咨询与建议

限定检索结果

文献类型

  • 74 篇 期刊文献
  • 69 篇 会议

馆藏范围

  • 143 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 97 篇 工学
    • 73 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 21 篇 信息与通信工程
    • 14 篇 生物工程
    • 12 篇 电气工程
    • 12 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 7 篇 化学工程与技术
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 土木工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
  • 45 篇 理学
    • 15 篇 数学
    • 14 篇 生物学
    • 13 篇 物理学
    • 8 篇 化学
    • 4 篇 系统科学
    • 4 篇 统计学(可授理学、...
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 13 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 法学
    • 5 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 8 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 5 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 农学

主题

  • 8 篇 privacy
  • 6 篇 authentication
  • 5 篇 deep learning
  • 5 篇 information secu...
  • 4 篇 access control
  • 4 篇 security
  • 4 篇 federated learni...
  • 4 篇 protection
  • 3 篇 android (operati...
  • 3 篇 semantics
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 information syst...
  • 2 篇 object detection
  • 2 篇 scalability
  • 2 篇 reinforcement le...
  • 2 篇 data privacy
  • 2 篇 libraries

机构

  • 19 篇 beijing key labo...
  • 17 篇 faculty of infor...
  • 10 篇 national enginee...
  • 10 篇 beijing key labo...
  • 8 篇 college of compu...
  • 7 篇 institute of inf...
  • 7 篇 school of cyber ...
  • 5 篇 key laboratory o...
  • 5 篇 beijing key labo...
  • 4 篇 guangdong provin...
  • 4 篇 national compute...
  • 4 篇 national enginee...
  • 4 篇 key laboratory o...
  • 4 篇 beijing key labo...
  • 4 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...
  • 3 篇 natl. engineerin...
  • 3 篇 school of inform...
  • 3 篇 beijing national...

作者

  • 18 篇 duan lijuan
  • 7 篇 lijuan duan
  • 7 篇 wei huo
  • 7 篇 qiao yuanhua
  • 6 篇 zhang yuqing
  • 5 篇 yanyan zou
  • 4 篇 gong zhi
  • 3 篇 wang wenjian
  • 3 篇 baoxu liu
  • 3 篇 zhang jianbiao
  • 3 篇 zhan jing
  • 3 篇 zhao jijun
  • 3 篇 ma jin
  • 3 篇 yixian yang
  • 3 篇 yu zhang
  • 3 篇 wen yan
  • 3 篇 huo wei
  • 3 篇 nanyu zhong
  • 3 篇 jianbiao zhang
  • 3 篇 feng nan

