期刊文献+
共找到155篇文章
< 1 2 8 >
每页显示 20 50 100
Max-Min Security Rate Optimization in STAR-RIS Aided Secure MIMO Systems
1
作者 HUANG Jinhao MIAO Ling +1 位作者 SUO Long ZHOU Wen 《电讯技术》 北大核心 2025年第10期1657-1664,共8页
The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-inpu... The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems. 展开更多
关键词 multiple-input multiple-output(MIMO) reflecting reconfigurable intelligent surface(STAR-RIS) particle swarm optimization(PSO) max-min security rate optimization
在线阅读 下载PDF
武汉大学科研成果被USENIX Security 2025录用
2
作者 《信息网络安全》 北大核心 2025年第8期1327-1327,共1页
近日,武汉大学国家网络安全学院2023级硕士研究生闫楠作为第一作者撰写的论文被第34届USENIX安全研讨会(The34th USENIX Security Symposium 2025)录用。论文题目为“Embed X:Embedding-Based Cross-Trigger Backdoor Attack Against La... 近日,武汉大学国家网络安全学院2023级硕士研究生闫楠作为第一作者撰写的论文被第34届USENIX安全研讨会(The34th USENIX Security Symposium 2025)录用。论文题目为“Embed X:Embedding-Based Cross-Trigger Backdoor Attack Against Large Language Models”(《Embed X:基于嵌入的跨触发器大语言模型后门攻击》),指导老师为国家网络安全学院副研究员李雨晴(通信作者)、教授陈晶(通信作者)、副教授何琨。华中科技大学副教授王雄、香港科技大学教授李波参与合作。 展开更多
关键词 闫楠 USENIX security 2025
在线阅读 下载PDF
北京邮电大学网络空间安全学院本科生在USENIX Security Symposium发表两篇学术论文
3
《信息网络安全》 北大核心 2025年第3期508-508,共1页
近日,北京邮电大学网络空间安全学院郝杰副教授、杨义先教授团队两项研究成果被第34届USENIX Security Symposium (USENIX Security 2025)全文接收,2篇论文的第一作者分别为网络空间安全学院2021级本科生张志胜和2022级本科生金伟飞。US... 近日,北京邮电大学网络空间安全学院郝杰副教授、杨义先教授团队两项研究成果被第34届USENIX Security Symposium (USENIX Security 2025)全文接收,2篇论文的第一作者分别为网络空间安全学院2021级本科生张志胜和2022级本科生金伟飞。USENIX Security为CCF A类会议,与IEEE S&P、ACM CCS及NDSS并称为网络与信息安全领域四大国际学术会议,代表着国际网络与信息安全研究的前沿水平。 展开更多
关键词 本科生 USENIX security Symposium
在线阅读 下载PDF
东南大学李松泽团队成果被安全领域国际会议USENIX Security 2025录用
4
《信息网络安全》 北大核心 2025年第3期507-507,共1页
近日,东南大学网络空间安全学院李松泽教授团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用。论文第一作者为2022级博士研究生常益嘉(香港科技大学(广州))。李松泽教授为论文通信作者。论文题目是... 近日,东南大学网络空间安全学院李松泽教授团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用。论文第一作者为2022级博士研究生常益嘉(香港科技大学(广州))。李松泽教授为论文通信作者。论文题目是“Arbitrary-Threshold Fully Homomorphic Encryption with Lower Complexity”。 展开更多
关键词 USENIX security 2025 东南大学
在线阅读 下载PDF
哈尔滨工业大学詹东阳团队研究成果被USENIX Security 2025录用
5
《信息网络安全》 北大核心 2025年第7期1174-1174,共1页
近日,哈尔滨工业大学网络空间安全学院副教授詹东阳团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用,该研究成果揭示了Web Assembly运行时资源隔离机制的安全缺陷,通过静态分析技术系统化探索了新... 近日,哈尔滨工业大学网络空间安全学院副教授詹东阳团队研究成果被第34届USENIX安全研讨会(The 34th USENIX Security Symposium 2025)录用,该研究成果揭示了Web Assembly运行时资源隔离机制的安全缺陷,通过静态分析技术系统化探索了新型资源耗尽的攻击面以及攻击策略,并探讨了可能的防护方案。 展开更多
关键词 哈尔滨工业大学 USENIX security 2025
在线阅读 下载PDF
Cloud edge integrated security architecture of new cloud manufacturing system 被引量:1
6
作者 ZHAO Longbo LI Bohu YUAN Haitao 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1177-1189,共13页
With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 pre... With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology,the new cloud manufacturing system(NCMS)built on the connotation of cloud manufacturing 3.0 presents a new business model of“Internet of everything,intelligent leading,data driving,shared services,cross-border integration,and universal innovation”.The network boundaries are becoming increasingly blurred,NCMS is facing security risks such as equipment unauthorized use,account theft,static and extensive access control policies,unauthorized access,supply chain attacks,sensitive data leaks,and industrial control vulnerability attacks.Traditional security architectures mainly use information security technology,which cannot meet the active security protection requirements of NCMS.In order to solve the above