咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是301-310 订阅
排序:
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing  2
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing
收藏 引用
2nd International Conference on Consumer Electronics and Computer engineering, ICCECE 2022
作者: Zhang, Hao Dong, Weiyu Jiang, Liehui School of Cyber Science and Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the mainstream web application automated vulnerability detection methods. Because of its black box characteristics, it can be used to detect vulnerabilities without knowing the source code of the tar... 详细信息
来源: 评论
Exploitability Analysis of Public Component Library Vulnerabilities Based on Taint Analysis  7
Exploitability Analysis of Public Component Library Vulnerab...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Yuan, Huijie Wang, Yunchao Zong, Guoxiao Lv, Zhuo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Grid Electric Power Research Institute Zhengzhou China
The reuse of public component libraries has contributed to the field of computer science because of its low implementation time and high production efficiency. However, the vulnerabilities in libraries can be more ser... 详细信息
来源: 评论
Self-embedding Image Watermarking based on Combined Decision Using Pre-offset and Post-offset Blocks
收藏 引用
Computers, Materials & Continua 2018年 第11期57卷 243-260页
作者: Daofu Gong Yan Chen Haoyu Lu Zhenyu Li Yibing Han Zhengzhou Science and Technology Institute Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer Science University of YorkYork YO105GHUK
To detect and recover random tampering areas,a combined-decision-based self-embedding watermarking scheme is proposed *** this scheme,the image is first partitioned into 2×2 size ***,the high 5 bits of a block’s... 详细信息
来源: 评论
An Image Steganography Algorithm Based on Quantization Index Modulation Resisting Scaling Attacks and Statistical Detection
收藏 引用
Computers, Materials & Continua 2018年 第7期56卷 151-167页
作者: Yue Zhang Dengpan Ye Junjun Gan Zhenyu Li Qingfeng Cheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Computer School of Wuhan University Wuhan 430072China Department of Computer Science University of YorkYork YO105GHUK
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this pape... 详细信息
来源: 评论
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System  3
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
3rd International Conference on advanced Information Science and System, AISS 2021
作者: Liu, Jinjin Chen, Zhifeng Li, Xiaonan Wei, Tongxin School of Computer Science Zhongyuan University of Technology China and State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer Science Zhongyuan University of Technology China School of Cyberspace Security Zhengzhou University China
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
A Review of Field Text Analysis
A Review of Field Text Analysis
收藏 引用
2021 IEEE Conference on Telecommunications, Optics and Computer Science, TOCS 2021
作者: Li, Zhuolun Kang, Fei Yu, Pu Shu, Hui Zhengzhou University School of Software Zhengzhou China Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Field text analysis is the process of using natural language processing technology to understand the Text and extract information from unstructured text data. In recent years, due to the increasing maturity of machine... 详细信息
来源: 评论
A Note on Determine the Greatest Common Subfamily of Two NFSRs by Grbner Basis
收藏 引用
Journal of Systems engineering and Electronics 2015年 第5期26卷 1231-1242页
作者: WANG Zhongxiao QI Wenfeng TIAN Tian Luoyang University of Foreign Language State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
For nonlinear feedback shift registers (NFSRs), their greatest common subfamily may be not unique. Given two NFSRs, the authors only consider the case that their greatest common subfamily exists and is unique. If th... 详细信息
来源: 评论
Cross-Network User Matching Based on Association Strength  11th
Cross-Network User Matching Based on Association Strength
收藏 引用
11th International Conference on Computer engineering and Networks, CENet2021
作者: Jiang, Qiuyan Gong, Daofu Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Qingdao Agricultural University Qingdao266001 China
Cross-network user matching is the one of the fundamental problems in social network fusion and analysis. This paper proposes an unsupervised algorithm based on association strength to address this problem. Specifical... 详细信息
来源: 评论
Programmable logic controller memory management vulnerability analysis  3
Programmable logic controller memory management vulnerabilit...
收藏 引用
2022 3rd International Conference on Signal Processing and Computer Science, SPCS 2022
作者: Geng, Yangyang Ma, Rongkuan Wei, Qiang Wang, Wenhai State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou310000 China
Programmable logic controller (PLC) is omnipresent in industrial control system (ICS), which plays an imperative part in critical infrastructures. However, once a PLC is compromised by an attacker, it will create dest... 详细信息
来源: 评论
A Review on IoT Botnet  2021
A Review on IoT Botnet
收藏 引用
2nd International Conference on computing and Data Science, CONF-CDS 2021
作者: Zhao, Hao Shu, Hui Xing, Ying State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China
The rapid development of the Internet of Things (IoT) also generates security threats that cannot be ignored. This paper lists the development history of botnets, introduces representative IoT botnets, and reveals the... 详细信息
来源: 评论