咨询与建议

限定检索结果

文献类型

  • 21 篇 期刊文献
  • 17 篇 会议

馆藏范围

  • 38 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32 篇 工学
    • 24 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 9 篇 生物工程
    • 7 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 生物医学工程(可授...
    • 3 篇 控制科学与工程
    • 2 篇 光学工程
    • 2 篇 土木工程
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 交通运输工程
  • 18 篇 理学
    • 9 篇 生物学
    • 5 篇 数学
    • 5 篇 物理学
    • 3 篇 化学
    • 3 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 11 篇 管理学
    • 8 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 2 篇 经济学
    • 2 篇 应用经济学

主题

  • 2 篇 object detection
  • 2 篇 crack detection
  • 2 篇 feature extracti...
  • 1 篇 access control
  • 1 篇 kernel hook
  • 1 篇 the roi of video
  • 1 篇 modeling
  • 1 篇 deep learning
  • 1 篇 information diss...
  • 1 篇 online predictio...
  • 1 篇 lstm
  • 1 篇 program slicing
  • 1 篇 task analysis
  • 1 篇 photointerpretat...
  • 1 篇 faster r-cnn
  • 1 篇 online patching
  • 1 篇 outsourced ser-v...
  • 1 篇 electroencephalo...
  • 1 篇 zero-shot learni...
  • 1 篇 force

机构

  • 16 篇 faculty of infor...
  • 16 篇 beijing key labo...
  • 10 篇 national enginee...
  • 5 篇 beijing key labo...
  • 5 篇 college of compu...
  • 4 篇 beijing key labo...
  • 3 篇 natl. engineerin...
  • 3 篇 college of appli...
  • 3 篇 national enginee...
  • 3 篇 national enginee...
  • 2 篇 shanghai key lab...
  • 2 篇 school of cyber ...
  • 2 篇 national enginee...
  • 2 篇 the third resear...
  • 2 篇 school of comput...
  • 2 篇 state key labora...
  • 2 篇 faculty of infor...
  • 2 篇 state key labora...
  • 2 篇 national enginee...
  • 1 篇 college of compu...

作者

  • 15 篇 duan lijuan
  • 8 篇 lijuan duan
  • 5 篇 qiao yuanhua
  • 4 篇 gong zhi
  • 3 篇 zhan jing
  • 2 篇 juncheng chen
  • 2 篇 wang yuxi
  • 2 篇 wang wenjian
  • 2 篇 jiang nan
  • 2 篇 zhang jianbiao
  • 2 篇 miao jun
  • 2 篇 jun miao
  • 2 篇 zhao xu
  • 2 篇 hu jun
  • 2 篇 pan li
  • 2 篇 bian ma
  • 2 篇 xu fan
  • 2 篇 fan junsong
  • 2 篇 fan xu
  • 2 篇 yuanhua qiao