problems,this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS.It adopts the zero trust concept and effectively integrates multiple security capabilities such as network,equipment,cloud computing environment,application,identity,and data.It adopts a new access control mode of“continuous verification+dynamic authorization”,classified access control mechanisms such as attribute-based access control,rolebased access control,policy-based access control,and a new data security protection system based on blockchain,achieving“trustworthy subject identity,controllable access behavior,and effective protection of subject and object resources”.This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises,and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations. 展开更多
关键词 new cloud manufacturing system(NCMS) integrated cloud-edge-terminal security system architecture zero trust
在线阅读 下载PDF
武汉大学网络安全研究成果被USENIX Security 2024录用
7
《信息网络安全》 CSCD 北大核心 2024年第3期437-437,共1页
近日,武汉大学国家网络安全学院2021级博士生葛云洁(第一作者)与网络安全试验班2020级本科生陈品极(共同第一作者)撰写的论文被第33届USENIX安全研讨会(The 33rd USENIX Security Symposium 2024)录用。论文题目为“More Simplicity for... 近日,武汉大学国家网络安全学院2021级博士生葛云洁(第一作者)与网络安全试验班2020级本科生陈品极(共同第一作者)撰写的论文被第33届USENIX安全研讨会(The 33rd USENIX Security Symposium 2024)录用。论文题目为“More Simplicity for Trainers,More Opportunity for Attackers:Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor”(《训练简化增大攻击风险:基于特征提取器推断的黑盒语音声纹对抗攻击》),指导老师为武汉大学国家网络安全学院教授王骞(通讯作者)、副教授赵令辰(通讯作者),与中国香港城市大学教授王聪、清华大学副教授李琦和西安交通大学教授沈超合作完成。武汉大学国家网络安全学院2021级博士生牟宁平、2019级博士生江沛佩参与了该成果的研究工作。 展开更多
关键词 网络安全 声纹 黑盒 security 试验班 香港城市大学
在线阅读 下载PDF
清华大学计算机系和网研院团队获得USENIX Security 2024杰出论文奖和互联网防御奖
8
《信息网络安全》 CSCD 北大核心 2024年第9期1472-1472,共1页
8月14日~16日,国际网络安全四大会议之一的“第三十三届USENIX安全大会(USENIX Security Symposium)”在美国费城举行。清华大学网络科学与网络空间研究院教师李琦、刘卓涛和计算机系教师徐恪、徐明伟、吴建平团队发表的论文“语义驱动... 8月14日~16日,国际网络安全四大会议之一的“第三十三届USENIX安全大会(USENIX Security Symposium)”在美国费城举行。清华大学网络科学与网络空间研究院教师李琦、刘卓涛和计算机系教师徐恪、徐明伟、吴建平团队发表的论文“语义驱动的互联网路由异常检测系统”(Learning with Semantics:Towards a Semantics-Aware Routing Anomaly Detection System)同时获得杰出论文奖(Distinguished Paper Award)和互联网防御奖(Internet Defense Prize)。论文的第一作者为计算机系2021级博士研究生陈熠豪,导师为吴建平院士。 展开更多
关键词 异常检测 网络安全 博士研究生 吴建平 security 美国费城 语义驱动
在线阅读 下载PDF
华中科技大学博士研究生论文被网络安全与隐私计算领域会议USENIX Security录用
9
《信息网络安全》 CSCD 北大核心 2024年第7期1121-1121,共1页
近日,第33届USENIX安全研讨会(33rd USENIX Security Symposium 2024)录用结果揭晓,华中科技大学博士研究生冯思乐(导师邹德清教授)的论文“FIRE:Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerab... 近日,第33届USENIX安全研讨会(33rd USENIX Security Symposium 2024)录用结果揭晓,华中科技大学博士研究生冯思乐(导师邹德清教授)的论文“FIRE:Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection”被录用。随着软件开源的不断发展,重用开源软件已成为软件开发中的一种普遍做法,这一趋势导致越来越多的漏洞。 展开更多
关键词 开源软件 软件开发 安全与隐私 研究生论文 博士研究生 security 计算领域
在线阅读 下载PDF
Apache Axis1.1环境下WS-Security的研究与实现 被引量:4
10
作者 景建笃 《计算机工程与设计》 CSCD 北大核心 2005年第7期1925-1927,1964,共4页
SOAP构成了Web服务体系结构的通信基础,SOAP的扩展协议WS-Security是Web服务环境下最基础的安全协议,ApacheAxis是Java平台上的一个开放源码的SOAP处理机。关于Web服务的安全性研究是Web服务在实际应用中所必须解决的问题。给出了一个基... SOAP构成了Web服务体系结构的通信基础,SOAP的扩展协议WS-Security是Web服务环境下最基础的安全协议,ApacheAxis是Java平台上的一个开放源码的SOAP处理机。关于Web服务的安全性研究是Web服务在实际应用中所必须解决的问题。给出了一个基于WS-Security的安全模型,分析了ApacheAxis的消息处理机制,研究了此模型在ApacheAxis下的实现。 展开更多
关键词 Web服务 WS—security SOAP AXIS XML加密 XML签名
在线阅读 下载PDF
基于WS-Security规范的安全Web服务性能评估 被引量:1
11
作者 段友祥 包永堂 《小型微型计算机系统》 CSCD 北大核心 2009年第12期2364-2368,共5页
为了评估使用WS-Security规范进行安全处理后的Web服务性能,在研究分析Web服务架构及WS-Security规范的基础上,建立一个改进的时间响应评估模型.采用真实的测试环境,针对Web服务的时间性能和消息大小进行了实验,得出WS-Security安全规范... 为了评估使用WS-Security规范进行安全处理后的Web服务性能,在研究分析Web服务架构及WS-Security规范的基础上,建立一个改进的时间响应评估模型.采用真实的测试环境,针对Web服务的时间性能和消息大小进行了实验,得出WS-Security安全规范对Web服务响应时间和空间性能的影响,从而为Web服务在安全和性能两方面如何选择提供真实依据,对Web服务安全研究具有重要意义. 展开更多
