咨询与建议

限定检索结果

文献类型

  • 75 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 74 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 23 篇 信息与通信工程
    • 14 篇 电气工程
    • 13 篇 控制科学与工程
    • 13 篇 生物工程
    • 11 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 44 篇 理学
    • 15 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 9 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 7 篇 法学
    • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 17 篇 duan lijuan
  • 8 篇 lijuan duan
  • 7 篇 wei huo
  • 6 篇 zhang yuqing
  • 6 篇 qiao yuanhua
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 139 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
144 条 记 录,以下是1-10 订阅
排序:
Iterative Bounded Distance Decoding With Random Flipping for Product-Like Codes
收藏 引用
IEEE Transactions on Communications 2025年 第5期73卷 2864-2875页
作者: Li, Guorong Wang, Shiguo Zhao, Shancheng Jinan University National and Local Joint Research Center of Network Security Detection and Protection Technology College of Information Science and Technology Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Changsha University of Science and Technology Computer and Communication Engineering Institute Changsha410114 China
Product-like codes are widely used in high-speed communication systems since they can be decoded with low-complexity hard decision decoders (HDDs). To meet the growing demand of data rates, enhanced HDDs are required.... 详细信息
来源: 评论
Spectrum fragmentation-aware dynamic network slicing deployment in computing power networks based on elastic optical networks
收藏 引用
Journal of Optical Communications 2025年 第2期46卷 335-346页
作者: Wang, Laiming Zhang, Haojie Li, Lei Ren, Danping Hu, Jinhua Zhao, Jijun School of Information and Electrical Engineering Hebei University of Engineering Handan056038 China Hebei Key Laboratory of Security and Protection Information Sensing and Processing Handan056038 China Beijing KELIBANG Information Technology Corporation Limited Beijing10081 China
The widespread application of AI with high computing requirements has driven the rapid development of the computing field. Computing Power Networks (CPNs) have been recognized as solutions to providing on-demand compu... 详细信息
来源: 评论
Fine-Grained Zero-Shot Object Detection via Semantic Decoupling  24
Fine-Grained Zero-Shot Object Detection via Semantic Decoupl...
收藏 引用
8th International Conference on Computer Science and Artificial Intelligence, CSAI 2024
作者: Duan, Lijuan Zhang, Zichen Gong, Zhi Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China School of Computer Science Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China
Recent deep learning models have advanced object detection capabilities, but their reliance on labeled data limits scalability. Fine-grained zero-shot detection remains challenging due to the need to generalize to uns... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
Leveraging semantic relations in code and data to enhance taint analysis of embedded systems  24
Leveraging semantic relations in code and data to enhance ta...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Jiaxu Zhao Yuekang Li Yanyan Zou Zhaohui Liang Yang Xiao Yeting Li Bingwei Peng Nanyu Zhong Xinyi Wang Wei Wang Wei Huo Institute of Information Engineering Chinese Academy of Sciences China and School of Cyber Security University of Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China University of New South Wales Australia Institute of Information Engineering Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China
IoT devices have significantly impacted our daily lives, and detecting vulnerabilities in embedded systems early on is critical for ensuring their security. Among the existing vulnerability detection techniques for em...
来源: 评论
Burst image super-resolution based on dual branch fusion and adaptive frame selection
收藏 引用
Displays 2025年 89卷
作者: Duan, Lijuan Zuo, Wendi Gu, Ke Gong, Zhi School of Computer Science Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing100124 China School of Information Science and Technology Beijing University of Technology Beijing100124 China Chongqing Research Institute of Beijing University of Technology China
The modern handheld camera is capable of rapidly capturing multiple images and subsequently merging them into a single image. The extant methodologies typically select the first frame as the reference frame, utilising... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation Systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation Systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Gaussian Shading++: Rethinking the Realistic Deployment Challenge of Performance-Lossless Image Watermark for Diffusion Models
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Zijin Zhang, Xin Chen, Kejiang Zeng, Kai Yao, Qiyi Fang, Han Zhang, Weiming Yu, Nenghai University of Science and Technology of China Hefei230026 China Anhui Province Key Laboratory of Digital Security China Department of Information Engineering and Mathematics University of Siena Siena Italy School of Computing National University of Singapore 117417 Singapore
Ethical concerns surrounding copyright protection and inappropriate content generation pose challenges for the practical implementation of diffusion models. One effective solution involves watermarking the generated i... 详细信息
来源: 评论
Cross-Layer security for Semantic Communications: Metrics and Optimization
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui Nanjing University of Posts and Telecommunications College of Science Nanjing210003 China Nanjing University of Posts and Telecommunications College of Communication and Information Engineering Nanjing210003 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China Tsinghua University Department of Electronic Engineering Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
Packet: a privacy-aware access control policy composition method for services composition in cloud environments
收藏 引用
Frontiers of Computer Science 2016年 第6期10卷 1142-1157页
作者: Li LIN Jian HU Jianbiao ZHANG College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China National Engineering Laboratory for Classified Information Security Protection Beijing 100124 China
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p... 详细信息
来源: 评论