咨询与建议

限定检索结果

文献类型

  • 75 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 73 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 45 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 13 篇 物理学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 18 篇 duan lijuan
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 qiao yuanhua
  • 6 篇 zhang yuqing
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 139 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
144 条 记 录,以下是21-30 订阅
排序:
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
PPA: Preference Profiling Attack Against Federated Learning  30
PPA: Preference Profiling Attack Against Federated Learning
收藏 引用
30th Annual Network and Distributed System security Symposium, NDSS 2023
作者: Zhou, Chunyi Gao, Yansong Fu, Anmin Chen, Kai Dai, Zhiyang Zhang, Zhi Xue, Minhui Zhang, Yuqing School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Science China Data61 CSIRO Syndey Australia National Computer Network Intrusion Protection Center University of Chinese Academy of Science China
—Federated learning (FL) trains a global model across a number of decentralized users, each with a local dataset. Compared to traditional centralized learning, FL does not require direct access to local datasets and ...
来源: 评论
Spatial-temporal changes and driving factors of eco-environmental quality in the Three-North region of China
收藏 引用
Journal of Arid Land 2023年 第3期15卷 231-252页
作者: LONG Yi JIANG Fugen DENG Muli WANG Tianhong SUN Hua Research Center of Forestry Remote Sensing&Information Engineering Central South University of Forestry and TechnologyChangsha 410004China Key Laboratory of Forestry Remote Sensing Based Big Data&Ecological Security for Hunan Province Changsha 410004China Key Laboratory of National Forestry&Grassland Administration on Forest Resources Management and Monitoring in Southern Area Changsha 410004China
Eco-environmental quality is a measure of the suitability of the ecological environment for human survival and socioeconomic *** the spatial-temporal distribution and variation trend of eco-environmental quality is es... 详细信息
来源: 评论
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware
Semantic-Enhanced Static Vulnerability Detection in Baseband...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Yiming Liu Cen Zhang Feng Li Yeting Li Jianhua Zhou Jian Wang Lanlan Zhan Yang Liu Wei Huo Institute of Information Engineering CAS School of Cyber Security UCAS Beijing China Key Laboratory of Network Assessment Technology CAS Beijing Key Laboratory of Network Security and Protection Technology Nanyang Technological University Singapore
Cellular network is the infrastructure of mobile communication. Baseband firmware, which carries the implementation of cellular network, has critical security impact on its vulnerabilities. To handle the inherent comp... 详细信息
来源: 评论
Leveraging semantic relations in code and data to enhance taint analysis of embedded systems  24
Leveraging semantic relations in code and data to enhance ta...
收藏 引用
Proceedings of the 33rd USENIX Conference on security Symposium
作者: Jiaxu Zhao Yuekang Li Yanyan Zou Zhaohui Liang Yang Xiao Yeting Li Bingwei Peng Nanyu Zhong Xinyi Wang Wei Wang Wei Huo Institute of Information Engineering Chinese Academy of Sciences China and School of Cyber Security University of Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China University of New South Wales Australia Institute of Information Engineering Chinese Academy of Sciences China and Key Laboratory of Network Assessment Technology Chinese Academy of Sciences China and Beijing Key Laboratory of Network Security and Protection Technology China
IoT devices have significantly impacted our daily lives, and detecting vulnerabilities in embedded systems early on is critical for ensuring their security. Among the existing vulnerability detection techniques for em...
来源: 评论
ESRFuzzer:an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
收藏 引用
Cybersecurity 2021年 第1期4卷 364-385页
作者: Yu Zhang Wei Huo Kunpeng Jian Ji Shi Longquan Liu Yanyan Zou Chao Zhang Baoxu Liu Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina Key Laboratory of Network Assessment Technology Chinese Academy of SciencesBeijingChina Beijing Key Laboratory of Network Security and Protection Technology BeijingChina Institute for Network Science and Cyberspace Tsinghua UniversityBeijingChina Beijing National Research Center for Information Science and Technology BeijingChina
SOHO(small office/home office)routers provide services for end devices to connect to the Internet,playing an important role in ***,security vulnerabilities pervasively exist in these routers,especially in the web serv... 详细信息
来源: 评论
A Web Attack Detection Method Based on DistilBERT and Feature Fusion for Power Micro-Application Server  2
A Web Attack Detection Method Based on DistilBERT and Featur...
收藏 引用
2nd International Conference on Advanced Electronics, Electrical and Green Energy, AEEGE 2023
作者: Nige, Li Lu, Chen Lei, Zhao Zhenning, Teng Zhiqiang, Wang Yiyang, Shao Xiaolin, Gui State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology State Grid Smart Grid Research Institute Co.Ltd. Nanjing China Xi'an Jiaotong University Faculty of Electronic and Information Engineering Shaanxi Province Key Laboratory of Computer Network Xi'an China
The widespread use of power micro-applications has significantly expanded the attack surface of their server side, thus increasing the risk of vulnerability attacks such as SQL injection, XSS, and CRLF injection. To e... 详细信息
来源: 评论
Adaptive constrained population extremal optimisation-based robust proportional-integral-derivation frequency control method for an islanded microgrid
收藏 引用
IET Cyber-Systems and Robotics 2021年 第3期3卷 210-227页
作者: Kang-Di Lu Guo-Qiang Zeng Wuneng Zhou College of Information Sciences and Technology Donghua UniversityShanghaiChina College of Cyber Security and the National-Local Joint Engineering Research Center of Network Security Detection and Protection Technology Jinan UniversityGuangzhouChina National-Local Joint Engineering Laboratory of Digitalise Electrical Design Technology Wenzhou UniversityWenzhouChina
The expected penetration of renewable sources is driving the islanded microgrid towards uncertainties,which have highly influence the reliability and complexities of frequency *** alleviate the influence caused by loa... 详细信息
来源: 评论
Analysis of EEG in unipolar and bipolar depression based on phase synchronization  4
Analysis of EEG in unipolar and bipolar depression based on ...
收藏 引用
4th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2021
作者: Duan, Lijuan Liu, Hongli Wang, Changming Qiao, Yuanhua Beijing University of Technology Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China Capital Medical University Beijing Xuanwu Hospital Beijing China
Resting-state EEG studies have shown significant differences in functional connectivity networks between patients with unipolar and bipolar depression as well as healthy controls (HC). However, the present study has p... 详细信息
来源: 评论
An automated method with anchor-free detection and U-shaped segmentation for nuclei instance segmentation  2
An automated method with anchor-free detection and U-shaped ...
收藏 引用
2nd ACM International Conference on Multimedia in Asia, MMAsia 2020
作者: Feng, Xuan Duan, Lijuan Chen, Jie Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China Natl. Engineering Laboratory of Critical Technologies of Information Security Classified Protection Beijing100124 China Peng Cheng Laboratory Shenzhen518055 China
Nuclei segmentation plays an important role in cancer diagnosis. Automated methods for digital pathology become popular due to the developments of deep learning and neural networks. However, this task still faces chal... 详细信息
来源: 评论