咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是321-330 订阅
排序:
Mining defects of result-sensitive function based on information entropy  6th
Mining defects of result-sensitive function based on informa...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Chen, Lin Yang, Chunfang Liu, Fenlin Gong, Daofu Yin, ZhongXu Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Result-sensitive function is a typical type of security-sensitive function. The misuse of result-sensitive functions often leads to a lot kinds of software defects. Existing defect detection methods based on code mini... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Ma, Zhaorui Zhang, Shicheng Chang, Yiheng Zhou, Qinglei Hu, Xinhao Li, Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450052 China Zhengzhou University of Light Industry Zhengzhou450002 China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
Efficient stego key recovery based on distribution differences of extracting message bits
Efficient stego key recovery based on distribution differenc...
收藏 引用
作者: Liu, Jiufen Gan, Junjun Wang, Junchao Xu, Che Luo, Xiangyang Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The extraction of embedded messages, i.e., extraction attacks are the ultimate purpose of steganalysis, with great practical significance to obtain covert communication content and covert communication forensics. For ... 详细信息
来源: 评论
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords
A two-factor authenticated key exchange protocol based on RS...
收藏 引用
作者: Wei, Fushan Ma, Jianfeng Ma, Chuangui Li, Xinghua School of Computer Science and Technology Xidian University Xian China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In order to reduce the damage of phishing and spyware attacks for password-based systems, this paper presents a novel two-factor authenticated key exchange protocol based on smart cards and dynamic one-time passwords.... 详细信息
来源: 评论
Improvement and optimization of consensus algorithm based on PBFT  4
Improvement and optimization of consensus algorithm based on...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Zhao, Liang Li, Bin Zhou, Qinglei Chen, Xiaojie Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper proposes an improved consensus algorithm based on PBFT(EBCR-PBFT). Firstly, The Modified Random Select(MRS) function is used to perform preliminary screening of network nodes, so as to solve the problem of ... 详细信息
来源: 评论
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system
A malware detection method using satisfiability modulo theor...
收藏 引用
作者: Xie, Yaobin Chang, Rui Jiang, Liehui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Nowadays programmable logic controllers (PLCs) are suffering increasing cyberattacks. Attackers could reprogram PLCs to inject malware that would cause physical damages and economic losses. These PLC malwares are high... 详细信息
来源: 评论
Factorization of odd integers as lattice search procedure  1
收藏 引用
9th International Symposium on Intelligence Computation and Applications, ISICA 2017
作者: Wang, Xingbo Foshan University Foshan CityGuangdong Province528000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The article puts forward a 3-dimensional searching approach that can factorize odd composite integers. The article first proves that, an odd composite number can be expressed by a trivariate function, then demonstrate... 详细信息
来源: 评论
A review of cryptographic algorithm recognition technology for binary code
A review of cryptographic algorithm recognition technology f...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Zhao, Chenxia Kang, Fei Yang, Ju Shu, Hui Zhengzhou University Zhengzhou Henan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo... 详细信息
来源: 评论
Feature selection method for image steganalysis based on weighted inner-inter class distance and dispersion criterion  19
Feature selection method for image steganalysis based on wei...
收藏 引用
2019 ACM Turing Celebration Conference - China, ACM TURC 2019
作者: Ma, Yuanyuan Luo, Xiangyang Li, Zhenyu Zhang, Yi Bors, Adrian G. State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Department of Computer Science University of York York United Kingdom
In order to improve the detection of hidden information in signals, additional features are considered as inputs for steganalysers. This research study proposes a feature selection method based on Weighted Inner-Inter... 详细信息
来源: 评论
A Scalable Attention Mechanism Based Neural Network for Text Classification  4
A Scalable Attention Mechanism Based Neural Network for Text...
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Zheng, Jianyun Pang, Jianmin Zhang, Xiaochuan Sun, Di Zhou, Xin Zhang, Kai Wang, Dong Li, Mingliang Wang, Jun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China Xi'An Institute of Surveying and Mapping Xi'an710000 China
In general, deep learning based text classification methods are considered to be effective but tend to be relatively slow especially for model training. In this work, we present a powerful, so-called "scalable at... 详细信息
来源: 评论