咨询与建议

限定检索结果

文献类型

  • 75 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 73 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 45 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 13 篇 物理学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 18 篇 duan lijuan
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 qiao yuanhua
  • 6 篇 zhang yuqing
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 139 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
144 条 记 录,以下是31-40 订阅
排序:
CPSDBENCH: A LARGE LANGUAGE MODEL EVALUATION BENCHMARK AND BASELINE FOR CHINESE PUBLIC security DOMAIN
arXiv
收藏 引用
arXiv 2024年
作者: Tong, Xin Jin, Bo Lin, Zhi Wang, Binjun Yu, Ting Cheng, Qiang School of Information and Network Security People’s Public Security University of China Beijing China National Engineering Research Center of Classified Protection and Safeguard Technology for Cybersecurity The Third Research Institute of the Ministry of Public Security of China Shanghai China Department of Engineering Physics Tsinghua University China Science and Technology Information Bureau The Ministry of Public Security of China Beijing China The Third Research Institute of the Ministry of Public Security of China Shanghai China
Large Language Models (LLMs) have demonstrated significant potential and effectiveness across multiple application domains. To assess the performance of mainstream LLMs in public security tasks, this study aims to con... 详细信息
来源: 评论
DRL-based Impairment-aware Resource Allocation Algorithm in C + L Band Elastic Optical Networks
DRL-based Impairment-aware Resource Allocation Algorithm in ...
收藏 引用
International Conference on Optical Communications and Networks (ICOCN)
作者: Dan Yan Nan Feng Zhiqun Gu Xiaobo Zuo Shihao Fan Jijun Zhao Hebei Key Laboratory of Security and Protection Information Sensing and Processing Hebei University of Engineering Handan China 54th Institute of China Electronics Technology Corporation Shijiazhuang China Hebei Key Laboratory of Photonic Information Technology and Application(PITA) Shijiazhuang China State Key Laboratory of Information Photonics and Optical Communication Beijing University of Posts and Telecommunications Beijing China
We propose an impairment-aware resource allocation algorithm for C+L-band elastic optical networks based on deep reinforcement learning (DRL). Simulation results show that the proposed algorithm effectively reduces th... 详细信息
来源: 评论
Energy-efficient and Privacy-preserving Edge Intelligence for 6G-Empowered Intelligent Transportation Systems
收藏 引用
IEEE Network 2025年
作者: Zhu, Chenlu Fan, Xiaoxuan Deng, Xianjun Xiao, Ziheng Guo, Tingting Liu, Shenghao Sun, Jiaqi Park, Jong Hyuk Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Wuhan Kedao Geographic Information Engineering Co. Wuhan China Department of Computer Science and Engineering Seoul National University of Science and Technology Seoul Korea Republic of
6G-empowered Intelligent Transportation Systems (ITS) generate large amounts of data through millions of devices and sensors at the terminal and network edge. Edge intelligence advances the frontier of data-driven art... 详细信息
来源: 评论
Underwater Gas Leakage Flow Detection and Classification Based on Multibeam Forward-Looking Sonar
收藏 引用
哈尔滨工程大学学报(英文版) 2024年 第3期23卷 674-687页
作者: Yuanju Cao Chao Xu Jianghui Li Tian Zhou Longyue Lin Baowei Chen Southampton Ocean Engineering Joint Institute Harbin Engineering UniversityHarbin 150001China College of Underwater Acoustic Engineering Harbin Engineering UniversityHarbin 150001China National Key Laboratory of Underwater Acoustic Technology Harbin Engineering UniversityHarbin 150001China Key Laboratory of Marine Information Acquisition and Security(Harbin Engineering University) Ministry of Industry and Information TechnologyHarbin 150001China State Key Laboratory of Marine Environmental Science College of Ocean and Earth SciencesXiamen UniversityXiamen 361102China
The risk of gas leakage due to geological flaws in offshore carbon capture, utilization, and storage, as well as leakage from underwater oil or gas pipelines, highlights the need for underwater gas leakage monitoring ... 详细信息
来源: 评论
A Novel Scheme to Reduce the ONU's DSP Complexity for IMDD-OFDMA-PON  20
A Novel Scheme to Reduce the ONU's DSP Complexity for IMDD-O...
收藏 引用
20th International Conference on Optical Communications and Networks, ICOCN 2022
