咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是141-150 订阅
排序:
A Research and Verification of MFC Framework-aware Virus Infection Technology  3
A Research and Verification of MFC Framework-aware Virus Inf...
收藏 引用
3rd International Conference on Computer Vision, Image and Deep Learning and International Conference on Computer engineering and Applications, CVIDL and ICCEA 2022
作者: Guo, Wang Li, Yang Sha, Zihan Bu, Wenjuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Portable Executable (PE) virus technology is an important threat factor in the field of network security. With continuous upgrading of malware detection technology, virus infection technology will also gradually evolv... 详细信息
来源: 评论
Software supply chain analysis based on function similarity  4
Software supply chain analysis based on function similarity
收藏 引用
2020 4th International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2020
作者: Sun, Wenjie Shan, Zheng Liu, Fudong Li, Xingwei Qiao, Meng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen... 详细信息
来源: 评论
ALEmu: A Framework for Application-layer Programs Emulation of Embedded Devices  4
ALEmu: A Framework for Application-layer Programs Emulation ...
收藏 引用
4th International Conference on Computer engineering and Application, ICCEA 2023
作者: He, Heng Xiong, Xiaobing Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ... 详细信息
来源: 评论
LOM: A Website Fingerprinting Defense Method based on Local Optimal Mutation  10
LOM: A Website Fingerprinting Defense Method based on Local ...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Wang, Jue Zhu, Yuefei Lin, Wei Li, Ding Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Website Fingerprinting (WF) is a traffic analysis attack. The potential local adversary can infer the user's web activity by extracting implicit pattern information from traffic traces. Leveraging the latest advan... 详细信息
来源: 评论
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Software library functions implementation of a customized High-Level Synthesis environment
Software library functions implementation of a customized Hi...
收藏 引用
2013 2nd International Conference on Frontiers of Energy and Environment engineering, ICFEEE 2013
作者: Dang, Lin-Yu Pang, Jian-Min Yu, Jin-Tao Yang, Jin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Compared with traditional Hardware Design Languages (HDL) programming, High-Level Synthesis (HLS) can reduce the design difficulty of reconfigurable system. Most HLS tools target for systems on programmable chips, and... 详细信息
来源: 评论
An Intrusion Detection Feature Selection Method Based on Improved Mutual Information  6
An Intrusion Detection Feature Selection Method Based on Imp...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Qi, Zan Fei, Jinlong Wang, Jue Li, Xue State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u... 详细信息
来源: 评论
Dynamic Instrumentation Framework Based on Entity Equipment  6
Dynamic Instrumentation Framework Based on Entity Equipment
收藏 引用
6th IEEE International Conference on Computer and Communication Systems, ICCCS 2021
作者: Jiangtao, Zhao Dong, Weiyu Zhang, Haotian Lin, Jian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic binary analysis is an important way of program analysis. Most of the existing dynamic analysis tools are based on dynamic binary instrumentation platforms. The existing gdb tool, which is often used for debugg... 详细信息
来源: 评论
UEFI Security Threats Introduced by S3 and Mitigation Measure  7
UEFI Security Threats Introduced by S3 and Mitigation Measur...
收藏 引用
7th International Conference on Signal and Image Processing, ICSIP 2022
作者: Jiao, Weihua Li, Qingbao Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
UEFI is widely used as the new generation BIOS, except for some new features, it also brings some security issues. The threat brought by S3 sleep jeopardizes the security of computer platforms seriously. An attacker c... 详细信息
来源: 评论
Leveraging markov chain and optimal mutation strategy for smart fuzzing
Leveraging markov chain and optimal mutation strategy for sm...
收藏 引用
2014 International Conference on Information and Network Security, ICINS 2014
作者: Ouyang, Yongji Wu, Zehui Mu, Qing Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzz testing is an important way of vulnerability discovery, however, the existing fuzzers based on symbolic execution and others have inherent shortcomings like needing more computing resource, in-depth analysis and ... 详细信息
来源: 评论