咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 7 篇 计算机科学与技术...
    • 6 篇 网络空间安全
    • 4 篇 软件工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 1 篇 机械工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
    • 1 篇 兽医学

主题

  • 1 篇 绩效评价
  • 1 篇 国有资产
  • 1 篇 安全防护
  • 1 篇 行政事业单位
  • 1 篇 reinforcement le...
  • 1 篇 人格
  • 1 篇 autonomous drivi...
  • 1 篇 detection
  • 1 篇 social robot det...
  • 1 篇 ddos attack
  • 1 篇 人格脆弱性
  • 1 篇 蠕虫
  • 1 篇 无线传感器网络
  • 1 篇 moving target de...
  • 1 篇 traffic sign det...
  • 1 篇 temporal correla...
  • 1 篇 特征优化
  • 1 篇 smartphonemalwar...
  • 1 篇 核函数学习
  • 1 篇 层次分析法

机构

  • 5 篇 school of cybers...
  • 4 篇 北京邮电大学
  • 2 篇 faculty of infor...
  • 1 篇 福建省人畜寄生与...
  • 1 篇 北京交通大学
  • 1 篇 informationsecur...
  • 1 篇 fan gongxiu hono...
  • 1 篇 school of comput...
  • 1 篇 college of compu...
  • 1 篇 key laboratory o...
  • 1 篇 北京电子研究所
  • 1 篇 college of compu...
  • 1 篇 防灾科技学院
  • 1 篇 龙岩学院
  • 1 篇 computer science...
  • 1 篇 广东省财政科学研...
  • 1 篇 school of comput...
  • 1 篇 computer science...
  • 1 篇 people'spublicse...
  • 1 篇 school of comput...

作者

  • 6 篇 xiujuan wang
  • 6 篇 kangfeng zheng
  • 5 篇 郑康锋
  • 3 篇 bin wu
  • 3 篇 杨义先
  • 2 篇 伍淳华
  • 2 篇 zheng kangfeng
  • 2 篇 王秀娟
  • 2 篇 chunhua wu
  • 1 篇 zhang dongmei
  • 1 篇 陈星星
  • 1 篇 郭世泽
  • 1 篇 wu bin
  • 1 篇 huan zhang
  • 1 篇 jiayue zhang
  • 1 篇 江康峰
  • 1 篇 lin xing
  • 1 篇 zha xuan
  • 1 篇 chenxi zhang
  • 1 篇 shoushan luo

