咨询与建议

限定检索结果

文献类型

  • 71 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 75 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 73 篇 工学
    • 33 篇 计算机科学与技术...
    • 15 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 12 篇 机械工程
    • 12 篇 仪器科学与技术
    • 11 篇 软件工程
    • 9 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 5 篇 光学工程
    • 2 篇 交通运输工程
    • 1 篇 测绘科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 地质资源与地质工...
    • 1 篇 航空宇航科学与技...
    • 1 篇 农业工程
    • 1 篇 林业工程
    • 1 篇 安全科学与工程
  • 9 篇 理学
    • 4 篇 物理学
    • 2 篇 系统科学
    • 1 篇 数学
    • 1 篇 地理学
    • 1 篇 大气科学
  • 9 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 5 篇 security
  • 5 篇 blockchain
  • 4 篇 internet of thin...
  • 3 篇 attacks
  • 3 篇 learning
  • 3 篇 information secu...
  • 3 篇 encryption
  • 3 篇 privacy
  • 2 篇 image steganogra...
  • 2 篇 information
  • 2 篇 migration
  • 2 篇 wavelet
  • 2 篇 support vector m...
  • 2 篇 defense
  • 2 篇 cloud
  • 2 篇 quantum
  • 2 篇 machine learning
  • 2 篇 intrusion
  • 2 篇 federated learni...
  • 2 篇 vulnerabilities

机构

  • 2 篇 state key labora...
  • 2 篇 china informatio...
  • 2 篇 information syst...
  • 2 篇 department of cy...
  • 2 篇 china informatio...
  • 1 篇 department of au...
  • 1 篇 national mobile ...
  • 1 篇 beijing national...
  • 1 篇 school of electr...
  • 1 篇 cse center for i...
  • 1 篇 school of applie...
  • 1 篇 zhongshan pool n...
  • 1 篇 department of in...
  • 1 篇 icnlab school of...
  • 1 篇 key laboratory o...
  • 1 篇 guangxi key labo...
  • 1 篇 engineering arch...
  • 1 篇 department of ci...
  • 1 篇 canadian institu...
  • 1 篇 college of scien...

作者

  • 3 篇 limin pan
  • 3 篇 senlin luo
  • 2 篇 yingjie tian
  • 2 篇 hong-chao hu
  • 2 篇 ghulam mohiuddin
  • 2 篇 sofía m.lópez ba...
  • 2 篇 tie jun cui
  • 2 篇 dan tao
  • 2 篇 宋好好
  • 2 篇 yongjun ren
  • 2 篇 zhaowen lin
  • 2 篇 guo-zhen cheng
  • 2 篇 yong wang
  • 1 篇 金良安
  • 1 篇 huafang liu
  • 1 篇 田斌
  • 1 篇 yuming zhang
  • 1 篇 dandung novianto
  • 1 篇 yong peng
  • 1 篇 guo-qiang zeng

