咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是251-260 订阅
排序:
Identification of global histogram equalization by modeling gray-level cumulative distribution
Identification of global histogram equalization by modeling ...
收藏 引用
2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013
作者: Yuan, Hai-Dong Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing China
Previous studies have shown how to 'fingerprint' certain image processing operation. In this paper, we model the gray-level cumulative distribution of histogram-equalized image as discrete identity function, w... 详细信息
来源: 评论
A parallel target-directed analysis method for malware behaviors
A parallel target-directed analysis method for malware behav...
收藏 引用
International Conference on Cyberspace Technology, CCT 2014
作者: Qin, Yanfeng Wang, Qingxian Zeng, Yongjun Xi, Qi State Key Laboratory of Mathematical Engineering and Advanced Computing China Luoyang University of Foreign Languages China
To improve the efficiency of analyzing malware behaviors and increase the validity of the test data, this paper proposes a parallel target-directed analysis method for malware behaviors, which combines static analysis... 详细信息
来源: 评论
A Selection Strategy for Network Security Defense Based on a Time Game Model
A Selection Strategy for Network Security Defense Based on a...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Sun, Pengyu Zhang, Hengwei Ma, Junqiang Li, Chenwei Mi, Yan Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net... 详细信息
来源: 评论
Timing Strategy for Active Detection of APT Attack Based on FlipIt Model and Q-learning Method
Timing Strategy for Active Detection of APT Attack Based on ...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Liu, Zhilin Zhang, Hengwei Sun, Pengyu Mi, Yan Zhang, Xiaoning Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr... 详细信息
来源: 评论
Network Attack Intention Recognition Based on Signaling Game Model and Netlogo Simulation
Network Attack Intention Recognition Based on Signaling Game...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Zhang, Xiaoning Zhang, Hengwei Li, Chenwei Sun, Pengyu Liu, Zhilin Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes... 详细信息
来源: 评论
New strategy for searching disturbance vector of SHA-1 collision attack
收藏 引用
Science China(Information Sciences) 2017年 第12期60卷 280-282页
作者: Hao FENG Guang ZENG Wenbao HAN Yang YANG State Key Laboratory of Mathematical Engineering and Advanced Computing Centrum Wiskunde & Informatica Amsterdam 1098 XG Zhengzhou Information Science and Technology Institute Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 1... 详细信息
来源: 评论
A new socio-rational secret sharing scheme
收藏 引用
International Journal of Innovative computing and Applications 2017年 第1期8卷 21-30页
作者: Jin, Jianghao Zhou, Xie Ma, Chuangui Wang, Xu'an State Key laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China Department of Basic Courses Army Aviation Institute Beijing China Engineering University of CAPF Xi'anShanxi China
We introduce the concept of a socio-rational secret sharing scheme, in which shares are delivered based on players' reputation and the way they contact with other participants. At the secret sharing stage, weights... 详细信息
来源: 评论
Delay-Distance Correlation Study for IP Geolocation
收藏 引用
Wuhan University Journal of Natural Sciences 2017年 第2期22卷 157-164页
作者: DING Shichang LUO Xiangyang YE Dengpan LIU Fenlin The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 Henan China School of Computer Wuhan University Wuhan 430072Hubei China
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to... 详细信息
来源: 评论
NEXT:a neural network framework for next POI recommendation
收藏 引用
Frontiers of Computer Science 2020年 第2期14卷 314-333页
作者: Zhiqian ZHANG Chenliang LI Zhiyong WU Aixin SUN Dengpan YE Xiangyang LUO Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan 430072China Department of Computer Science The University of Hong KongPokfulam RoadHong Kong 999077China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore State Key Lab of Mathematical Engineering and Advanced Computing Zhengzhou 450001China
The task of next POI recommendations has been studied extensively in recent ***,developing a unified recommendation framework to incorporate multiple factors associated with both POIs and users remains challenging,bec... 详细信息
来源: 评论
Axiomatic approaches based on the software trustworthiness measure
Axiomatic approaches based on the software trustworthiness m...
收藏 引用
International Conference on Applied System Innovation, ICASI 2015
作者: Tao, H.W. Chen, Y.X. Pang, J.M. State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China MoE Engineering Center for Software/Hardware Co-Design Technology and Application East China Normal University Shanghai China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the outstanding problems of software trustworthiness, the measurement of software trustworthiness has aroused more and more concern. However, few researches pay attention to using more rigorous approaches in th...
来源: 评论