作者: Lian, Bin Feng, Nan Wei, Zhongcheng School of Water Conservancy and Hydroelectric Power Hebei University of Engineering Handan056038 China Hebei University of Engineering Hebei Key Laboratory of Security and Protection Information Sensing and Processing Handan056038 China 54th Research Institute of Cetc Shijiazhuang050081 China Hebei Key Laboratory of Photonic Information Technology and Application Shijiazhuang050081 China School of Information and Electrical Engineering Hebei University of Engineering Handan056038 China
The orthogonal frequency division multiplexing passive optical network (OFDM-PON) is one of the significant topics for the next generation PON technology, and how to minimize the size of DSP processing and the number ... 详细信息
来源: 评论
ACETest: Automated Constraint Extraction for Testing Deep Learning Operators
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Jingyi Xiao, Yang Li, Yuekang Li, Yeting Yu, Dongsong Yu, Chendong Su, Hui Chen, Yufeng Huo, Wei Institute of Information Engineering CAS School of Cyber Security UCAS Beijing China University of New South Wales Sydney Australia Zhongguancun Laboratory Beijing China Key Laboratory of Network Assessment Technology CAS China Beijing Key Laboratory of Network Security and Protection Technology China
Deep learning (DL) applications are prevalent nowadays as they can help with multiple tasks. DL libraries are essential for building DL applications. Furthermore, DL operators are the important building blocks of the ... 详细信息
来源: 评论
Sherlock on specs: building LTE conformance tests through automated reasoning  23
Sherlock on specs: building LTE conformance tests through au...
收藏 引用
Proceedings of the 32nd USENIX Conference on security Symposium
作者: Yi Chen Di Tang Yepeng Yao Mingming Zha XiaoFeng Wang Xiaozhong Liu Haixu Tang Baoxu Liu Indiana University Bloomington CAS-KLONAT Key Laboratory of Network Assessment Technology CAS BKLONSPT Beijing Key Laboratory of Network Security and Protection Technology Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Worcester Polytechnic Institute
Conformance tests are critical for finding security weaknesses in carrier network systems. However, building a conformance test procedure from specifications is challenging, as indicated by the slow progress made by t...
来源: 评论
Isrs Impact-Reduced Routing, Modulation, Band, and Spectrum Allocation Algorithm in C+L-Bands Elastic Optical Networks
SSRN
收藏 引用
SSRN 2023年
作者: Shen, Lingfei Feng, Nan Liu, Yunxuan Yan, Dan Lv, Jingjing Hu, Jinhua Ren, Danping Zhao, Jijun Hebei Key Laboratory of Security and Protection Information Sensing and Processing The School of Information and Electrical Engineering Hebei University of Engineering Handan056038 China Hebei Key Laboratory of Photonic Information Technology and Application The 54th research Institute of CETC Shijiazhuang050081 China
C+L-bands elastic optical networks (EONs) cope with growing traffic demands by leveraging the C and L bands of deployed optical fibers. However, the inter-band stimulated Raman scattering (ISRS) becomes more serious a... 详细信息
来源: 评论
Online prediction of EEG based on KRLST algorithm
收藏 引用
High technology Letters 2021年 第4期27卷 357-364页
作者: Lian Zhaoyang Duan Lijuan Chen Juncheng Qiao Yuanhua Miao Jun Faculty of Information Technology Beijing University of TechnologyBeijing 100124P.R.China Beijing Key Laboratory of Trusted Computing Beijing 100124P.R.China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing 100124P.R.China Faculty of Sciences Beijing University of TechnologyBeijing 100124P.R.China Beijing Key Laboratory of Internet Culture and Digital Dissemination Research School of Computer ScienceBeijing Information Science and Technology UniversityBeijing 100101P.R.China
Kernel adaptive algorithm is an extension of adaptive algorithm in nonlinear,and widely used in the field of non-stationary signal *** the distribution of classic data sets seems relatively regular and simple in time ... 详细信息
来源: 评论
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UE...
收藏 引用
IEEE Symposium on security and Privacy
作者: Jiawei Yin Menghao Li Yuekang Li Yong Yu Boru Lin Yanyan Zou Yang Liu Wei Huo Jingling Xue Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology Nanyang Technological University UNSW Sydney
System Management Mode (SMM) is a secure operation mode for x86 processors supported by Unified Extensible Firmware Interface (UEFI) firmware. SMM is designed to provide a secure execution environment to access highly...
来源: 评论