咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是231-240 订阅
排序:
Reducing DRAM refreshing in an error correction manner
收藏 引用
Science China Chemistry 2015年 第12期58卷 186-199页
作者: ZHU DanFeng WANG Rui WEI YanJiang QIAN DePei School of Computer Science and Engineering Beihang University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dynamic random access memory(DRAM) is facing the challenge of technology scaling. The decreasing feature size makes it harder to make DRAM cells which can keep the current data-holding time. When DRAM cells cannot hol... 详细信息
来源: 评论
On the complete weight distributions of quantum error-correcting codes
收藏 引用
Chinese Physics B 2023年 第5期32卷 272-287页
作者: 杜超 马智 熊茂胜 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenghzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhenghzhou 450001China Department of Mathematics Hong Kong University of Science and TechnologyHong KongChina
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... 详细信息
来源: 评论
VFDETECT: A Vulnerable Code Clone Detection System Based on Vulnerability Fingerprint  3
VFDETECT: A Vulnerable Code Clone Detection System Based on ...
收藏 引用
2017 IEEE 第3届信息技术与机电一体化工程国际学术会议(ITOEC 2017)
作者: Zhen Liu Qiang Wei Yan Cao State Key Laboratory of Mathematical Engineering and Advanced Computing China National Digital Switching System Engineering and Technological Research Center
Vulnerable code reuse in open source software is a serious threat to software ***,the existing highefficiency methods for vulnerable code clone detection have a large number of false-nega
来源: 评论
Optimizing execution for pipelined-based distributed deep learning in a heterogeneously networked GPU cluster
Optimizing execution for pipelined-based distributed deep le...
收藏 引用
作者: Zhang, Jinghui Zhan, Jun Li, Jiange Jin, Jiahui Qian, Lei School of Computer Science and Engineering Southeast University Nanjing China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi China
Exorbitant resources (computing and memory) are required to train a deep neural network (DNN). Often researchers deploy an approach that uses distributed parallel training to acquire larger models faster on GPUs. This... 详细信息
来源: 评论
Empirical investigation of stochastic local search for maximum satisfiability
收藏 引用
Frontiers of Computer Science 2019年 第1期13卷 86-98页
作者: Yi CHU Chuan LUO Shaowei CAI Haihang YOU State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China University of Chinese Academy of Sciences Beijing 100049China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China
The maximum satisfiability (MAX-SAT)problem is an important NP-hard problem in theory,and has a broad range of applications in *** local search (SLS)is becoming an increasingly popular method for solving ***,a powerfu... 详细信息
来源: 评论
Rotation Model Enhancement for Adversarial Attack
Rotation Model Enhancement for Adversarial Attack
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Li, Zheming Liu, Hao Yang, Bo Li, Chenwei Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  6
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Li, Chenwei Li, Zheming Yang, Bo Zhang, Hengwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论
Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method
收藏 引用
Computers, Materials & Continua 2019年 第4期59卷 199-214页
作者: Yang Wu Weiping Shang Jiahao Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002China School of Telecommunications Engineering Xidian UniversityXi’an710071China Zhuhai Campus of Beijing Normal University Zhuhai519000China
Robust data hiding techniques attempt to construct covert communication in a lossy public ***,the existing robust JPEG steganographic algorithms cannot overcome the side-information missing ***,this paper proposes a n... 详细信息
来源: 评论
Traceability Method of Network Attack Based on Evolutionary Game
Traceability Method of Network Attack Based on Evolutionary ...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Zhang, Xiaoning Sun, Pengyu Liu, Xiaohu Ma, Junqiang Zhang, Yuchen State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz... 详细信息
来源: 评论
A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS
收藏 引用
Journal of Electronics(China) 2013年 第2期30卷 198-203页
作者: Jiao Luyao Li Yifa Qiao Shuaiting Department of Information Science Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our ne... 详细信息
来源: 评论