国家自然科学基金(61272481)

作品数:27被引量:429H指数:9
导出分析报告
相关作者:张玉清刘奇旭吕少卿杨欢王志强更多>>
相关机构:中国科学院大学西安电子科技大学北京电子科技学院中国科学院更多>>
相关期刊:《Chinese Journal of Electronics》《中国科学院大学学报(中英文)》《通信学报》《China Communications》更多>>
相关主题:ANDROID社交网络网络空间安全网络安全WEB安全更多>>
相关领域:自动化与计算机技术电子电信自然科学总论理学更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
软件供应链安全综述被引量:28
《信息安全学报》2020年第1期57-73,共17页何熙巽 张玉清 刘奇旭 
国家重点研发计划基金资助项目(No.2016YFB0800700);国家自然科学基金资助项目(No.61572460,No.61272481);信息安全国家重点实验室的开放课题基金资助项目(No.2017-ZD-01);国家发改委信息安全专项基金资助项目(No.(2012)1424)资助
随着信息技术产业的发展和软件开发需求的扩展,软件开发的难度与复杂度不断上升,针对软件供应链的重大安全事件时有发生。这些事件展现了软件供应链攻击低成本而高效的特点以及软件供应链管理的复杂性,使得软件供应链的安全问题受到了...
关键词:软件供应链 网络供应链 网络与信息系统安全 软件安全 供应链风险管理 
revised CVSS-based system to improve the dispersion of vulnerability risk scores被引量:3
《Science China(Information Sciences)》2019年第3期189-191,共3页Chensi WU Tao WEN Yuqing ZHANG 
supported by National Key R&D Program of China (Grant No. 2016YFB0800700);National Natural Science Foundation of China (Grant Nos. 61572460, 61272481);Open Project Program of State Key Laboratory of Information Security (Grant No. 2017-ZD-01);National Information Security Special Projects of National Development and Reform Commission of China (Grant No. (2012)1424);Programme of Introducing Talents of Discipline to Universities (111 Project) (Grant No. B16037)
Dear editor,We propose a new vulnerability risk assessment system,CVSS.PCA,for improving CVSS based on principal component analysis(PCA)[1].With the increasing number of security vulnerabilities,vulnerability risk mea...
关键词:EDITOR SYSTEM process 
深度学习应用于网络空间安全的现状、趋势与展望被引量:70
《计算机研究与发展》2018年第6期1117-1142,共26页张玉清 董颖 柳彩云 雷柯楠 孙鸿宇 
国家重点研发计划项目(2016YFB0800703); 国家自然科学基金项目(61572460,61272481); 信息安全国家重点实验室的开放课题(2017-ZD-01); 国家发改委信息安全专项项目((2012)1424)
近年来,深度学习应用于网络空间安全的研究逐渐受到国内外学者的关注,从分类算法、特征提取和学习效果等方面分析了深度学习应用于网络空间安全领域的研究现状与进展.目前,深度学习主要应用于恶意软件检测和入侵检测两大方面,指出了这...
关键词:深度学习 网络空间安全 攻击与防御 应用安全 网络安全 
Authenticated Quantum Dialogue Without Information Leakage被引量:1
《Chinese Journal of Electronics》2018年第2期270-275,共6页WANG He ZHANG Yuqing WU Gaofei MA Hua 
supported by the National Key Research and Development Project of China (No.2016YFB0800703);the National Natural Science Foundation of China (No.61572460, No.61272481, No.61602361);the China Postdoctoral Science Foundation (No.2016M602776);the National Information Security Special Projects of National Development and Reform Commission of China (No.(2012)1424);the Open Project Program of the State Key Laboratory of Information Security (No.2017-ZD-01);the China 111 Project (No.B16037)
A lot of authenticated quantum dialogue protocols are springing up. Many of them have the problem of information leakage, or suffer from Man-In-TheMiddle attack. Some protocols can guarantee security, but have relativ...
