咨询与建议

限定检索结果

文献类型

  • 75 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 74 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 23 篇 信息与通信工程
    • 14 篇 电气工程
    • 13 篇 控制科学与工程
    • 13 篇 生物工程
    • 11 篇 电子科学与技术(可...
    • 8 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 44 篇 理学
    • 15 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 9 篇 医学
    • 9 篇 临床医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 7 篇 法学
    • 4 篇 法学
    • 3 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 17 篇 duan lijuan
  • 8 篇 lijuan duan
  • 7 篇 wei huo
  • 6 篇 zhang yuqing
  • 6 篇 qiao yuanhua
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 139 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
144 条 记 录,以下是11-20 订阅
排序:
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment
收藏 引用
China Communications 2018年 第2期15卷 122-137页
作者: Jing Zhan Xudong Fan Lei Cai Yaqi Gao Junxi Zhuang College of Computer Science Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... 详细信息
来源: 评论
Exfiltration-resistant Proxy Re-Encryption for IoT Data Sharing in Unreliable Clouds
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Zhou, Yuyang Zhao, Liang Li, Fagen Takagi, Tsuyoshi School of Cyberspace Security Hainan University Haikou570000 China Department of Mathematical Informatics Graduate School of Information Science and Technology The university of Tokyo Tokyo113-8656 Japan School of Cyber Science and Engineering Sichuan University Chengdu610065 China Key Laboratory of Data Protection and Intelligent Management [Sichuan University Ministry of Education China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
The sharing of Internet of Things (IoT) data plays an extensive role in our everyday lives. Exploring secure and efficient methods for data sharing is a prominent area of research. Proxy re-encryption (PRE) in the clo... 详细信息
来源: 评论
Cross-Layer security for Semantic Communications: Metrics and Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui College of Science Nanjing University of Posts and Telecommunications Nanjing210003 China College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing210000 China Department of Electronic Engineering Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China The State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
A trusted behaviour measurement scheme based on feedback and control in trusted network
收藏 引用
International Journal of Wireless and Mobile Computing 2021年 第2期20卷 99-106页
作者: Zhuang, Junxi Zhao, Xu Gong, Bei Zhan, Jing College of Computer Science Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing100124 China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing University of Technology Beijing100124 China
To solve the real-time trusted measurement of user behaviour in trusted networks, a new combination of dynamic and static, subjective and objective behaviour trusted measurement scheme is presented. The scheme analyse... 详细信息
来源: 评论
Construction of Integrated protection System for Industrial Control System Based on Trusted Computing
Construction of Integrated Protection System for Industrial ...
收藏 引用
2021 International Conference on Intelligent Computing, Automation and Applications, ICAA 2021
作者: Tao, Yuan Hu, Wei Li, Sheng Third Research Institute of Ministry of Public Security Shanghai China National Engineering Laboratory for Key Technology of Classified Information Security Protection Beijing China
Industrial control system requires high availability. In principle, security measures should not adversely affect the basic functions of high availability industrial control system. The method of building a secure and... 详细信息
来源: 评论
Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow
收藏 引用
Chinese Journal of Electronics 2017年 第3期26卷 640-646页
作者: ZHAO Qianqian ZHANG Yuqing ZHANG Guanghua WANG He State Key Laboratory of Integrated Services Networks Xidian University National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing Key Laboratory of IOT Information Security Technology Institute of Information Engineering CAS
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access *** neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key distribu... 详细信息
来源: 评论
A novel image encryption method based on hyperchaotic system and pixel information association
收藏 引用
International Journal of Wireless and Mobile Computing 2018年 第3期15卷 207-214页
作者: Duan, Lijuan Zhang, Dongkui Ning, Zhenhu Xu, Fan Cui, Guoqin Liang, Peng Faculty of Information Technology Beijing University of Technology Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China State Key Laboratory of Digital Multi-Media Chip Technology Vimicro Corporation Beijing100191 China State Information Center National Engineering Laboratory for e-Government Integration and Application Beijing100045 China
In recent years, a variety of image encryption methods based on chaotic systems has been proposed, and has achieved good results. In order to improve the security of image encryption, this paper proposes a new image e... 详细信息
来源: 评论
Learning EEG synchronization patterns for epileptic seizure prediction using bag-of-wave features
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第11期14卷 15557-15572页
作者: Cui, Song Duan, Lijuan Qiao, Yuanhua Xiao, Ying Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China College of Applied Sciences Beijing University of Technology Beijing100124 China
Epileptic seizure prediction has the potential to promote epilepsy care and treatment. However, the seizure prediction accuracy does not satisfy the application requirements. In this paper, a novel framework for seizu... 详细信息
来源: 评论
EEG Source Localization Using Spatio-Temporal Neural Network
收藏 引用
China Communications 2019年 第7期16卷 131-143页
作者: Song Cui Lijuan Duan Bei Gong Yuanhua Qiao Fan Xu Juncheng Chen Changming Wang Faculty of Information Technology Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China College of Applied Sciences Beijing University of Technology Beijing 100124 China The National Clinical Research Center for Mental Disorders & Beijing Key Laboratory of Mental Disorders Beijing Anding Hospital Capital Medical University Beijing 100088 China Advanced Innovation Center for Human Brain Protection Capital Medical University Beijing 100069 China
Source localization of focal electrical activity from scalp electroencephalogram (sEEG) signal is generally modeled as an inverse problem that is highly ill-posed. In this paper, a novel source localization method is ... 详细信息
来源: 评论
A federated sleep staging method based on adaptive re-aggregation and double prototype-contrastive using single-channel electroencephalogram
收藏 引用
engineering Applications of Artificial Intelligence 2025年 156卷
作者: Bian Ma Lijuan Duan Zhaoyang Huang Yuanhua Qiao College of Computer Science Beijing University of Technology Beijing 100124 China Beijing Key Laboratory of Trusted Computing Beijing 100124 China China National Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing 100124 China Department of Neurology Xuanwu Hospital Capital Medical University Beijing 100053 China Beijing Key Laboratory of Neuromodulation Beijing 100053 China School of Mathematics Statistics and Mechanics Beijing University of Technology Beijing 100124 China
The limited availability of sleep data collected by individual institutions poses a significant challenge in developing automatic sleep staging models, especially given that most existing models rely heavily on data-d... 详细信息
来源: 评论