语言

  • 36 篇 英文
  • 1 篇 其他
  • 1 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technologies of Information Security Level Protection"
38 条 记 录,以下是1-10 订阅
排序:
Fine-Grained Zero-Shot Object Detection via Semantic Decoupling  24
Fine-Grained Zero-Shot Object Detection via Semantic Decoupl...
收藏 引用
8th International Conference on Computer Science and Artificial Intelligence, CSAI 2024
作者: Duan, Lijuan Zhang, Zichen Gong, Zhi Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China School of Computer Science Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China
Recent deep learning models have advanced object detection capabilities, but their reliance on labeled data limits scalability. Fine-grained zero-shot detection remains challenging due to the need to generalize to uns... 详细信息
来源: 评论
Burst image super-resolution based on dual branch fusion and adaptive frame selection
收藏 引用
Displays 2025年 89卷
作者: Duan, Lijuan Zuo, Wendi Gu, Ke Gong, Zhi School of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing100124 China School of Information Science and Technology Beijing University of Technology Beijing100124 China Chongqing Research Institute of Beijing University of Technology China
The modern handheld camera is capable of rapidly capturing multiple images and subsequently merging them into a single image. The extant methodologies typically select the first frame as the reference frame, utilising... 详细信息
来源: 评论
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment
收藏 引用
China Communications 2018年 第2期15卷 122-137页
作者: Jing Zhan Xudong Fan Lei Cai Yaqi Gao Junxi Zhuang College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... 详细信息
来源: 评论
A trusted behaviour measurement scheme based on feedback and control in trusted network
收藏 引用
International Journal of Wireless and Mobile Computing 2021年 第2期20卷 99-106页
作者: Zhuang, Junxi Zhao, Xu Gong, Bei Zhan, Jing College of Computer Science Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing100124 China
To solve the real-time trusted measurement of user behaviour in trusted networks, a new combination of dynamic and static, subjective and objective behaviour trusted measurement scheme is presented. The scheme analyse... 详细信息
来源: 评论
A novel image encryption method based on hyperchaotic system and pixel information association
收藏 引用
International Journal of Wireless and Mobile Computing 2018年 第3期15卷 207-214页
作者: Duan, Lijuan Zhang, Dongkui Ning, Zhenhu Xu, Fan Cui, Guoqin Liang, Peng Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China State Key Laboratory of Digital Multi-Media Chip Technology Vimicro Corporation Beijing100191 China State Information Center National Engineering Laboratory for e-Government Integration and Application Beijing100045 China
In recent years, a variety of image encryption methods based on chaotic systems has been proposed, and has achieved good results. In order to improve the security of image encryption, this paper proposes a new image e... 详细信息
来源: 评论
Knowledge Graph Embedding Method Based on Entity Metric Learning  23
Knowledge Graph Embedding Method Based on Entity Metric Lear...
收藏 引用
9th International Conference on Computing and Artificial Intelligence, ICCAI 2023
作者: He, Meng Duan, Lijuan Zhang, Baochang Han, Shengwen Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Key Technologies of Information Security Level Protection China Institute of Artificial Intelligence Beihang University China Faculty of Information Technology Beijing University of Technology China
A knowledge graph is a knowledge base of graph structure that stores massive facts and their relations in the form of triplets. Embedding entities and relations in knowledge graph into low-dimensional continuous vecto... 详细信息
来源: 评论
A static technique for detecting input validation vulnerabilities in Android apps
收藏 引用
Science China(information Sciences) 2017年 第5期60卷 210-225页
作者: Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing Electronic Science and Technology Institute
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t... 详细信息
来源: 评论
Learning EEG synchronization patterns for epileptic seizure prediction using bag-of-wave features
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第11期14卷 15557-15572页
作者: Cui, Song Duan, Lijuan Qiao, Yuanhua Xiao, Ying Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
Epileptic seizure prediction has the potential to promote epilepsy care and treatment. However, the seizure prediction accuracy does not satisfy the application requirements. In this paper, a novel framework for seizu... 详细信息
来源: 评论
EEG Source Localization Using Spatio-Temporal Neural Network
收藏 引用
China Communications 2019年 第7期16卷 131-143页
作者: Song Cui Lijuan Duan Bei Gong Yuanhua Qiao Fan Xu Juncheng Chen Changming Wang Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China College of Applied Sciences Beijing University of Technology Beijing 100124 China The National Clinical Research Center for Mental Disorders & Beijing Key Laboratory of Mental Disorders Beijing Anding Hospital Capital Medical University Beijing 100088 China Advanced Innovation Center for Human Brain Protection Capital Medical University Beijing 100069 China
Source localization of focal electrical activity from scalp electroencephalogram (sEEG) signal is generally modeled as an inverse problem that is highly ill-posed. In this paper, a novel source localization method is ... 详细信息
来源: 评论
A federated sleep staging method based on adaptive re-aggregation and double prototype-contrastive using single-channel electroencephalogram
收藏 引用
engineering Applications of Artificial Intelligence 2025年 156卷
作者: Bian Ma Lijuan Duan Zhaoyang Huang Yuanhua Qiao College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing 100053 China Beijing Key Laboratory of Neuromodulation Beijing 100053 China School of Mathematics Statistics and Mechanics Beijing University of Technology Beijing 100124 China
The limited availability of sleep data collected by individual institutions poses a significant challenge in developing automatic sleep staging models, especially given that most existing models rely heavily on data-d... 详细信息
来源: 评论