关键词:Quantum dialogue Bell states AUTHENTICATION Entanglement swapping 
Driving Android apps to trigger target API invocations based on activity and GUI filtering
《Science China(Information Sciences)》2017年第7期255-257,共3页Hongzhou YUE Yuqing ZHANG Wenjie WANG Qixu LIU 
supported by National Natural Science Foundation of China (Grant Nos. 61572460, 61272481, 61303239);Open Project Program of the State Key Laboratory of Information Security (Grant Nos. 2015-MS-06, 2015-MS04)
For an Android app tester,it is often needed to trigger the specific behaviors of an app.However,most of the existing Android GUI exploration tools only pursue high code coverage,rather than triggering the specific be...
关键词:Android inevitably filtering pursue coverage unnecessary targeted trigger tester exercise 
Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow被引量:6
《Chinese Journal of Electronics》2017年第3期640-646,共7页ZHAO Qianqian ZHANG Yuqing ZHANG Guanghua WANG He 
supported by the National Natural Science Foundation of China(No.61572460,No.61272481);the National Key Research and Development Project(No.2016YFB0800703);Open Fund of Beijing Key Laboratory of IOT Information Security Technology(No.J6V0011104);the China Postdoctoral Science Foundation(No.2015M582622);the National Information Security Special Projects of National Development,the Reform Commission of China(No.(2012)1424);the China 111 Project(No.B16037)
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access control.It neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key d...
关键词:CP-ABE The escrow problem Fully security In the standard model 
A static technique for detecting input validation vulnerabilities in Android apps被引量:5
《Science China(Information Sciences)》2017年第5期206-221,共16页Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU 
supported in part by National Information Security Special Projects of National Development and Reform Commission of China (Grant No. (2012)1424);National Natural Science Foundation of China (Grant Nos. 61572460, 61272481, 61303239);Open Project Program of the State Key Laboratory of Information Security (Grant No. 2015-MS-04)
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t...
关键词:input validation static analysis program slicing vulnerability detection Amdroid security 
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing
《Science China(Information Sciences)》2017年第5期251-253,共3页Jingyu FENG Guangyue LU Yuqing ZHANG Honggang WANG 
supported in part by National Natural Science Foundation of China(Grant Nos. 61301091, 61572460, 61272481);Open Foundation of State Key Laboratory of Information Security (Grant No. 2015-MS-14);New Star Team of Xi’an University of Posts and Telecommunications
Dear editor,Federal Communications Commission found that most of the allocated spectrum bands are not efficiently utilized by the licensed primary users(PU).In order to improve spectrum utilization,it has been sugge...
关键词:MAC CSS mutual-aid collusive attack detection in cooperative spectrum sensing 
A Provably Secure General Construction for Key Exchange Protocols Using Smart Card and Password被引量:1
《Chinese Journal of Electronics》2017年第2期271-278,共8页ZHANG Gefei FAN Dan ZHANG Yuqing LI Xiaowei 
supported by the National Natural Science Foundation of China(No.61272481,No.61402434);China Post-doctoral Science Foundation Funded Project(No.2014M550085);the Open Fund of State Key Laboratory of Information Security(No.2014-12)
Key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a password.Most of these protocols are often li...
关键词:General construction Provable secure Smart card Password Key exchange protocol 
Secure Multi-keyword Search Supporting Dynamic Update and Ranked Retrieval
《China Communications》2016年第10期209-221,共13页Jingbo Yan Yuqing Zhang Xuefeng Liu 
supported in part by the National Natural Science Foundation of China (61272481, 61572460, 61402352);the National Key Research and Development Project (2016YFB0800703);the National Information Security Special Projects of National Development;the Reform Commission of China [(2012)1424];China 111 Project (No. B16037)
As cloud computing is becoming prevalent, data owners are motivated to delegate complex data managements to the commercial cloud for economic savings. Sensitive data is usually encrypted before being uploaded to the c...
关键词:secure search ranked search dynamic update cloud computing 
检索报告 对象比较 聚类工具 使用帮助 返回顶部