咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是241-250 订阅
排序:
Localization Algorithm of Indoor Wi-Fi Access Points Based on Signal Strength Relative Relationship and Region Division
收藏 引用
Computers, Materials & Continua 2018年 第4期55卷 71-93页
作者: Wenyan Liu Xiangyang Luo Yimin Liu Jianqiang Liu Minghao Liu Yun Q.Shi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China School of Electronics and Communication Engineering Zhengzhou University of AeronauticsZhengzhou 450001China New Jersey Institute of Technology NJUSA
Precise localization techniques for indoor Wi-Fi access points(APs)have important application in the security ***,due to the interference of environment factors such as multipath propagation and NLOS(Non-Line-of-Sight... 详细信息
来源: 评论
A GAN-based Method for Generating SQL Injection Attack Samples  10
A GAN-based Method for Generating SQL Injection Attack Sampl...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Lu, Dongzhe Fei, Jinlong Liu, Long Li, Zecun Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the simplicity of implementation and high threat level, SQL injection attacks are one of the oldest, most prevalent, and most destructive types of security attacks on Web-based information systems. With the con... 详细信息
来源: 评论
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing  23
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023
作者: Li, Shun-Hang Zhou, Gang Li, Zhi-Bo Lu, Ji-Cang Huang, Ning-Bo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod... 详细信息
来源: 评论
IBM Small-Scale Superconducting Quantum Computer Not Gate Error Test
IBM Small-Scale Superconducting Quantum Computer Not Gate Er...
收藏 引用
2021 International Conference on Electronic Communication, Computer Science and Technology, ECCST 2021
作者: He, Ming Liu, Xiaonan Wang, Junchao An, Jiale State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Henan Zhengzhou450001 China
Quantum NOT gates play an important role in the process of quantum information conversion. However, when the X-gate operation is executed on a real quantum computer, there is a large deviation between the actual opera... 详细信息
来源: 评论
Practical software diversification tool chain for dissimilar redundancy architecture  9
Practical software diversification tool chain for dissimilar...
收藏 引用
9th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2020
作者: Zhang, Gaofei Zhang, Zheng Wang, Jiang Ji, Xinsheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
With the rapid development of the information society, there are corresponding tool solutions for various daily problems. Aiming at the complex generation process and inconvenient operation of heterogeneous components... 详细信息
来源: 评论
Vulnerability Sample Analysis Based on Dynamic Binary Platform
Vulnerability Sample Analysis Based on Dynamic Binary Platfo...
收藏 引用
2021 International Conference on Aviation Safety and Information Technology, ICASIT 2021
作者: Bu, Wenjuan Kang, Fei Zhao, Yuntian Xu, Jianbo State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Henan Zhengzhou450000 China
Based on the existing vulnerability exploitation detection technology, this paper analyzes the buffer overflow vulnerability exploitation process, and detects vulnerability triggering, protection mechanism bypassing a... 详细信息
来源: 评论
Exploiting historical diffusion data to maximize information spread in social networks
International Journal of Database Theory and Application
收藏 引用
International Journal of Database Theory and Application 2015年 第2期8卷 193-204页
作者: Zhou, Donghao Han, Wenbao Wang, Yongjun College of Computers National University of Defense Technology Changsha China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China China
Information spread maximization is to find a small subset of nodes in social network such that they can maximize the expected spread of information. In this paper, we attempt harnessing historical information cascades... 详细信息
来源: 评论
Analysis of cryptosystem recognition scheme based on Euclidean distance feature extraction in three machine learning classifiers  3
Analysis of cryptosystem recognition scheme based on Euclide...
收藏 引用
2019 3rd International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2019
作者: Zhao, Yaqun Fan, Sijie State Key Laboratory of Mathematical Engineering and Advanced Computing 450001 China State Key Laboratory of Cryptography and Science 450001 China
In reality, many cryptographic analysis techniques are based on a specific cryptographic system or a large number of encrypted ciphertext. The identification and detection of cryptographic system is of great significa... 详细信息
来源: 评论
Interest Points Analysis for Internet Forum Based on Long-Short Windows Similarity
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3247-3267页
作者: Xinghai Ju Jicang Lu Xiangyang Luo Gang Zhou Shiyu Wang Shunhang Li Yang Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China School of Computing and Information Systems Singapore Management University188065Singapore College of Computer Science and Big Data Fuzhou UniversityFuzhou350116China
For Internet forum Points of Interest(PoI),existing analysis methods are usually lack of usability analysis under different conditions and ignore the long-term variation,which lead to blindness in method *** address t... 详细信息
来源: 评论
An landmark evaluation algorithm based on router identification and delay measurement  5th
An landmark evaluation algorithm based on router identificat...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Ma, Te Liu, Fenlin Zhang, Fan Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou China
City-level landmarks serve as an important foundation for achieving city-level and higher-precision IP geolocation. On the basis of the feature that router host names in network-developed areas often imply geographica... 详细信息
来源: 评论