咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 381 篇 期刊文献

馆藏范围

  • 1,053 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 113 篇 信息与通信工程
    • 71 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1053 条 记 录,以下是181-190 订阅
排序:
Network Device Identification Based on MAC Boundary Inference  7th
Network Device Identification Based on MAC Boundary Inferenc...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Guo, Xinmiao Li, Xiangnan Li, Ruixiang Wang, Xiuting Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely... 详细信息
来源: 评论
Network security assessment based on full host-based attack graph
Network security assessment based on full host-based attack ...
收藏 引用
2020 International Conference on Cyberspace Innovation of advanced Technologies, CIAT 2020
作者: Wang, Xiao-Fan Zhou, Tian-Yang Zhu, Jun-Hu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to... 详细信息
来源: 评论
Quantum computing control system configuration optimizer with adaptive genetic algorithm  9
Quantum computing control system configuration optimizer wit...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and Computer engineering, ISAEECE 2024
作者: Huang, Shucheng Wang, Junchao Pang, Jianmin Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
As quantum computing continues to advance, the complexity of control systems for superconducting qubits also increases. This paper presents a genetic algorithm (GA) approach for optimizing the control systems in quant... 详细信息
来源: 评论
Binary vulnerability mining technology based on neural network feature fusion  5
Binary vulnerability mining technology based on neural netwo...
收藏 引用
5th International Conference on advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Han, Wenjie Pang, Jianmin Zhou, Xin Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien... 详细信息
来源: 评论
IPv6 Landmark Mining Based on Domain Name Screening and IPv4-IPv6 Connection  21
IPv6 Landmark Mining Based on Domain Name Screening and IPv4...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Liu, Minghao Sun, Yuchen Liu, Chong Zu, Shuodi Zhang, Fan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Existing IP landmark mining technologies mainly focus on IPv4, and less attention is paid to the association between IPv4 and IPv6. The current IPv6 network has fewer reliable landmarks with limited accuracy, while th... 详细信息
来源: 评论
Automatic binary de-obfuscation based compiler optimization  6th
Automatic binary de-obfuscation based compiler optimization
收藏 引用
6th International Conference on Swarm Intelligence, ICSI 2015 held in conjunction with the 2nd BRICS Congress on Computational Intelligence, CCI 2015
作者: Lin, Wei Fei, Jin-Long Cai, Rui-Jie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f... 详细信息
来源: 评论
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks  16
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
Dynamic Network Change Detection via Dynamic Network Representation Learning  14th
Dynamic Network Change Detection via Dynamic Network Represe...
收藏 引用
14th EAI International Conference on Communications and Networking in China, ChinaCom 2019
作者: Feng, Hao Liu, Yan Zhou, Ziqiao Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The structure of the network in the real world is very complex, as the dynamic network structure evolves in time dimension, how to detect network changes accurately and further locate abnormal nodes is a research hots... 详细信息
来源: 评论
Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure  5th
Improvement of Differential Fault Attack Based on Lightweigh...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Gao, Yang Wang, Yongjuan Yuan, Qingjun Wang, Tao Wang, Xiangbin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
In this paper, we focus on differential fault attack on lightweight block ciphers with GFN (Generalized Feistel Networks) structure. With regard to fault injection model and differential equations solving, two improve... 详细信息
来源: 评论
Steady-state Topology Discovery of Target Networks Based on Statistics Method  5th
Steady-State Topology Discovery of Target Networks Based on ...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Yang, Di Liu, Yan Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The progress of target network topology discovery research is slow due to the uncertainty of the target network range, and large-scale network measurement activities lead to a large accumulation of "false links&q... 详细信息
来源: 评论