咨询与建议

限定检索结果

文献类型

  • 673 篇 会议
  • 344 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 681 篇 工学
    • 509 篇 计算机科学与技术...
    • 409 篇 软件工程
    • 106 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 67 篇 控制科学与工程
    • 64 篇 电子科学与技术(可...
    • 57 篇 生物工程
    • 53 篇 电气工程
    • 30 篇 机械工程
    • 28 篇 光学工程
    • 24 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 核科学与技术
    • 17 篇 生物医学工程(可授...
    • 15 篇 仪器科学与技术
    • 13 篇 材料科学与工程(可...
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
  • 388 篇 理学
    • 184 篇 数学
    • 159 篇 物理学
    • 68 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 35 篇 系统科学
    • 26 篇 化学
  • 149 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 26 篇 法学
    • 19 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 10 篇 经济学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 26 篇 feature extracti...
  • 24 篇 security
  • 23 篇 deep learning
  • 21 篇 semantics
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 machine learning
  • 18 篇 malware
  • 13 篇 training
  • 12 篇 network topology
  • 12 篇 optimization
  • 12 篇 computational mo...
  • 12 篇 data models
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 algorithm design...
  • 11 篇 heuristic algori...
  • 10 篇 protocols
  • 9 篇 computer archite...

机构

  • 632 篇 state key labora...
  • 39 篇 state key labora...
  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 18 篇 université libre...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 17 篇 max planck insti...
  • 17 篇 université paris...
  • 17 篇 universiteit gen...
  • 17 篇 gran sasso scien...
  • 17 篇 european gravita...
  • 17 篇 indian institute...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...

作者

  • 42 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 21 篇 pang jianmin
  • 20 篇 jianmin pang
  • 19 篇 zheng shan
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 fenlin liu
  • 18 篇 liu fudong
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan

语言

  • 987 篇 英文
  • 19 篇 中文
  • 12 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Laboratory of Mathematical Engineering and Advanced Computing"
1018 条 记 录,以下是81-90 订阅
排序:
An Improved Key Mismatch Attack on Kyber  7
An Improved Key Mismatch Attack on Kyber
收藏 引用
7th International Conference on Cryptography, Security and Privacy, CSP 2023
作者: Wang, Yaru Jiang, Haodong Ma, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem... 详细信息
来源: 评论
Pdf Exploitable malware analysis based on exploit genes  12
Pdf Exploitable malware analysis based on exploit genes
收藏 引用
12th IEEE International Conference on Anti-Counterfeiting, Security, and Identification, ASID 2018
作者: Zhou, Xin Pang, Jianmin Liu, Fudong Wang, Jun Yue, Feng Liu, Xiaonan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of social networks, as a low-cost, high-efficiency entail attack method, most of the attack vectors were embedded in email attachments, and exploited vulnerability on Adobe and Office software.... 详细信息
来源: 评论
Critical Variable Guided Mutation for Directed Greybox Fuzzing
Critical Variable Guided Mutation for Directed Greybox Fuzzi...
收藏 引用
2023 IEEE International Conference on Control, Electronics and Computer Technology, ICCECT 2023
作者: He, Yubo Liu, Long The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Directed greybox fuzzing directs fuzzers to specified code areas and has gained great achievements in 1-day vulnerability detection. However, existing directed graybox fuzzers fail to generate the crash sample even if... 详细信息
来源: 评论
A PV-DM-based feature fusion method for binary malware clustering  4
A PV-DM-based feature fusion method for binary malware clust...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Gui, Hairen Zhang, Chunyan Huang, Yizhao Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Utilizing NLP methods in malware classification or clustering applications is a hotspot in malware analysis. Binary malware embedding has become an important direction and basis for malware analysis. Existing binary m... 详细信息
来源: 评论
The research on application of software diversity in cyberspace security  4
The research on application of software diversity in cybersp...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Zhang, Jiexin Pang, Jianmin Zhang, Zheng Liu, Zhenwu State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
Nowadays, the cyberspace security situation is unoptimistic. Widespread vulnerabilities and backdoors are the main factors of insecurity in cyberspace. Furthermore, the software monoculture makes the attack have an ex... 详细信息
来源: 评论
A BOW-Based Sentence Embedding Method for Chinese Event Identification  4
A BOW-Based Sentence Embedding Method for Chinese Event Iden...
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Gao, Lizheng Zhou, Gang Luo, Junyong State Key of Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Event extraction is an important branch of information extraction. It involves two challenging issues: event identification and argument identification. Most approaches of event identification are trigger-based, which... 详细信息
来源: 评论
A Malware Classification Method based on Attentive Bidirectional Model  7
A Malware Classification Method based on Attentive Bidirecti...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Gui, Hairen Liu, Fudong Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie... 详细信息
来源: 评论
The optimization algorithm based on vector space model to determine the influence of microblogging text
The optimization algorithm based on vector space model to de...
收藏 引用
作者: Dong, Yu Chen Liu, Yan Luo, Jun Yong Zhang, Jin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This article uses the vector space model to express microblogging text in quantity, via the cosine of the angle of text clustering method to calculate the similarity between the text. We can generate alternative micro... 详细信息
来源: 评论
An Ensemble Approach with Clustering-Based Under-sampling for Imbalanced Classification  2
An Ensemble Approach with Clustering-Based Under-sampling fo...
收藏 引用
2nd International Conference on Artificial Intelligence and Education, ICAIE 2021
作者: Ren, Huajuan Ren, Shuai Yan, Lin Wang, Ruimin Jing, Jing Shi, Jiaqi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Class imbalance widely occurs in many real-world applications, which affects the recognition of important class to a certain extent. Ensemble methods that combined resampling are effective to alleviate the class imbal... 详细信息
来源: 评论
Topology-Aware Software Assignment in Networked Systems  2
Topology-Aware Software Assignment in Networked Systems
收藏 引用
2019 2nd International Conference on advanced Algorithms and Control engineering, ICAACE 2019
作者: Wang, Junchao Liu, Hao Liu, Zhenwu Zhang, Zheng Pang, Jianmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Cyberspace mimic defense has been proven to be a revolutionary defense technology that "changes the rules of the game" to ensure the security of cyberspace. However, the software diversity inherent in mimic ... 详细信息
来源: 评论