咨询与建议

限定检索结果

文献类型

  • 673 篇 会议
  • 344 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 509 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 106 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 64 篇 电子科学与技术(可...
    • 57 篇 生物工程
    • 53 篇 电气工程
    • 30 篇 机械工程
    • 28 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 核科学与技术
    • 17 篇 生物医学工程(可授...
    • 15 篇 仪器科学与技术
    • 13 篇 材料科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
  • 388 篇 理学
    • 184 篇 数学
    • 159 篇 物理学
    • 68 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 26 篇 化学
  • 149 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 26 篇 法学
    • 19 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 10 篇 经济学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 26 篇 feature extracti...
  • 24 篇 security
  • 23 篇 deep learning
  • 21 篇 semantics
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 machine learning
  • 18 篇 malware
  • 13 篇 training
  • 12 篇 network topology
  • 12 篇 optimization
  • 12 篇 computational mo...
  • 12 篇 data models
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 algorithm design...
  • 11 篇 heuristic algori...
  • 10 篇 protocols
  • 9 篇 computer archite...

机构

  • 632 篇 state key labora...
  • 39 篇 state key labora...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 18 篇 université libre...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 17 篇 max planck insti...
  • 17 篇 université paris...
  • 17 篇 universiteit gen...
  • 17 篇 gran sasso scien...
  • 17 篇 european gravita...
  • 17 篇 indian institute...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...

作者

  • 42 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 21 篇 pang jianmin
  • 20 篇 jianmin pang
  • 19 篇 zheng shan
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 fenlin liu
  • 18 篇 liu fudong
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan

语言

  • 987 篇 英文
  • 19 篇 中文
  • 12 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Laboratory of Mathematical Engineering and Advanced Computing"
1018 条 记 录,以下是71-80 订阅
排序:
A review of auxiliary hardware architectures supporting dynamic taint analysis
A review of auxiliary hardware architectures supporting dyna...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Yang, Anfeng Guang, Yan Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running... 详细信息
来源: 评论
SoK: A Survey on Redundant Execution Technology
SoK: A Survey on Redundant Execution Technology
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe Ma, Bolin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the... 详细信息
来源: 评论
PFCA: An Intelligent Method of Multidimensional User Profile Construction and Application  7
PFCA: An Intelligent Method of Multidimensional User Profile...
收藏 引用
7th International Conference on Big Data Analytics, ICBDA 2022
作者: Xia, Yi Zhou, Gang Luo, Junyong Lan, Mingjing Chen, Xiaohui Wang, Shiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome... 详细信息
来源: 评论
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of Embedded Devices  4
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of E...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Zheng, Yan Dong, Weiyu Cheng, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of embedded devices, security issues continue to occur. The existing automated security testing methods for embedded devices are mainly carried out from two aspects: the Web interface of the de... 详细信息
来源: 评论
TS-GGNN: Combining Graph and Sequence Features for Vulnerability Detection in Source Code  5
TS-GGNN: Combining Graph and Sequence Features for Vulnerabi...
收藏 引用
5th International Conference on Communications, Information System and Computer engineering, CISCE 2023
作者: Zhou, Xin Pang, Jianmin Zhang, Chunyan Yue, Feng Wang, Junchao Liu, Guangming State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability... 详细信息
来源: 评论
The various graphs in graph computing  1
收藏 引用
22nd Annual Conference on Computer engineering and Technology, NCCET 2018
作者: Sun, Rujun Zhang, Lufei State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The world is full of relationships, and graph is the most evident representation for them. With the increasing of data scale, graphs become larger and have encountered a new world of analyzing. What can we learn from ... 详细信息
来源: 评论
Research on Unpredetermined Behavior Recognition Techniques Based on Network Attacks  5
Research on Unpredetermined Behavior Recognition Techniques ...
收藏 引用
5th International Conference on Internet of Things, Automation and Artificial Intelligence, IoTAAI 2023
作者: Xiao, Yuxuan Fei, Jinlong Wang, Junyi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o... 详细信息
来源: 评论
KVM PT Based Coverage Feedback Fuzzing for Network Key Devices  2
KVM PT Based Coverage Feedback Fuzzing for Network Key Devic...
收藏 引用
2nd International Conference on Computer engineering and Application, ICCEA 2021
作者: Zhiqiang, Lin Jianshan, Peng Yechuan, Bi Xiaowei, Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the advent of the network era, network security has attracted more and more attention. As the key node in the network, network key devices play an important role in protecting the internal network and ensuring th... 详细信息
来源: 评论
A short text spectrum clustering method based on frequent itemsets  4
A short text spectrum clustering method based on frequent it...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Luo, Nan Zhang, Ping Li, Qingbao Chen, Zhifeng Feng, Peijun Xue, Tianxiao Engineering and Advanced Computing State Key Laboratory of Mathematical Zhengzhou China
Short text datum, which contains a lot of useful information, could be easily found on a wide variety of self-media platform and social communication tools. on It is significant to use datum mining technology to autom... 详细信息
来源: 评论
An Efficient Sieve Algorithm with Evolutionary Technique  20
An Efficient Sieve Algorithm with Evolutionary Technique
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Sun, Zedong Gu, Chunxiang Zheng, Yonghui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t... 详细信息
来源: 评论