咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 381 篇 期刊文献

馆藏范围

  • 1,053 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 113 篇 信息与通信工程
    • 71 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1053 条 记 录,以下是111-120 订阅
排序:
Computer evidence analysis technology based on weighted frequent pattern growth algorithm  5th
Computer evidence analysis technology based on weighted freq...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Xue, Tianxiao Li, Qingbao Zhang, Ping Chen, Zhifeng Feng, Peijun Luo, Nan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The current analysis of computer forensics is still dependent on the investigation personnel, leading to the problem of heavy workload and low efficiency. At the same time, computer evidences have the characteristics ... 详细信息
来源: 评论
Identify IoT Devices through Web Interface Characteristics  6
Identify IoT Devices through Web Interface Characteristics
收藏 引用
6th IEEE International Conference on Computer and Communication Systems, ICCCS 2021
作者: Cheng, Hui Dong, Weiyu Zheng, Yan Lv, Bo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the continuous expansion of the business scale of the Internet of Things, the concept of the Internet of Everything has been deeply rooted in the hearts of the people. At the same time, various security issues ha... 详细信息
来源: 评论
Integrating KNN and Gradient Boosting Decision Tree for Recommendation  5
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
5th IEEE advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Du, Qiming Li, Nan Yang, Shudan Sun, Daozhu Liu, Wenfu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论
DSA-NIE: Double Static Attributes Based Node Importance Evaluation of Inter-Domain Routing System  5
DSA-NIE: Double Static Attributes Based Node Importance Eval...
收藏 引用
5th IEEE International Conference on Computer and Communications, ICCC 2019
作者: Zhu, Huihu Qiu, Han Zhu, Junhu Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi... 详细信息
来源: 评论
Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture  2
Research on Performance Optimization for Sparse Matrix-Vecto...
收藏 引用
2nd International Conference on Information Technology and Computer Application, ITCA 2020
作者: Wang, Qihan Li, Mingliang Pang, Jianming Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing zhengzhou China
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu... 详细信息
来源: 评论
An Abnormal Domain Name Generation Method Based on a Character-Level Model  4
An Abnormal Domain Name Generation Method Based on a Charact...
收藏 引用
4th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2022
作者: Wu, Chunbing Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli... 详细信息
来源: 评论
Multi-protocol comprehensive topology probe technology under non-cooperative conditions
Multi-protocol comprehensive topology probe technology under...
收藏 引用
2022 International Symposium on Computer Applications and Information Systems, ISCAIS 2022
作者: Lu, Xuanting Yang, Qichao Liu, Shengli Yang, Pengfei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ... 详细信息
来源: 评论
Ensuring kernel integrity using KIPBMFH  1
收藏 引用
作者: Chen, Zhifeng Li, Qingbao Guo, Songhui Wang, Ye State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Kernel-level malwares are a serious threat to the integrity and security of the operating system. Current kernel integrity measurement methods have one-sidedness in selecting the measurement objects, and the character... 详细信息
来源: 评论
The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection  20
The Analysis of HTTPS Privacy Protection Based on Malicious ...
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Liu, Zeyan Pen, Jianshan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th... 详细信息
来源: 评论
A Survey of Available Information Recovery of Binary Programs Based on Machine Learning  5
A Survey of Available Information Recovery of Binary Program...
收藏 引用
5th IEEE International Conference on Artificial Intelligence and Big Data, ICAIBD 2022
作者: Shao, Wenqiang Yang, Qichao Guo, Xixi Cai, Ruijie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
A binary program is an executable file obtained by compiling the source code. In order to reduce the size of software or prevent reverse engineering, software publishers usually only release executable files that have... 详细信息
来源: 评论