语言

  • 66 篇 英文
  • 9 篇 中文
检索条件"机构=Information System and Security&Countermeasures Experimental Center"
75 条 记 录,以下是1-10 订阅
排序:
Chinese Named Entity Recognition with Character-Level BLSTM and Soft Attention Model
收藏 引用
Journal of Beijing Institute of Technology 2020年 第1期29卷 60-71页
作者: Jize Yin Senlin Luo Zhouting Wu Limin Pan information system and security&countermeasures experimental center Beijing Institute of TechnologyBeijing 100081China
Unlike named entity recognition(NER)for English,the absence of word boundaries reduces the final accuracy for Chinese *** avoid accumulated error introduced by word segmentation,a deep model extracting character-level... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
DSP-TMM:A Robust Cluster Analysis Method Based on Diversity Self-Paced T-Mixture Model
收藏 引用
Journal of Beijing Institute of Technology 2020年 第4期29卷 531-543页
作者: Limin Pan Xiaonan Qin Senlin Luo information system and security&countermeasures experimental center Beijing Institute of TechnologyBeijing 100081China
In order to implement the robust cluster analysis,solve the problem that the outliers in the data will have a serious disturbance to the probability density parameter estimation,and therefore affect the accuracy of cl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A rapid audio event detection method by adopting 2D-Haar acoustic super feature vector
收藏 引用
Chinese Journal of Acoustics 2015年 第2期34卷 186-202页
作者: L Ying LUO Senlin GAO Xiaofang XIE Erman PAN Limin information system and security countermeasures experimental center Beijing Institute of Technology
For accuracy and rapidity of audio event detection in the mass-data audio pro- cessing tasks, a generic method of rapidly recognizing audio event based on 2D-Haar acoustic super feature vector and AdaBoost is proposed... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Byte-Level Function-Associated Method for Malware Detection
收藏 引用
Computer systems Science & Engineering 2023年 第7期46卷 719-734页
作者: Jingwei Hao Senlin Luo Limin Pan information system&security and countermeasures Experiments center Beijing Institute of TechnologyBeijing100081China
The byte stream is widely used in malware detection due to its independence of reverse ***,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignores the byte funct... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Image Fusion Scheme Based on Nonsubsampled Contourlet and Block-Based Cosine Transform
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2012年 第1期17卷 8-12页
作者: 宋好好 陆臻 Quality Supervision and Testing center of security Products for Computer information system Ministry of Public Security
A kind of nonsubsampled contourlet and block-based cosine transform(NSCBCT)is developed,and its application in image fusion is studied in this *** construction of filtering banks is based on the nonsubsampled contourl... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The Machine Learning Ensemble for Analyzing Internet of Things Networks:Botnet Detection and Device Identification
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第11期141卷 1495-1518页
作者: Seung-Ju Han Seong-Su Yoon Ieck-Chae Euom system security Research center Chonnam National UniversityGwangju61186Republic of Korea
The rapid proliferation of Internet of Things(IoT)technology has facilitated automation across various ***,this advancement has also resulted in a notable surge in cyberattacks,notably *** a result,research on network... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Reversible Data Hiding Algorithm Based on Image Camouflage and Bit-Plane Compression
收藏 引用
Computers, Materials & Continua 2021年 第8期68卷 2634-2650页
作者: Jianyi Liu Ru Zhang Jing Li Lei Guan Cheng Jie Jiaping Gui School of Cyberspace security Beijing University of Posts and TelecommunicationsBeijing100876China Network security Monitoring center State Grid Information&Telecommunication BranchBeijing100761China School of Electrical Engineering Tsinghua UniversityBeijing100091China Data Science and system security Department NEC Labs AmericaPrinceton08540America
Reversible data hiding in encrypted image(RDHEI)is a widely used technique for privacy protection,which has been developed in many applications that require high confidentiality,authentication and *** RDHEI methods do... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Semi-Fragile Wavelet Transform Watermarking Scheme for Content Authentication of Images
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2009年 第5期14卷 569-573页
作者: 宋好好 张艳 邹春明 Ministry of Public security Quality Supervision and Testing center of security Products for Computer information system
A novel semi-fragile watermarking scheme for the content authentication of images using wavelet transform(WT) is presented in this *** is tolerant to the embedded wavelet image compression methods based on WT such as ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SwordDTA: A Dynamic Taint Analysis Tool for Software Vulnerability Detection
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第1期21卷 10-20页
作者: CAI Jun ZOU Peng MA Jinxin HE Jun Science and Technology on Complex Electronic system Simulation Laboratory Academy of Equipment Beijing 101416China China information Technology security Evaluation center Beijing 100085 China
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Enhancing security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi
收藏 引用
Chinese Journal of Electronics 2018年 第3期27卷 625-633页
作者: LIU Dong CHEN Jing DU Ruiying ZHANG Huanguo Key Laboratory of Aerospace information security and the Trusted Computing Ministry of Education School of ComputerWuhan University Science and Technology on Communication security Laboratory North Automatic Control Technique Research Institute Collaborative Innovation center of Geospatial Technology
Recently several reduced-operation two Factor authentication(2FA) methods have been proposed to improve the usability of traditional 2FA. The existing works cannot protect the user’s password from online guessing att... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论