咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是301-310 订阅
排序:
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing  2
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing
收藏 引用
2nd International Conference on Consumer Electronics and Computer engineering, ICCECE 2022
作者: Zhang, Hao Dong, Weiyu Jiang, Liehui School of Cyber Science and Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the mainstream web application automated vulnerability detection methods. Because of its black box characteristics, it can be used to detect vulnerabilities without knowing the source code of the tar... 详细信息
来源: 评论
Exploitability Analysis of Public Component Library Vulnerabilities Based on Taint Analysis  7
Exploitability Analysis of Public Component Library Vulnerab...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Yuan, Huijie Wang, Yunchao Zong, Guoxiao Lv, Zhuo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Grid Electric Power Research Institute Zhengzhou China
The reuse of public component libraries has contributed to the field of computer science because of its low implementation time and high production efficiency. However, the vulnerabilities in libraries can be more ser... 详细信息
来源: 评论
Potential Indicator for Continuous Emotion Arousal by Dynamic Neural Synchrony  4th
Potential Indicator for Continuous Emotion Arousal by Dyna...
收藏 引用
4th International Workshop on Human Brain and Artificial Intelligence, HBAI 2024
作者: Pan, Guandong Wu, Zhaobang Yang, Yaqian Wang, Xin Liu, Longzhao Zheng, Zhiming Tang, Shaoting School of Computer Science and Engineering Beihang University Beijing100191 China Institute of Artificial Intelligence Beihang University Beijing100191 China Key Laboratory of Mathematics Informatics and Behavioral Semantics Beihang University Beijing100191 China Institute of Medical Artificial Intelligence Binzhou Medical University Yantai264003 China Zhongguancun Laboratory Beijing100094 China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University Beijing100191 China PengCheng Laboratory Shenzhen518055 China State Key Lab of Software Development Environment Beihang University Beijing100191 China
The need for automatic and high-quality emotion annotation is paramount in applications such as continuous emotion recognition and video highlight detection, yet achieving this through manual human annotations is chal... 详细信息
来源: 评论
Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks
收藏 引用
Computers, Materials & Continua 2018年 第11期57卷 243-260页
作者: Daofu Gong Yan Chen Haoyu Lu Zhenyu Li Yibing Han Zhengzhou Science and Technology Institute Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer Science University of YorkYork YO105GHUK
To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed *** this scheme,the image is first partitioned into 2×2 size ***,the high 5 bits of a block’s... 详细信息
来源: 评论
Potential Indicator for Continuous Emotion Arousal by Dynamic Neural Synchrony
arXiv
收藏 引用
arXiv 2025年
作者: Pan, Guandong Wu, Zhaobang Yang, Yaqian Wang, Xin Liu, Longzhao Zheng, Zhiming Tang, Shaoting School of Computer Science and Engineering Beihang University Beijing100191 China Institute of Artificial Intelligence Beihang University Beijing100191 China Key laboratory of Mathematics Informatics and Behavioral Semantics Beihang University Beijing100191 China Institute of Medical Artificial Intelligence Binzhou Medical University Yantai264003 China Zhongguancun Laboratory Beijing100094 China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University Beijing100191 China PengCheng Laboratory Shenzhen518055 China State Key Lab of Software Development Environment Beihang University Beijing100191 China
The need for automatic and high-quality emotion annotation is paramount in applications such as continuous emotion recognition and video highlight detection, yet achieving this through manual human annotations is chal... 详细信息
来源: 评论
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection
收藏 引用
Computers, Materials & Continua 2018年 第7期56卷 151-167页
作者: Yue Zhang Dengpan Ye Junjun Gan Zhenyu Li Qingfeng Cheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Computer School of Wuhan University Wuhan 430072China Department of Computer Science University of YorkYork YO105GHUK
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this pape... 详细信息
来源: 评论
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System  3
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
3rd International Conference on advanced Information Science and System, AISS 2021
作者: Liu, Jinjin Chen, Zhifeng Li, Xiaonan Wei, Tongxin School of Computer Science Zhongyuan University of Technology China and State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer Science Zhongyuan University of Technology China School of Cyberspace Security Zhengzhou University China
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
A Note on Determine the Greatest Common Subfamily of Two NFSRs by Grbner Basis
收藏 引用
Journal of Systems engineering and Electronics 2015年 第5期26卷 1231-1242页
作者: WANG Zhongxiao QI Wenfeng TIAN Tian Luoyang University of Foreign Language State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
For nonlinear feedback shift registers (NFSRs), their greatest common subfamily may be not unique. Given two NFSRs, the authors only consider the case that their greatest common subfamily exists and is unique. If th... 详细信息
来源: 评论
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
2021 IEEE Conference on Telecommunications, Optics and Computer Science, TOCS 2021
作者: Li, Zhuolun Kang, Fei Yu, Pu Shu, Hui Zhengzhou University School of Software Zhengzhou China Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论
Cross-Network User Matching Based on Association Strength  11th
Cross-Network User Matching Based on Association Strength
收藏 引用
11th International Conference on Computer engineering and Networks, CENet2021
作者: Jiang, Qiuyan Gong, Daofu Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Qingdao Agricultural University Qingdao266001 China
Cross-network user matching is the one of the fundamental problems in social network fusion and analysis. This paper proposes an unsupervised algorithm based on association strength to address this problem. Specifical... 详细信息
来源: 评论