关键词 WS—security WEB服务 性能评估 时间响应模型
在线阅读 下载PDF
使用Spring Security开发安全的Java程序 被引量:2
12
作者 梁云娟 《河南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2012年第4期148-150,共3页
介绍使用Spring Security开发Java安全应用程序的一种开发方式.Spring Security是目前用于替换Acegi的框架,配置简单,提高了开发者的生产力,并提供了一系列新功能.将详细介绍使用Spring Security开发一个完整示例,体会相比较Acegi带来... 介绍使用Spring Security开发Java安全应用程序的一种开发方式.Spring Security是目前用于替换Acegi的框架,配置简单,提高了开发者的生产力,并提供了一系列新功能.将详细介绍使用Spring Security开发一个完整示例,体会相比较Acegi带来的好处. 展开更多
关键词 SPRING security 安全 ACEGI
在线阅读 下载PDF
CALL FOR PAPERS Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06)
13
《复杂系统与复杂性科学》 EI CSCD 2005年第1期84-86,共3页
Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as... Important Dates Submission due November 15, 2005 Notification of acceptance December 30, 2005 Camera-ready copy due January 10, 2006 Workshop Scope Intelligence and Security Informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications. The First and Second Symposiums on ISI were held in Tucson,Arizona,in 2003 and 2004,respectively. In 2005,the IEEE International Conference on ISI was held in Atlanta,Georgia. These ISI conferences have brought together academic researchers,law enforcement and intelligence experts,information technology consultant and practitioners to discuss their research and practice related to various ISI topics including ISI data management,data and text mining for ISI applications,terrorism informatics,deception detection,terrorist and criminal social network analysis,crime analysis,monitoring and surveillance,policy studies and evaluation,information assurance,among others. We continue this stream of ISI conferences by organizing the Workshop on Intelligence and Security Informatics (WISI’06) in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD’06). WISI’06 will provide a stimulating forum for ISI researchers in Pacific Asia and other regions of the world to exchange ideas and report research progress. The workshop also welcomes contributions dealing with ISI challenges specific to the Pacific Asian region. 展开更多
关键词 security in conjunction with the Pacific Asia Conference on Knowledge Discovery and Data Mining CALL FOR PAPERS Workshop on Intelligence and security Informatics ASIA
在线阅读 下载PDF
Energy Security and Climate Change in the European Union,China and Latin American Relationships:Major Challenges and Areas of International Cooperation
14
作者 Maria Cristina Silva Parejas 《国际展望》 2009年第1期199-216,126,共19页
The author discusses the subject in both ecological and political perspectives based on a most comprehensive,authoritative and updated bibliography.Hence,Latin America and the Caribbean(LAC) is as much diversified as ... The author discusses the subject in both ecological and political perspectives based on a most comprehensive,authoritative and updated bibliography.Hence,Latin America and the Caribbean(LAC) is as much diversified as there are sub-regions and regional organizations in geopolitical and geo-economical terms and often dialectic regarding energy security,climate change and LAC ties with Europeans and China and so is the tripartite relations with the rest of the world so far as energy security and climate cha... 展开更多
关键词 In Energy security and Climate Change in the European Union China and Latin American Relationships LAC security
在线阅读 下载PDF
Security transmission and recognition of F-knowledge 被引量:7
15
作者 Zhang Ling Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期877-882,共6页
