咨询与建议

限定检索结果

文献类型

  • 75 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 73 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 45 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 13 篇 物理学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 18 篇 duan lijuan
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 qiao yuanhua
  • 6 篇 zhang yuqing
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 139 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
144 条 记 录,以下是91-100 订阅
排序:
Golden grain: Building a secure and decentralized model marketplace for MLaaS
arXiv
收藏 引用
arXiv 2020年
作者: Weng, Jiasi Weng, Jian Cai, Chengjun Huang, Hongwei Wang, Cong The College of Information Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China The Department of Computer Science City University of Hong Kong Hong Kong Hong Kong The City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China
ML-as-a-service (MLaaS) becomes increasingly popular and revolutionizes the lives of people. A natural requirement for MLaaS is, however, to provide highly accurate prediction services. To achieve this, current MLaaS ... 详细信息
来源: 评论
A new dance generation task from start to end
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1651卷
作者: Xiao Xu Lijuan Duan Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China
The dance generation task is an interesting task. The general task is to predict the next dance sequence through a given initial frame, or to convert from music to dance through audio information. However, these works...
来源: 评论
Secure personal data sharing for simultaneous, parallel or sequential processing service: Autonomously and controllably
收藏 引用
Future Generation Computer Systems 2025年 173卷
作者: Lyu, Qiuyun Zhou, Yilong Ren, Yizhi Zhou, Lingfei Wu, Zekai Zhao, Chengyao Zhang, Jilin Ma, Duohe School of Cyberspace Hangzhou Dianzi University Zhejiang Hangzhou310018 China Zhejiang Provincial Key Laboratory of Data Storage Transmission and Application Technology Zhejiang Hangzhou310018 China Pinghu Digital Technology Innovation Institute Co. Ltd Hangzhou Dianzi University Zhejiang Jiaxing314299 China Zhejiang Provincial Key Laboratory of Sensitive Data Security Protection and Confidentiality Governance Zhejiang Hangzhou310018 China Zhejiang Big Data Development Center Zhejiang Hangzhou310018 China Zhejiang Data Bureau Zhejiang Hangzhou310018 China Institute of Information Engineering of Chinese Academy of Sciences Beijing100084 China
Personal data, as an important category of data elements of a trusted data circulation, needs to be shared to others in "one-to-one" mode or "one-to-many" mode with simultaneously, parallelly or se... 详细信息
来源: 评论
EG-GAN: Cross-language emotion gain synthesis based on cycle-consistent adversarial networks
arXiv
收藏 引用
arXiv 2019年
作者: Jia, Xiaoqi Tai, Jianwei Huang, Qingjia Li, Yakai Zhang, Weijuan Du, Haichao Key Laboratory of Network Assessment Technology Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Beijing Key Laboratory of Network Security and Protection Technology
Despite remarkable contributions from existing emotional speech synthesizers, we find that these methods are based on Text-to-Speech system or limited by aligned speech pairs, which suffered from pure emotion gain syn... 详细信息
来源: 评论
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
B2SFinder: Detecting Open-Source Software Reuse in COTS Soft...
收藏 引用
IEEE International Conference on Automated Software engineering (ASE)
作者: Zimu Yuan Muyue Feng Feng Li Gu Ban Yang Xiao Shiyang Wang Qian Tang He Su Chendong Yu Jiahuan Xu Aihua Piao Jingling Xuey Wei Huo Institute of Information Engineering Chinese Academy of Sciences Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology and School of Cyber Security University of Chinese Academy of Sciences University of New South Wales
COTS software products are developed extensively on top of OSS projects, resulting in OSS reuse vulnerabilities. To detect such vulnerabilities, finding OSS reuses in COTS software has become imperative. While scalabl... 详细信息
来源: 评论
Privacy-preserving medical treatment system through nondeterministic finite automata
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Yang Deng, Robert H. Liu, Ximeng Wu, Yongdong Weng, Jian Zheng, Xianghan Rong, Chunming School of Information Systems Singapore Management University Singapore College of Mathematics and Computer Science Fuzhou University Fujian China State Key Laboratory of Integrated Services Networks Xidian University Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China School of Information Systems Singapore Management University Singapore Singapore Department of Computer Science Jinan University Guangdong China College of Mathematics and Computer Science Fuzhou University Fujian China Department of Electronic Engineering and Computer Science University of Stavanger Norway MingByte Technology Qingdao China
In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for the remote medical environment. P-Med makes use of the... 详细信息
来源: 评论
A Novel Video Encryption Method Based on Faster R-CNN
A Novel Video Encryption Method Based on Faster R-CNN
收藏 引用
2018 International Conference on Computer Science, Electronics and Communication engineering(CSECE2018)
作者: Lijuan Duan Dongkui Zhang Fan Xu Guoqin Cui Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection State Key Laboratory of Digital Multi-media Chip Technology Vimicro Corporation
In order to improve the generalization performance of video encryption and reduce the amount of data in video en-cryption, this paper proposes a video encryption on regions of interest(ROI) method based on Faster R-CN... 详细信息
来源: 评论
Evolutionary game based analysis for user privacy protection behaviors in social networks  3
Evolutionary game based analysis for user privacy protection...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Liu, Fang Pan, Li Yao, Li-Hong School of Cyber Security Shanghai Jiao Tong University Shanghai200240 China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai200240 China National Engineering Laboratory for Information Content Analysis Technology Shanghai China
With the increasing development of online social networks, privacy protection attracts more and more concerns. Most research on privacy protection focus on specific techniques, and they assume users adopt security pro... 详细信息
来源: 评论
Privacy-aware personal information propagation management in social networks  3
Privacy-aware personal information propagation management in...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Wu, Yu Pan, Li School of Cyber Security Shanghai Jiao Tong University Shanghai200240 China Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai200240 China National Engineering Laboratory for Information Content Analysis Technology Shanghai China
Online social network becomes the most important medium of information propagation. As the number of social network users grows rapidly and information sharing behavior becomes more frequent, the propagation range of ... 详细信息
来源: 评论
Blockchain-Based Incentive Announcement System for Internet of Vehicles
Blockchain-Based Incentive Announcement System for Internet ...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Yang Yang Jialiang Chen Xianghan Zheng Ximeng Liu Wenzhong Guo Hairong Lv College of Mathematics and Computer Science Fuzhou University Fuzhou China Guangxi Key Laboratory of Cryptography and Information Security Guangnxi China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University) Fuzhou China Ministry of Education Key Laboratory of Bioinformatics Bioinformatics Division and Center for Synthetic and Systems Biology Beijing National Research Center for Information Science and TechnologyDepartment of Automation Tsinghua University Beijing China
With the rapid development of computation and communication technologies, the traditional vehicle ad hoc networks (VANETs) are changing to Internet of vehicle (IoV). Vehicular announcement networks in IoV have been wi... 详细信息
来源: 评论