咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是121-130 订阅
排序:
Integrating KNN and Gradient Boosting Decision Tree for Recommendation  5
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
5th IEEE advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Du, Qiming Li, Nan Yang, Shudan Sun, Daozhu Liu, Wenfu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论
The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection  20
The Analysis of HTTPS Privacy Protection Based on Malicious ...
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Liu, Zeyan Pen, Jianshan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th... 详细信息
来源: 评论
Ensuring kernel integrity using KIPBMFH  1
收藏 引用
作者: Chen, Zhifeng Li, Qingbao Guo, Songhui Wang, Ye State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Kernel-level malwares are a serious threat to the integrity and security of the operating system. Current kernel integrity measurement methods have one-sidedness in selecting the measurement objects, and the character... 详细信息
来源: 评论
Target function location based on code coverage analysis  2
Target function location based on code coverage analysis
收藏 引用
2nd International Conference on Material engineering and advanced Manufacturing Technology, MEAMT 2018
作者: Jin, Kaiwen Li, Qingbao Chen, Zhifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan China
How to locate the target function faster and more accurately is a key problem of Automatic Reverse-engineering of Software Programs. In order to solve this problem, a target function location method based on code cove... 详细信息
来源: 评论
Malware analysis platform based on software gene for cyberspace security practice teaching  2
Malware analysis platform based on software gene for cybersp...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Liu, Fudong Zhang, Ping Hou, Yifan Wang, Lixin Shan, Zheng Wang, Junchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r... 详细信息
来源: 评论
Register one-to-one mapping strategy in dynamic binary translation
Register one-to-one mapping strategy in dynamic binary trans...
收藏 引用
International Conference on Network Security and Communication engineering, NSCE 2014
作者: Cui, Y.N. Pang, J.M. Shan, Z. Yue, F. State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic Binary Translation (DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of Alpha. However, there exist some factors that impede its performance: high ... 详细信息
来源: 评论
Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier  2021
Inter-domain Link Inference with Confidence Using Naïve Bay...
收藏 引用
2021 13th International Conference on Machine Learning and computing, ICMLC 2021
作者: Zhao, Yi Liu, Yan Guo, XiaoYu Sui, ZhongHang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Inter-domain link inference is not only important for network security and fault diagnosis, but also helps to conduct research on inter-domain congestion detection and network resilience assessment. Current researches... 详细信息
来源: 评论
Semantic Understanding of Source and Binary Code based on Natural Language Processing  4
Semantic Understanding of Source and Binary Code based on Na...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Zhang, Zhongtang Liu, Shengli Yang, Qichao Guo, Shichen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op... 详细信息
来源: 评论
RSM-PA:Research on Route Selection Method of Inter-domain Routing System Based on Path Availability  23
RSM-PA:Research on Route Selection Method of Inter-domain Ro...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhu, Huihu Qiu, Han Zhu, Junhu Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The inter-domain routing system is the key infrastructure of the Internet. However, BGP does not consider the link state in the routing selection process. As a result, when the inter-domain routing system faces securi... 详细信息
来源: 评论
Moving Target Defense Decision-Making Method: A Dynamic Markov Differential Game Model  7
Moving Target Defense Decision-Making Method: A Dynamic Mark...
收藏 引用
7th ACM Workshop on Moving Target Defense, MTD 2020
作者: Zhang, Hengwei Tan, Jinglei Liu, Xiaohu Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ... 详细信息
来源: 评论