语言

  • 10 篇 英文
  • 7 篇 中文
检索条件"作者=ZHENG Kangfeng"
17 条 记 录,以下是1-10 订阅
排序:
Intrusion Detection Algorithm Based on Density,Cluster Centers,and Nearest Neighbors
收藏 引用
China Communications 2016年 第7期13卷 24-31页
作者: Xiujuan Wang Chenxi Zhang kangfeng zheng Computer Sciences Beijing University of Technology Computer Science And Technology Beijing University of Posts and Telecommunications
Intrusion detection aims to detect intrusion behavior and serves as a complement to *** can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic *** intrusion... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New Network Coding Mechanism Balancing Coding Opportunities, Energy and QoS in WSNs
收藏 引用
China Communications 2014年 第6期11卷 108-118页
作者: zheng kangfeng WANG Xiujuan ZHA Xuan XIAO Huan School of Computer Science Beijing University of Posts and Telecommunications School of Computer Science Beijing University of Technology
A new Network Coding mechanism in WSNs(Wireless Sensor Networks), which is named COEQ and aims at balancing coding opportunities, energy and QoS, is proposed and analyzed. Implemented on the basis of traditional AODV ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Semi-GSGCN: Social Robot Detection Research with Graph Neural Network
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 617-638页
作者: Xiujuan Wang Qianqian zheng kangfeng zheng Yi Sui Jiayue Zhang Information Technology Institute Beijing University of TechnologyBeijing100124China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China
Malicious social robots are the disseminators of malicious information on social networks,which seriously affect information security and network *** and reliable classification of social robots is crucial for detecti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
C2Net-YOLOv5: A Bidirectional Res2Net-Based Traffic Sign Detection Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第11期77卷 1949-1965页
作者: Xiujuan Wang Yiqi Tian kangfeng zheng Chutong Liu Faculty of Information Technology Beijing University of TechnologyBeijing100124China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100048China Fan Gongxiu Honors College Beijing University of TechnologyBeijing100124China
Rapid advancement of intelligent transportation systems(ITS)and autonomous driving(AD)have shown the importance of accurate and efficient detection of traffic ***,certain drawbacks,such as balancing accuracy and real-... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Smartphone Malware Detection Model Based on Artificial Immune System
收藏 引用
China Communications 2014年 第A1期11卷 86-92页
作者: WU Bin LU Tianliang zheng kangfeng ZHANG Dongmei LIN Xing InformationSecurityLaboratory NationalDisasterRecoveryTechnologyEngineeringLaboratoryBeijingUniversityofPostsandTelecommunicationsBeijing100876P.R.China People'sPublicSecurityUniversityofChina Beijing100038P.R.China
In order to solve the problem that me traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware detection model (SP-MDM) based on artif... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Strategy Selection for Moving Target Defense in Incomplete Information Game
收藏 引用
Computers, Materials & Continua 2020年 第2期62卷 763-786页
作者: Huan Zhang kangfeng zheng Xiujuan Wang Shoushan Luo Bin Wu School of CyberSpace Security Beijing University of Posts and TelecommunicationsBeijing100088China College of Computer Sciences Beijing University of TechnologyBeijing100124China
As a core component of the network,web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by *** the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Efficient User Identity Linkage Based on Aligned Multimodal Features and Temporal Correlation
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 251-270页
作者: Jiaqi Gao kangfeng zheng Xiujuan Wang Chunhua Wu Bin Wu School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China Faculty of Information Technology Beijing University of TechnologyBeijing100124China
User identity linkage(UIL)refers to identifying user accounts belonging to the same identity across different social media *** of the current research is based on text analysis,which fails to fully explore the rich im... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Social Engineering Attack-Defense Strategies Based on Reinforcement Learning
收藏 引用
Computer Systems Science & Engineering 2023年 第11期47卷 2153-2170页
作者: Rundong Yang kangfeng zheng Xiujuan Wang Bin Wu Chunhua Wu School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China School of Computer Science Beijing University of TechnologyBeijing100124China
Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity,as human vulnerabilities are often the weakest link in the entire *** vulnerabilities are becoming increasingly suscept... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Efficient Algorithm for Indoor Positioning in WLAN Environments using KNN Algorithm and Pass-Loss Model
An Efficient Algorithm for Indoor Positioning in WLAN Enviro...
收藏 引用
2011年全国通信安全学术会议
作者: Liangzi Ding,kangfeng zheng Information Security Center,Beijing University of Posts and Telecommunications Beijing 100876,China
<正>A new approach has been presented to increase the location estimation accuracy in WLAN *** Location fingerprint method base on KNN algorithm,optimal parameter has not been theoretically *** studies have shown th... 详细信息
来源: cnki会议 评论
网络空间安全中的人格研究综述
收藏 引用
电子与信息学报 2020年 第12期42卷 2827-2840页
作者: 吴桐 郑康锋 伍淳华 王秀娟 郑赫慈 北京邮电大学网络空间安全学院 北京100876 北京工业大学信息学部 北京100124
网络空间是所有信息系统的集合,是人类赖以生存的信息环境。网络空间安全已经从物理域、信息域安全扩展到以人为中心的认知域和社会域安全,对人的安全研究已经成为了网络空间安全的必然趋势。人是复杂多变的综合体,而人格作为人的稳定... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论