咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是311-320 订阅
排序:
Programmable logic controller memory management vulnerability analysis  3
Programmable logic controller memory management vulnerabilit...
收藏 引用
2022 3rd International Conference on Signal Processing and Computer Science, SPCS 2022
作者: Geng, Yangyang Ma, Rongkuan Wei, Qiang Wang, Wenhai State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou310000 China
Programmable logic controller (PLC) is omnipresent in industrial control system (ICS), which plays an imperative part in critical infrastructures. However, once a PLC is compromised by an attacker, it will create dest... 详细信息
来源: 评论
A Review on IoT Botnet  2021
A Review on IoT Botnet
收藏 引用
2nd International Conference on computing and Data Science, CONF-CDS 2021
作者: Zhao, Hao Shu, Hui Xing, Ying State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China
The rapid development of the Internet of Things (IoT) also generates security threats that cannot be ignored. This paper lists the development history of botnets, introduces representative IoT botnets, and reveals the... 详细信息
来源: 评论
Secure analysis on entire software-defined network using coloring distribution model
Secure analysis on entire software-defined network using col...
收藏 引用
作者: Xin-Hui, Zhao Ze-Hui, Wu Xiao-Bin, Song Qing-Xian, Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Physical Education College of Zhengzhou University Zhengzhou China
Software Definition Network (SDN) has three features as separation of control and forwarding, unified management of configuration, and dynamic programming, which have greatly improved flexibility of network deployment... 详细信息
来源: 评论
A new static vulnerabilities analysis algorithm for PHP codes  3
A new static vulnerabilities analysis algorithm for PHP code...
收藏 引用
3rd Annual International Conference on Network and Information Systems for Computers, ICNISC 2017
作者: Yan, Xue-Xiong Ma, Heng-Tai Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Beijing China
as for detecting taint-style vulnerabilities in PHP codes, this paper introduces function calling control vulnerability, which is a new kind of taint-style vulnerabilities in PHP codes without sensitive function, and ... 详细信息
来源: 评论
An out-of-the-box dynamic binary analysis tool for ARM-based linux
An out-of-the-box dynamic binary analysis tool for ARM-based...
收藏 引用
5th International Symposium on Cyberspace Safety and Security, CSS 2013
作者: Wang, Zhenyu Ye, Yanqiu Wang, Ruimin Zhengzhou Institute of Information Science and Technology Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic binary analysis has demonstrated its strength in solving a wide-spectrum of computer security problems. However, existing DBA tools don't support ARM-based OS. The latest version of Valgrind can support AR... 详细信息
来源: 评论
Haica: A High Performance computing & Artificial Intelligence Fused computing Architecture  1
收藏 引用
22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022
作者: Chen, Zhengbo Zheng, Fang Guo, Feng Yu, Qi Chen, Zuoning Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Chinese Academy of Engineering Beijing China
In recent years, HPC and AI fusion, which refers to applying AI technology to traditional HPC applications, has become a new trend. HPC and AI fusion requires supports for multiple precisions used in both domains. Whi... 详细信息
来源: 评论
An Improved Authenticated key Agreement Protocol for IoT and Cloud Server  5th
An Improved Authenticated Key Agreement Protocol for IoT an...
收藏 引用
5th International Conference on Security and Privacy in New computing Environments, SPNCE 2022
作者: Ma, Yongliu Ma, Yuqian Cheng, Qingfeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou450001 China
The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of information transmission between IoT devices and servers. Recently, r... 详细信息
来源: 评论
Circuit Simulation and Optimization of Quantum Search Algorithm  6
Circuit Simulation and Optimization of Quantum Search Algori...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Liu, Xiaonan Zhao, Chenyan Xie, Haoshan Liu, Zhengyu State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University China School of Computer and Artificial Intelligence ZhengZhou University China
At present, the scale of quantum computers in the real sense is still small, and quantum simulation has become one of the important ways of quantum theory research, grover quantum search algorithm is suitable for the ... 详细信息
来源: 评论
Multi-Variant Execution Research of Software Diversity
Multi-Variant Execution Research of Software Diversity
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Liu, Zhenwu Zhang, Zheng Zhang, Jiexin Liu, Hao State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University ZhengZhou HeNan450001 China
As more and more software products are threatened by malicious reverse analysis, along with software products are pirated, tampered with and so on, it is of great significance to study software security protection tec... 详细信息
来源: 评论
A Pipelining Loop Optimization Method for Dataflow Architecture
收藏 引用
Journal of Computer Science & Technology 2018年 第1期33卷 116-130页
作者: Xu Tan Xiao-Chun Ye Xiao-Wei Shen Yuan-Chao Xu Da Wang Lunkai Zhang Wen-Ming Li Dong-Rui Fan Zhi-Min Tang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing 1000J9 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China College of Information Engineering Capital Normal University Beijing 100048 China Department of Computer Science The University of Chicago Chicago IL 60637 U.S.A.
With the coming of exascale supercomputing era, power efficiency has become the most important obstacle to build an exascale system. Dataflow architecture has native advantage in achieving high power efficiency for sc... 详细信息
来源: 评论