咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 381 篇 期刊文献

馆藏范围

  • 1,053 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 517 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 113 篇 信息与通信工程
    • 71 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1053 条 记 录,以下是221-230 订阅
排序:
Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 273-295页
作者: Yan Liu Wenyuan Fang Qiang Wei Yuan Zhao Liang Wang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China The School of Computing Newcastle UniversityNewcastle upon TyneNE45TGUK
Code defects can lead to software vulnerability and even produce vulnerability *** research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to som... 详细信息
来源: 评论
Code Level Context Sensitivity Exploration Algorithm
Code Level Context Sensitivity Exploration Algorithm
收藏 引用
2015 4th International Conference on Computer, Mechatronics, Control and Electronic engineering (ICCMCEE 2015)
作者: Yan Lijing Shan Zheng Xu Xiaoyan Xue Fei The State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University
The context sensitivity is an important property in program analysis which can improve the analysis accuracy of the function call context of the source codes and helps to improve the abilities of the compiler optimiza... 详细信息
来源: 评论
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning  16th
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Lear...
收藏 引用
16th International Conference on Information Security and Cryptology, Inscrypt 2020
作者: Su, Heng-Chuan Zhu, Xuan-Yong Ming, Duan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
In CRYPTO 2019, Gohr uses the residual network technology of artificial intelligence to build a differential distinguisher, and attacks the reduced-round Speck32/64. We tried this method to recover the keys for ten-ro... 详细信息
来源: 评论
Network traffic classification based on multi-head attention and deep metric learning  8
Network traffic classification based on multi-head attention...
收藏 引用
8th International Conference on Electronic Technology and Information Science, ICETIS 2023
作者: Lv, Zhuo Lu, Bin Li, Xue Qi, Zan State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China
Network traffic classification plays an important role in network resource management and security. The application of encryption techniques and the rapid increase in the size of network traffic have placed higher dem... 详细信息
来源: 评论
Research on Web application injection vulnerabilities detection method based on pattern matching
Research on Web application injection vulnerabilities detect...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Ma, Qican Wu, Zehui Wang, Xinlei Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin... 详细信息
来源: 评论
Automated Quantum Volume Test  2
Automated Quantum Volume Test
收藏 引用
2022 2nd International Conference on Electronics, Circuits and Information engineering, ECIE 2022
作者: Liu, Xiaonan He, Ming Wang, Junchao Xie, Haoshan Zhao, Chenyan Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As a benchmark for the overall performance of quantum computers, quantum volume has the advantage of being able to reflect the depth of running quantum circuits. But, the quantum volume test code provided by IBM needs... 详细信息
来源: 评论
Reducing DRAM refreshing in an error correction manner
收藏 引用
Science China Chemistry 2015年 第12期58卷 186-199页
作者: ZHU DanFeng WANG Rui WEI YanJiang QIAN DePei School of Computer Science and Engineering Beihang University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dynamic random access memory(DRAM) is facing the challenge of technology scaling. The decreasing feature size makes it harder to make DRAM cells which can keep the current data-holding time. When DRAM cells cannot hol... 详细信息
来源: 评论
On the complete weight distributions of quantum error-correcting codes
收藏 引用
Chinese Physics B 2023年 第5期32卷 272-287页
作者: 杜超 马智 熊茂胜 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenghzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhenghzhou 450001China Department of Mathematics Hong Kong University of Science and TechnologyHong KongChina
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... 详细信息
来源: 评论
VFDETECT: A Vulnerable Code Clone Detection System Based on Vulnerability Fingerprint  3
VFDETECT: A Vulnerable Code Clone Detection System Based on ...
收藏 引用
2017 IEEE 第3届信息技术与机电一体化工程国际学术会议(ITOEC 2017)
作者: Zhen Liu Qiang Wei Yan Cao State Key Laboratory of Mathematical Engineering and Advanced Computing China National Digital Switching System Engineering and Technological Research Center
Vulnerable code reuse in open source software is a serious threat to software ***,the existing highefficiency methods for vulnerable code clone detection have a large number of false-nega
来源: 评论
Optimizing execution for pipelined-based distributed deep learning in a heterogeneously networked GPU cluster
Optimizing execution for pipelined-based distributed deep le...
收藏 引用
作者: Zhang, Jinghui Zhan, Jun Li, Jiange Jin, Jiahui Qian, Lei School of Computer Science and Engineering Southeast University Nanjing China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi China
Exorbitant resources (computing and memory) are required to train a deep neural network (DNN). Often researchers deploy an approach that uses distributed parallel training to acquire larger models faster on GPUs. This... 详细信息
来源: 评论