咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是191-200 订阅
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks  16
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
Steady-state Topology Discovery of Target Networks Based on Statistics Method  5th
Steady-State Topology Discovery of Target Networks Based on ...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Yang, Di Liu, Yan Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The progress of target network topology discovery research is slow due to the uncertainty of the target network range, and large-scale network measurement activities lead to a large accumulation of "false links&q... 详细信息
来源: 评论
Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Gao, Yang Wang, Yongjuan Yuan, Qingjun Wang, Tao Wang, Xiangbin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
In this paper, we focus on differential fault attack on lightweight block ciphers with GFN (Generalized Feistel Networks) structure. With regard to fault injection model and differential equations solving, two improve... 详细信息
来源: 评论
Dynamic Network Change Detection via Dynamic Network Representation Learning  14th
Dynamic Network Change Detection via Dynamic Network Represe...
收藏 引用
14th EAI International Conference on Communications and Networking in China, ChinaCom 2019
作者: Feng, Hao Liu, Yan Zhou, Ziqiao Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The structure of the network in the real world is very complex, as the dynamic network structure evolves in time dimension, how to detect network changes accurately and further locate abnormal nodes is a research hots... 详细信息
来源: 评论
The attack surface shifting in the mimic defense system  4
The attack surface shifting in the mimic defense system
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Wang, Liqun Zhang, Zheng Li, Weichao Liu, Hao MEAC State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The notion of attack surface shifting is introduced to describe the situation of shifting the attack surface in the moving target defense system. However, the situation of shifting the attack surface in the mimic defe... 详细信息
来源: 评论
Analysis of security capability of MVX based on probabilistic attack and defense models  3
Analysis of security capability of MVX based on probabilisti...
收藏 引用
3rd International Conference on Computer Science and Communication Technology, ICCSCT 2022
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition... 详细信息
来源: 评论
A compact construction for non-monotonic online/offline CP-ABE scheme  10th
A compact construction for non-monotonic online/offline CP-A...
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Zhang, Junqi Cheng, Qingfeng Wei, Fushan Zhang, Xinglong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Nowadays the mobile devices are becoming the necessities in our life, while they are generally resource-constrained, CP-ABE schemes designed for mobile devices should have the property of low computational complexity,... 详细信息
来源: 评论
keyword search over encrypted data in cloud computing from lattices in the standard model  2nd
Keyword search over encrypted data in cloud computing from l...
收藏 引用
2nd International Conference on Cloud computing and Big Data, CloudCom-Asia 2015
作者: Gu, Chunxiang Zheng, Yonghui Kang, Fei Xin, Dan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As cloud computing becomes popular, more and more sensitive information are being centralized into the cloud. Hence, we need some mechanism to support operations on encrypted data in many applications in cloud. Public... 详细信息
来源: 评论
Building smart classroom of combinatorial mathematics based on PBL teaching model  10
Building smart classroom of combinatorial mathematics based ...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Yang, Benchao Zeng, Guang Yu, Gang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
With the prevalence of artificial intelligence and the continuous development of information-based teaching, the emergence of smart classrooms has provided a new teaching environment for classroom teaching. As a new a... 详细信息
来源: 评论
A formal android permission model based on the B method  10th
A formal android permission model based on the B method
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Ren, Lu Chang, Rui Yin, Qing Man, Yujia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The rapid development of Android devices brings the increase of security requirements, especially for access control. Recently, many enhancements have been put forward towards the Android permission mechanism. However... 详细信息
来源: 评论