咨询与建议

限定检索结果

文献类型

  • 2,050 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,208 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 321 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 300 篇 电气工程
    • 255 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 194 篇 材料科学与工程(可...
    • 165 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 76 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,742 篇 理学
    • 844 篇 物理学
    • 771 篇 数学
    • 243 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 67 篇 feature extracti...
  • 56 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 28 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 616 篇 state key labora...
  • 165 篇 school of comput...
  • 125 篇 key laboratory o...
  • 118 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 98 篇 state key labora...
  • 93 篇 yunnan observato...
  • 88 篇 school of physic...
  • 87 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 institute of fro...
  • 78 篇 school of physic...
  • 77 篇 school of physic...
  • 73 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 80 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 66 篇 danzengluobu
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.

语言

  • 2,908 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3344 条 记 录,以下是3101-3110 订阅
排序:
Cryptanalysis of an Implementation of TTM Cryptosystems Based on Q2k-module
Cryptanalysis of an Implementation of TTM Cryptosystems Base...
收藏 引用
2013 International Conference on advanced Computer Science and Electronics Information(ICACSEI 2013)
作者: Hongwei Tao State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouChina China National Digital Switching System Engineering and Technological Research Center
TTM cryptosystems proposed by *** are very fast due to the properties of tame automorphisms and small finite fields. The success of the first implementation of this system relies on the construction of Q 8 -module. Un... 详细信息
来源: 评论
Dynamic evolution of collective emotions in social networks: a case study of Sina weibo
收藏 引用
Science China(Information Sciences) 2013年 第7期56卷 150-167页
作者: XIONG XiaoBing ZHOU Gang HUANG YongZhong CHEN HaiYong XU Ke State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Software Development Environment Beihang University
Emotion is a fundamental object of human existence and determined by a complex set of factors. With the rapid development of online social networks (OSNs), more and more people would like to express their emotion in O... 详细信息
来源: 评论
A Malware Threat Decision Model Based on Dynamic Multi-Source Data Acquisition
A Malware Threat Decision Model Based on Dynamic Multi-Sourc...
收藏 引用
2014 International Conference on Computer,Network Security and Communication engineering(CNSCE 2014)
作者: Di SUN Jian-min PANG Chao DAI State Key Laboratory of Mathematical Engineering and Advanced Technological Research Center
With the continuous advent of malware, in order to improve the utilization ratio of resources and deal with the threat of malware effectively, in this paper, we provide a malware threats decision model for multilevel ... 详细信息
来源: 评论
ESSVCS: An enriched secret sharing visual cryptography
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8363卷 1-24页
作者: Liu, Feng Yan, Wei Q. Li, Peng Wu, Chuankun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China School of Computing and Mathematical Sciences Auckland University of Technology 1142 New Zealand Department of Mathematics and Physics North China Electric Power University Baoding Hebei 071003 China
Visual Cryptography (VC) is a powerful technique that combines the notions of perfect ciphers and secret sharing in cryptography with that of raster graphics. A binary image can be divided into shares that are able to... 详细信息
来源: 评论
A cost model for automatic OpenMP parallelization
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2014年 25卷 101-110页
作者: Li, Yan-Bing Zhao, Rong-Cai Liu, Xiao-Xian Zhao, Jie PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Logistics Information Center Guangzhou Military Region Joint Logistics Department Guangzhou510000 China
Existing OpenMP cost models does not give enough thought to the implementation details of OpenMP programs so they cannot be applied widely to different types of parallel loops. To solve this problem, this study extend... 详细信息
来源: 评论
Method based on GSCPN for network vulnerability analysis
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2032-2038页
作者: Gao, Xiang Zhu, Yue-Fei Fei, Jin-Long Han, Tao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
With the development of network security research, network attack modeling and analysis techniques have been paid more and more attention. A generalized stochastic colored Petri Net (GSCPN) Model is proposed. To each ... 详细信息
来源: 评论
Program Crash Analysis Based on Taint Analysis
Program Crash Analysis Based on Taint Analysis
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Zhang Puhan Wu Jianxiong Wang Xin Zehui Wu China Information Technology Security Evaluation Center Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception an... 详细信息
来源: 评论
Improving guide-based vulnerability detection with hybrid symbolic execution
Improving guide-based vulnerability detection with hybrid sy...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yongji Ouyang Shuai Zeng Chao Yang Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Management and Control for Complex System Institute of Automation Chinese Academy of Sciences Beijing China
Symbolic Execution is a key and useful technology in current refinement software test, but there still exists some problems such as space explosion. In order to mitigate this problem and improve the ability for detect... 详细信息
来源: 评论
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition
Cryptographic Algorithms Analysis Technology Research Based ...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Rui Chang Liehui Jiang Hui Shu Hongqi He MEAC State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
At present, the research on software reverse engineering pays more attention to cryptographic algorithms recognition and analysis. Malwares are becoming increasingly stealthy, more and more malwares are using cryptogr... 详细信息
来源: 评论
Chip waveforms attribute recognition model research and design
Chip waveforms attribute recognition model research and desi...
收藏 引用
2014 International Conference on Manufacturing Technology and Electronics Applications, ICMTEA 2014
作者: Xiao, Da Feng, Jing Zhu, Yue Fei Peng, Fei Lan, Jing Hong Computer network department ZhengZhou Information Science University ZhengZhouHeNan China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhouHeNan China Urumqi General Hospital of PLA.Urumqi 7 Jianxue Street Xinjiang Uygur Zizhiqu Jinshui District ZhengZhouHeNan China
For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction sche... 详细信息
来源: 评论