咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是271-280 订阅
排序:
A Neighbor Immunization Strategy to Block Virus Spreading on Networks  2
A Neighbor Immunization Strategy to Block Virus Spreading on...
收藏 引用
2nd Information Communication Technologies Conference, ICTC 2021
作者: Yaohui, Hao Yingze, Liu Baole, Zhao Qingxian, Wang Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
In order to achieve better effect on blocking virus propagation, a neighbor immunization strategy was proposed and verified in this paper. On email-EU real networks and on scale-free model network, the efficiencies of... 详细信息
来源: 评论
Collision attack framework on RIPEMD-128  2
Collision attack framework on RIPEMD-128
收藏 引用
2nd International Conference on Artificial Intelligence and advanced Manufacture, AIAM 2020
作者: Li, Jingyu Zeng, Guang Yang, Yang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Force Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing China
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In th... 详细信息
来源: 评论
Virtual Sample Generation for Retraining the Malicious PDF Detection Model  4
Virtual Sample Generation for Retraining the Malicious PDF D...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: He, Kang Liu, Long Lu, Dong-Zhe Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative vulnerabilities. Machine learning algorithms are developed to detect the maliciousness of PDF files. A... 详细信息
来源: 评论
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第5期18卷 377-384页
作者: WANG Xiaorui WANG Qingxian GUO Yudong LU Jianping Fourth Department PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Department of Communication Command Chongqing Communication Institute
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... 详细信息
来源: 评论
Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node  4
Anti-reconnaissance Model of Host Fingerprint Based on Virtu...
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Zhang, Tao Lu, Bin Li, Ding He, Kang Zhu, Yuefei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Information Engineering University Zhengzhou450001 China
Aiming at the problem of insufficient defense ability of fingerprint detection, the anti-reconnaissance model of host fingerprint based on virtual node is proposed. The model constructs periodically reconfigurable vir... 详细信息
来源: 评论
GCORE: A Gravitation-Based Approach for Chinese Open Relation
GCORE: A Gravitation-Based Approach for Chinese Open Relatio...
收藏 引用
International Conference on Computer Science and Mechanical Automation, CSMA 2015
作者: Wang, Yue Zhou, Gang Tian, Fei Nan, Yu Ma, Jiangtao Information and Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information and Engineering University Zhengzhou China
Traditional Relation Extraction (RE) trains individual extractors for pre-defined relations. Open Relation Extraction (ORE) can eschew domain-specific training data, tackle an unbounded number of relations, and scale ... 详细信息
来源: 评论
A Review of Few-Shot Network Traffic Classification Based on Deep Learning
A Review of Few-Shot Network Traffic Classification Based on...
收藏 引用
2023 International Conference on Mechatronics and Intelligent Control, ICMIC 2023
作者: Yang, Kai Wang, Ruo Nan Meng, Qi Meng, Long Qi, Zan Li, Xue Fei, Jin Long State Key Laboratory of Mathematical Engineering And Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
At present, deep learning has achieved excellent performance in the field of network traffic classification. However, deep learning relies on massive data-driven classification models. When the data set is small, it i... 详细信息
来源: 评论
A probabilistic framework of preference discovery from folksonomy corpus
收藏 引用
Frontiers of Computer Science 2017年 第6期11卷 1075-1084页
作者: Xiaohui GUO Chunming HU Richong ZHANG Jinpeng HUAI State Key Lab of Software Development Environment Beihang University Beijing 100191 China Institute of Advanced Computing Technology School of Computer Science and Engineering Beihang University Beijing 100191 China
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation... 详细信息
来源: 评论
An Improved spectral graph partition intelligent clustering algorithm for low-power wireless networks
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2019年 1-9页
作者: Chen, Ling Chen, Yan Wang, Yu Zhengzhou Science and Technology Institute Zhengzhou450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China College of Computer Science Henan University of Engineering Zhengzhou451191 China
Aiming at the problem of energy imbalance and low-energy efficiency in wireless sensor network, a novel energy-balanced clustering routing algorithm based on spectral graph partition is proposed in this paper, which f... 详细信息
来源: 评论
An Efficient Rule Processing Architecture Based on Reconfigurable Hardware  1
收藏 引用
23rd Annual Conference on Computer engineering and Technology, NCCET 2019
作者: Chen, Mengdong Ren, Xiujiang Xie, Xianghui State Key Laboratory of Mathematical Engineering and Advanced Computing Henghua Science and Technology Park WuxiJiangsu214125 China
In the recovery of security strings in identity authentication mechanism, the combination of dictionary and string transformation rules is an effective method. However, the processing of string transformation rules fa... 详细信息
来源: 评论