Architecture Beijing China
With the rapid development of urban transportation construction, numerous engineering projects involving the construction of new roads crossing established underground railway lines have emerged. The vibratory compact... 详细信息
来源: 评论
A quantum federated learning framework for classical clients
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2024年 第5期67卷 1-10页
作者: Yanqi Song Yusen Wu Shengyao Wu Dandan Li Qiaoyan Wen Sujuan Qin Fei Gao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 00876China Department of Physics The University of Western AustraliaPerthWA 6009Australia School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing100876China
Quantum federated learning(QFL)enables collaborative training of a quantum machine learning(QML)model among multiple clients possessing quantum computing capabilities,without the need to share their respective local *... 详细信息
来源: 评论
Variational quantum semi-supervised classifier based on label propagation
收藏 引用
Chinese Physics B 2023年 第7期32卷 279-289页
作者: 侯艳艳 李剑 陈秀波 叶崇强 College of Information Science and Engineering ZaoZhuang UniversityZaozhuang 277160China School of Artificial Intelligence Beijing University of Posts and TelecommunicationsBeijing 100876China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing 100876China Information Security Center State Key Laboratory Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China
Label propagation is an essential semi-supervised learning method based on graphs,which has a broad spectrum of applications in pattern recognition and data *** paper proposes a quantum semi-supervised classifier base... 详细信息
来源: 评论
Analytical solutions of limit support pressure and vertical earth pressure on cutting face for tunnels
收藏 引用
Underground Space 2023年 第5期12卷 65-78页
作者: Pengfei Li Xiaopu Cui Junwei Xia Xinyu Wang Key Laboratory of Urban Security and Disaster Engineering Ministry of EducationBeijing University of TechnologyBeijing 100124China China Railway 19 Bureau Group Rail Traffic Engineering Co.LTD Beijing 101399China School of Civil Engineering Henan Polytechnic UniversityJiaozuo 454000China
This paper focuses on theoretical analytical models to calculate the limit support pressure and vertical earth pressure on the cutting face for *** failure zone is divided into two parts:a sliding failure zone and an ... 详细信息
来源: 评论
Generative Replay and Multi-steps Knowledge Distillation in Class-Incremental Learning  24
Generative Replay and Multi-steps Knowledge Distillation in ...
收藏 引用
3rd International Conference on Artificial Intelligence and Intelligent Information Processing, AIIIP 2024
作者: Meng, Yicheng Ping, Jinming Shi, Jingye Zhi, Ruicong School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong University Beijing China
Data-free generative modeling (GM) methods have gained much attention because pseudo data avoids security and privacy issues, and no amount limitation for storing real data in Class-Incremental Learning (CIL). However... 详细信息
来源: 评论
FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting  26th
FirmPorter: Porting RTOSes at the Binary Level for Firmwa...
收藏 引用
26th International Conference on Information and Communications security, ICICS 2024
作者: Xin, Mingfeng Wen, Hui Deng, Liting Li, Hong Li, Qiang Sun, Limin Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China
The rapid growth of the Industrial Internet of Things (IIoT) has brought real-time operating system (RTOS) into focus as major targets for both security analysts and malicious adversaries. Due to the non-standard hard... 详细信息
来源: 评论
Dual Prompt-Based Few-Shot Learning for Automated Vulnerability Patch Localization  31
Dual Prompt-Based Few-Shot Learning for Automated Vulnerabil...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Zhang, Junwei Hu, Xing Bao, Lingfeng Xia, Xin Li, Shanping Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China Software Engineering Application Technology Lab Huawei China
Vulnerabilities are disclosed with corresponding patches so that users can remediate them in time. However, there are instances where patches are not released with the disclosed vulnerabilities, causing hidden dangers... 详细信息
来源: 评论
Efficient Certificateless Authenticated key Agreement for Blockchain-Enabled Internet of Medical Things
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2043-2059页
作者: Chaoyang Li Yanbu Guo Mianxiong Dong Gang Xu Xiu-Bo Chen Jian Li Kaoru Ota College of Software Engineering Zhengzhou University of Light IndustryZhengzhou450002China Department of Sciences and Informatics Muroran Institution of TechnologyMuroran050-8585Japan School of Computing Science and Technology North China University of TechnologyBeijing100144China Information Security Centre State Key Laboratory of Networking and Switching TechnologyBeijing University of Post and TelecommunicationsBeijing100876China
Internet of Medical Things(IoMT)plays an essential role in collecting and managing personal medical *** recent years,blockchain technology has put power in traditional IoMT systems for data sharing between different m... 详细信息
来源: 评论
Cancer classification with data augmentation based on generative adversarial networks
收藏 引用
Frontiers of Computer Science 2022年 第2期16卷 69-79页
作者: Kaimin WEI Tianqi LI Feiran HUANG Jinpeng CHEN Zefan HE College of Information Science and Technology Jinan UniversityGuangzhou 510632China Guangdong Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Software Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China
Accurate diagnosis is a significant step in cancer *** learning can support doctors in prognosis decision-making,and its performance is always weakened by the high dimension and small quantity of genetic ***,deep lear... 详细信息
来源: 评论
A survey for light field super-resolution
收藏 引用
High-Confidence Computing 2024年 第1期4卷 118-129页
作者: Mingyuan Zhao Hao Sheng Da Yang Sizhe Wang Ruixuan Cong Zhenglong Cui Rongshan Chen Tun Wang Shuai Wang Yang Huang Jiahao Shen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Key Laboratory of Data Science and Intelligent Computing International Innovation InstituteBeihang UniversityHangzhou 311115China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati... 详细信息
来源: 评论