咨询与建议

限定检索结果

文献类型

  • 74 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 143 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 97 篇 工学
    • 73 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 45 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 13 篇 物理学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 18 篇 duan lijuan
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 qiao yuanhua
  • 6 篇 zhang yuqing
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 138 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
143 条 记 录,以下是41-50 订阅
排序:
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UE...
收藏 引用
IEEE Symposium on security and Privacy
作者: Jiawei Yin Menghao Li Yuekang Li Yong Yu Boru Lin Yanyan Zou Yang Liu Wei Huo Jingling Xue Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing Key Laboratory of Network Assessment Technology Chinese Academy of Sciences Beijing Key Laboratory of Network Security and Protection Technology Nanyang Technological University UNSW Sydney
System Management Mode (SMM) is a secure operation mode for x86 processors supported by Unified Extensible Firmware Interface (UEFI) firmware. SMM is designed to provide a secure execution environment to access highly...
来源: 评论
A Survey of Deep Visual Cross-Domain Few-Shot Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Wenjian Duan, Lijuan Wang, Yuxi Fan, Junsong Gong, Zhi Zhang, Zhaoxiang Faculty of Information Technology Beijing University of Technology China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China Centre for Artificial Intelligence and Robotics HKISI_CAS Institute of Automation Chinese Academy of Sciences [NLPR CASIA UCAS China
Few-Shot transfer learning has become a major focus of research as it allows recognition of new classes with limited labeled data. While it is assumed that train and test data have the same data distribution, this is ... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
A Digital Interface-Based Digital Rights Management Scheme for Digital Cinema
收藏 引用
Chinese Journal of Electronics 2023年 第3期19卷 481-485页
作者: Kefeng Fan Zhaofeng Ma Yixian Yang Xinxin Niu State Key Laboratory of Networking and Switching Technology Information Security Center Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China
Digital rights management (DRM) is indispensable to prevent various kinds of illegal content usage. In this paper, we present a Digital interface-based DRM scheme (DI-DRM) for digital cinema, which can provide a new m... 详细信息
来源: 评论
A Survey of Deep Models for Cross-Domain Few-Shot Visuallearning
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Wenjian Duan, Lijuan Wang, Yuxi Fan, Junsong Gong, Zhi Zhang, Zhaoxiang Faculty of Information Technology Beijing University of Technology China Beijing Key Laboratory of Trusted Computing Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing China Centre for Artificial Intelligence and Robotics HKISI CAS Hong Kong Institute of Automation Chinese Academy of Sciences NLPR CASIA UCAS China
Few-Shot transfer learning uses limited labeled data to recognise the new classes. Current researches assume that train and test data have the same data distribution. But this setting is strict and difficult to guaran... 详细信息
来源: 评论
Classification of epilepsy period based on combination feature extraction methods and spiking swarm intelligent optimization algorithm
Classification of epilepsy period based on combination featu...
收藏 引用
作者: Duan, Lijuan Lian, Zhaoyang Chen, Juncheng Qiao, Yuanhua Miao, Jun Li, Mingai Faculty of Information Technology Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing University of Technology Beijing China Applied Sciences Beijing University of Technology Beijing China School of Computer Science Beijing Information Science and Technology University Beijing China
Epilepsy seriously damages the physical and mental health of patients. Detection of epileptic EEG signals in different periods can help doctors diagnose the disease. The change of frequency components during epilepsy ... 详细信息
来源: 评论
BPN: Bidirectional Path Network for Instance Segmentation  1st
BPN: Bidirectional Path Network for Instance Segmentation
收藏 引用
1st CAAI International Conference on Artificial Intelligence, CICAI 2021
作者: Xu, Fan Duan, Lijuan Qiao, Yuanhua Faculty of Information Technology Beijing University of Technology Beijing China Peng Cheng Laboratory Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing University of Technology Beijing China National Engineering Laboratory for Key Technologies of Information Security Level Protection Beijing University of Technology Beijing China College of Mathematics and Physics Beijing University of Technology Beijing China
The feature pyramid network (FPN) has achieved impressive results in the field of object detection and instance segmentation by aggregating features of different scales, especially the detection of small objects. Howe... 详细信息
来源: 评论
Privacy-Preserving Federated Learning with Homomorphic Encryption and Sparse Compression
Privacy-Preserving Federated Learning with Homomorphic Encry...
收藏 引用
Computer Communication and Artificial Intelligence (CCAI), International Conference on
作者: Wentao Yang Yang Bai Yutang Rao Hongyan Wu Gaojie Xing Yimin Zhou School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology Chengdu China National Engineering Research Center for Advanced Microprocessor Technology Industrial Control and Security Chengdu China Energy Equipment Cyber Security Key Laboratory of Sichuan Province Chengdu China
Federated learning attempts to train a machine learning algorithm on several local datasets stored on local nodes without needing direct data sample exchange to avoid data leaking. However, recent research has shown t... 详细信息
来源: 评论
An efficient method for analyzing widget intent of android system  2021
An efficient method for analyzing widget intent of android s...
收藏 引用
9th International Conference on Communications and Broadband Networking, ICCBN 2021
作者: Qi, Chunhao Shao, Shuai Guo, Yanhui Peng, Junhao Xu, Guosheng Beijing University of Posts and Telecommunications National Engineering Laboratory of Mobile Network Security Beijing China China Information Technology Security Evaluation Center Beijing China School of Math and Information Science Guangdong Prov. Key Laboratory Co-sponsored by Province and City of Information Security Technology Guangzhou University Guangzhou China
With the improvement of the status of mobile phones and other mobile terminals in life, the privacy protection of mobile phones is still a big problem. Aiming at the Android system, the mobile terminal operating syste... 详细信息
来源: 评论
Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks
收藏 引用
Journal of Modern Power Systems and Clean Energy 2021年 第3期9卷 477-484页
作者: Ming Ni Manli Li Jun’e Li Yingjun Wu Qi Wang the NARI Group Corporation(State Grid Electric Power Research Institute) NARI Technology Co.Ltd.and the State Key Laboratory of Smart Grid Protection and ControlNanjing 211106China the School of Cyber Science and Engineering Wuhan Universityand the Key Laboratory of Aerospace Information Security and Trusted Computing of the Ministry of EducationWuhan 430072China the College of Energy and Electrical Engineering Hohai UniversityNanjing 211100China the School of Electrical Engineering Southeast UniversityNanjing 210096China
Due to the tight coupling between the cyber and physical sides of a cyber-physical power system(CPPS),the safe and reliable operation of CPPSs is being increasingly impacted by cyber *** situation poses a challenge to... 详细信息
来源: 评论