咨询与建议

限定检索结果

文献类型

  • 673 篇 会议
  • 344 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 509 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 106 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 64 篇 电子科学与技术(可...
    • 57 篇 生物工程
    • 53 篇 电气工程
    • 30 篇 机械工程
    • 28 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 核科学与技术
    • 17 篇 生物医学工程(可授...
    • 15 篇 仪器科学与技术
    • 13 篇 材料科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
  • 388 篇 理学
    • 184 篇 数学
    • 159 篇 物理学
    • 68 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 26 篇 化学
  • 149 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 26 篇 法学
    • 19 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 10 篇 经济学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 26 篇 feature extracti...
  • 24 篇 security
  • 23 篇 deep learning
  • 21 篇 semantics
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 machine learning
  • 18 篇 malware
  • 13 篇 training
  • 12 篇 network topology
  • 12 篇 optimization
  • 12 篇 computational mo...
  • 12 篇 data models
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 algorithm design...
  • 11 篇 heuristic algori...
  • 10 篇 protocols
  • 9 篇 computer archite...

机构

  • 632 篇 state key labora...
  • 39 篇 state key labora...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 18 篇 université libre...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 17 篇 max planck insti...
  • 17 篇 université paris...
  • 17 篇 universiteit gen...
  • 17 篇 gran sasso scien...
  • 17 篇 european gravita...
  • 17 篇 indian institute...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...

作者

  • 42 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 21 篇 pang jianmin
  • 20 篇 jianmin pang
  • 19 篇 zheng shan
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 fenlin liu
  • 18 篇 liu fudong
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan

语言

  • 987 篇 英文
  • 19 篇 中文
  • 12 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Laboratory of Mathematical Engineering and Advanced Computing"
1018 条 记 录,以下是21-30 订阅
排序:
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 455-465页
作者: Jialin Li Xiangyang Luo Yi Zhang Pei Zhang Chunfang Yang Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography... 详细信息
来源: 评论
Cooperative computing Techniques for a Deeply Fused and Heterogeneous Many-Core Processor Architecture
收藏 引用
Journal of Computer Science & Technology 2015年 第1期30卷 145-162页
作者: 郑方 李宏亮 吕晖 过锋 许晓红 谢向辉 State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h... 详细信息
来源: 评论
Cryptanalysis of full PRIDE block cipher
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 169-180页
作者: Yibin DAI Shaozhen CHEN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
PRIDE is a lightweight block cipher proposed at CRYPTO 2014 by Albrecht et al., who claimed that the construction of linear layers is efficient and secure. In this paper, we investigate the key schedule and find eight... 详细信息
来源: 评论
Stego key searching for LSB steganography on JPEG decompressed image
收藏 引用
Science China(Information Sciences) 2016年 第3期59卷 60-74页
作者: Jiufen LIU Yuguo TIAN Tao HAN Junchao WANG Xiangyang LUO Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
At present, steganalysis research focuses on detecting the existence of a hidden message. However,extracting the hidden information, i.e., an extracting attack, is crucial in obtaining effective evidence in computer f... 详细信息
来源: 评论
Software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 评论
An efficient quantum meet-in-the-middle attack against NTRU-2005
收藏 引用
Chinese Science Bulletin 2013年 第28期58卷 3514-3518页
作者: WANG Hong MA Zhi MA ChuanGui State Key Laboratory of Mathematical Engineering and Advanced Computing
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and ... 详细信息
来源: 评论
Research Progress of Reverse Monte Carlo and Its Application in Josephson Junction Barrier Layer
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第12期137卷 2077-2109页
作者: Junling Qiu Huihui Sun Shuya Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
As indispensable components of superconducting circuit-based quantum computers,Josephson junctions determine how well superconducting qubits *** Monte Carlo(RMC)can be used to recreate Josephson junction’s atomic str... 详细信息
来源: 评论
Revocable Broadcast Encryption with Constant Ciphertext and Private Key Size
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 690-697页
作者: JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei Zhengzhou University State Key Laboratory of Mathematical Engineering and Advanced Computing Nanjing University of Post and Communications
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo... 详细信息
来源: 评论
An advanced Automatic Construction Method of ROP
收藏 引用
Wuhan University Journal of Natural Sciences 2015年 第2期20卷 119-128页
作者: OUYANG Yongji WANG Qingxian PENG Jianshan ZENG Jie State Key Laboratory of Mathematical Engineering and Advanced Computing
Automatic return oriented programming (ROP) technology can effectively improve the efficiency of ROP constructed, but the existing research results still have some shortcomings including needing more address space, ... 详细信息
来源: 评论
Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1223-1243页
作者: Yuancong Chai Yuefei Zhu Wei Lin Ding Li State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou450001China
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged... 详细信息
来源: 评论