The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of mu... The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems. 展开更多
关键词 S-rough sets F-knowledge security of knowledge RSA algorithm recognition criterion application.
在线阅读 下载PDF
Adaptive link layer security architecture for telecommand communications in space networks 被引量:3
16
作者 Lei Zhang Chengjin An +1 位作者 Susanna Spinsante Chaojing Tang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第3期357-372,共16页
Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links am... Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satel ites, spacecrafts and crewed vehicles wil be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive reengineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based requirements, an adaptive link layer security architecture is proposed to address some of the chal enges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and efficient, especially when facing malicious attacks against frame transmission. 展开更多
关键词 space network telecommand security adaptive estimate performance optimization misbehavior detection.
在线阅读 下载PDF
Hybrid rice technology for food security in the world 被引量:12
17
作者 YUAN Long-ping(China National Hybrid Rice R & D Center,Changsha,Hunan,410125,China) 《作物研究》 2004年第4期185-186,共2页
关键词 Hybrid rice technology for food security in the world LINE
在线阅读 下载PDF
Study on the Priority and Interaction of Food Security,Food Safety and Environmental Protection 被引量:1
18
作者 Tang Bulong 《学术界》 CSSCI 北大核心 2017年第11期294-303,共10页
Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationshi... Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationship among them.Facing the triple pressures of food security,food safety,and environmental protection,this paper analyzes the priority of the three from the historical development,then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security,food safety and environmental protection,and the proper settlement of the three problems. 展开更多
关键词 FOOD security FOOD safety ENVIRONMENTAL protection PRIORITY INTERACTIVE RELATIONSHIP
在线阅读 下载PDF
Multilevel security model for ad hoc networks 被引量:1
19
作者 Wang Changda Ju Shiguang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期391-397,F0003,共8页
Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although... Modern battlefield doctrine is based on mobility, flexibility, and rapid response to changing situations. As is well known, mobile ad hoc network systems are among the best utilities for battlefield activity. Although much research has been done on secure routing, security issues have largely been ignored in applying mobile ad hoc network theory to computer technology. An ad hoc network is usually assumed to be homogeneous, which is an irrational assumption for armies. It is clear that soldiers, commanders, and commanders-in-chief should have different security levels and computation powers as they have access to asymmetric resources. Imitating basic military rank levels in battlefield situations, how multilevel security can be introduced into ad hoc networks is indicated, thereby controlling restricted classified information flows among nodes that have different security levels. 展开更多
关键词 ad hoc network multilevel security model access control.
在线阅读 下载PDF
梅特勒-托利多倾力之作GWP——全球称量应用指南隆重登场——Maximize Process Security & Minimize Costs
20
《化工学报》 EI CAS CSCD 北大核心 2008年第10期2655-2655,共1页
关键词 security 指南 应用 GWP 中国市场
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部