语言

  • 138 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=National Engineering Laboratory for Key Technology of Classified Information Security Protection"
143 条 记 录,以下是51-60 订阅
排序:
Towards Privacy-Preserving Cloud Storage:A Blockchain Approach
收藏 引用
Computers, Materials & Continua 2021年 第12期69卷 2903-2916页
作者: Jia-Shun Zhang Gang Xu Xiu-Bo Chen Haseeb Ahmad Xin Liu Wen Liu Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Inner Mongolia University of Science&Technology School of Information EngineeringBaotou014010China State Key Laboratory of Media Convergence and Communication Communication University of China School of Computer Science and Cybersecurity Communication University of China Key Laboratory of Convergent Media and Intelligent Technology Communication University of China Ministry of EducationBeijing102204China
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner thr... 详细信息
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Huiying Zou Jia Duan Xi Liu Wei Ren Tao Li Xianghan Zheng Kim-Kwang Raymond Choo School of Computer Science China University of Geosciences Wuhan China The Third Surveying and Mapping Institute of Hunan Province Hunan Engineering Research Center of Geographic Information Security and Application Hunan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education China State Key Laboratory of Geo-Information Engineering and Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of MNR CASM Beijing China College of Computer and Big Data Fuzhou University School of Information and Intelligent Engineering Sanya College China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio USA
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Gaussian Shading++: Rethinking the Realistic Deployment Challenge of Performance-Lossless Image Watermark for Diffusion Models
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Zijin Zhang, Xin Chen, Kejiang Zeng, Kai Yao, Qiyi Fang, Han Zhang, Weiming Yu, Nenghai University of Science and Technology of China Hefei230026 China Anhui Province Key Laboratory of Digital Security China Department of Information Engineering and Mathematics University of Siena Siena Italy School of Computing National University of Singapore 117417 Singapore
Ethical concerns surrounding copyright protection and inappropriate content generation pose challenges for the practical implementation of diffusion models. One effective solution involves watermarking the generated i... 详细信息
来源: 评论
Unsupervised Pixel-level Crack Detection Based on Generative Adversarial Network  20
Unsupervised Pixel-level Crack Detection Based on Generative...
收藏 引用
5th International Conference on Multimedia Systems and Signal Processing, ICMSSP 2020
作者: Duan, Lijuan Geng, Huiling Pang, Junbiao Zeng, Jun Beijing University of Technology Beijing China Beijing Key Laboratory of Trusted Computing Beijing China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing China
Automatic crack detection from pavement images is an import research field. Meanwhile, crack detection is a challenge task: (1) manual labels are subjective because of low contrast between crack and the surrounding pa... 详细信息
来源: 评论
Spectrum Efficiency Maximization for Cooperative Power Beacon-Enabled Wireless Powered Communication Networks
收藏 引用
China Communications 2021年 第12期18卷 230-251页
作者: Wenjun Xu Wei Chen Yongjian Fan Zhi Zhang Xinxin Shi Key Lab of Universal Wireless Communications Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China Hebei Key Laboratory of Security and Protection Information Sensing and Processing Hebei University of EngineeringHandan 056038China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Telecom Planning&Designing Institute Co. Ltd.Beijing 100048China
We consider a spectrum efficiency(SE)maximization problem for cooperative power beacon-enabled wireless powered communication networks(CPB-WPCNs),where each transmitter harvests en-ergy from multi-antenna power beacon... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
A new dance generation task from start to end  2
A new dance generation task from start to end
收藏 引用
2020 2nd International Conference on Artificial Intelligence Technologies and Application, ICAITA 2020
作者: Xu, Xiao Duan, Lijuan Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Trusted Computing Beijing100124 China Natl. Engineering Laboratory for Critical Technologies of Information Security Classified Protection Beijing100124 China
The dance generation task is an interesting task. The general task is to predict the next dance sequence through a given initial frame, or to convert from music to dance through audio information. However, these works... 详细信息
来源: 评论
Cross-Layer security for Semantic Communications: Metrics and Optimization
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui Nanjing University of Posts and Telecommunications College of Science Nanjing210003 China Nanjing University of Posts and Telecommunications College of Communication and Information Engineering Nanjing210003 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China Tsinghua University Department of Electronic Engineering Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
New Intelligent Sensing Terminal System Architecture of Internet of Things
New Intelligent Sensing Terminal System Architecture of Inte...
收藏 引用
International Conference on Internet of Things, Communication and Intelligent technology, IoTCIT 2022
作者: Zhou, Lidan Li, Jing Yao, Gang Wang, Hongyu Li, Jian Liu, Siyang Nie, Yongjie School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai Minhang District200240 China Wiscom System Co. LTD. Nanjing China State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing400044 China Electric Power Research Institute Yunnan Power Grid Co. Ltd. Yunnan Kunming650217 China Yunnan Key Laboratory of Green Energy Electric Power Measurement Digitalization Control and Protection Yunnan650217 China
In view of the fragmentation of the functions, forms and basic software and hardware of the existing IoT terminals, we propose an IoT intelligent sensing terminal system architecture, in which the intelligent sensing ... 详细信息
来源: 评论
Remote Attestation for Intelligent Electronic Devices in Smart Grid Based on Trusted Level Measurement
收藏 引用
Chinese Journal of Electronics 2020年 第3期29卷 437-446页
作者: WANG Yong LI Jun'e CHEN Xiong LIN Hai YU Fajiang LUO Jianbo Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and Engineering Wuhan University NARI Group Corporation State Grid Electric Power Research Institute NARI Technology Co.Ltd. State Key Laboratory of Smart Grid Protection and Control
To reduce the implementation complexity and excessive overhead caused by remote attestation,we propose a new remote attestation scheme based on trusted level measurement considering the limited system resources of the... 详细信息
来源: 评论