咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是281-290 订阅
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions  25th
Towards Efficient and Privacy-Preserving Anomaly Detection ...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Song, Yuhan Zhu, Yuefei Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha... 详细信息
来源: 评论
A Honeywords Generation Method Based on Deep Learning and Rule-Based Password Attack  4th
A Honeywords Generation Method Based on Deep Learning and Ru...
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Yang, Kunyu Hu, Xuexian Zhang, Qihui Wei, Jianghong Liu, Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guilin University of Electronic Technology Guilin China
Honeywords is a simple and efficient method that can help the authentication server to detect password leaks. The indistinguishability between generated honeywords and real passwords is the key to the honeywords gener... 详细信息
来源: 评论
Design and implementation of a domain specific rule engine  1
收藏 引用
22nd Annual Conference on Computer engineering and Technology, NCCET 2018
作者: Chen, Mengdong Zhou, Xinjian Wu, Dong Xie, Xianghui State Key Laboratory of Mathematical Engineering and Advanced Computing Henghua Science and Technology Park WuxiJiangsu214125 China
Security strings are often needed in identity authentication mechanism. Security strings recovery is a reverse process, which does much calculations on a large amount of possible strings to find the right one, so that... 详细信息
来源: 评论
Stochastic network calculus based delay analysis for window flow controller
Stochastic network calculus based delay analysis for window ...
收藏 引用
2014 International Conference on Information Technology and Application, ITA2014
作者: Li, Baoliang Dou, Wenhua Zhao, Jie National University of Defense Technology Changsha China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the network with flow control, the output usually feedbacks some information to the input, controlling the data transmission and preventing buffer overflow. Flow control transforms the traditional forward networks ... 详细信息
来源: 评论
An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 2573-2585页
作者: Yichao Zang Tairan Hu Tianyang Zhou Wanjiang Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China National Engineering Technology Research Center of the Digital Switching System Zhengzhou450000China NUS Business School National University of SingaporeSingapore119077Singapore
Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration *** rule mining,a data mining technique,has been studied and explor... 详细信息
来源: 评论
Efficient Cache Strategy for Face Recognition System  20
Efficient Cache Strategy for Face Recognition System
收藏 引用
5th International Conference on Big Data and computing, ICBDC 2020
作者: Zong, Guoxiao Li, Qingbao Zhang, Ping Zhang, Guimin Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing NO.62 Science Avenue ZhengzhouCN 450001 China
Recently, the need for real-time deep learning applications, such as face recognition system, implement on the embedded devices is increasing. At the system level, caching system is one of the most effective ways to r... 详细信息
来源: 评论
mOT+: An efficient and secure identity-based diffie-hellman protocol over RSA group  6th
mOT+: An efficient and secure identity-based diffie-hellman ...
收藏 引用
6th International Conference on Trusted Systems, INTRUST 2014
作者: Tian, Baoping Wei, Fushan Ma, Chuangui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou450001 China
In 2010, Rosario Gennaro et al. revisited the old and elegant Okamoto-Tanaka scheme and presented a variant of it called mOT. How-ever the compromise of ephemeral private key will lead to the leakage of the session ke... 详细信息
来源: 评论
Automatic Mining of Security-Sensitive Functions from Source Code
收藏 引用
Computers, Materials & Continua 2018年 第8期56卷 199-210页
作者: Lin Chen Chunfang Yang Fenlin Liu Daofu Gong Shichang Ding Zhengzhou Science and Technology Institute Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China University of Göttingen Goldschmidtstr.737077 GöttingenGermany
When dealing with the large-scale program,many automatic vulnerability mining techniques encounter such problems as path explosion,state explosion,and low *** of large-scale programs based on safety-sensitive function... 详细信息
来源: 评论
A Relation-Oriented Method for Joint Entity and Relation Extraction Based on Neural Network  21
A Relation-Oriented Method for Joint Entity and Relation Ext...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Hu, Hongwei Yin, Meijuan Liu, Xiaonan Key Laboratory of Cyberspace Situation Awareness of Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Entity and relation extraction is a basic task of information extraction in natural language processing. At present, Entity and relation extraction based on artificial intelligence has been widely studied, but most me... 详细信息
来源: 评论
Can We Half the Work with Double Results: Rethinking Machine Learning Algorithms for Network Intrusion Detection System  9
Can We Half the Work with Double Results: Rethinking Machine...
收藏 引用
9th International Conference on advanced Cloud and Big Data, CBD 2021
作者: Li, Shuren Lu, Yifei Li, Jingqi Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Machine Learning algorithms have been wildly applied in the intrusion detection system(IDS). However, in the IoT environment where the resources are limited and the flow data is of huge amount, we need more efficient ... 详细信息
来源: 评论