咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是331-340 订阅
排序:
Directer: A parallel and directed fuzzing based on concolic execution  18
Directer: A parallel and directed fuzzing based on concolic ...
收藏 引用
7th International Conference on Software and Information engineering, ICSIE 2018
作者: Song, Xiaobin Wu, Zehui Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Malaysia China National Digital Switching System Engineering and Technological Research Center Zhengzhou China
Fuzzing is a widely used technology to find vulnerabilities, but the current technology is mostly based on coverage and there are relatively few research in the field of directed fuzzing. In this paper, a parallelized... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback  2
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
2nd International Conference on Computer Communication and Network Security, CCNS 2021
作者: Yuwen, Shao Zheng, Zhang Bingzheng, Li Xinsheng, Ji State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering Technological RD Center Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
A Graph Reasoning Model Based on Multiple Types of Nodes  7
A Graph Reasoning Model Based on Multiple Types of Nodes
收藏 引用
7th International Conference on Big Data and Information Analytics, BigDIA 2021
作者: Liu, Yibing Huo, Lijun Zhou, Gang Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National University of Defense Technology Key Laboratory of Information System Engineering Changsha China
Multi-hop machine reading comprehension (MRC) depends on the model to answer a semantically related question based on the given supporting text. In this study, inspired by previous research about Graph Neural Network(... 详细信息
来源: 评论
A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning  4th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
4th International Conference on Big Data and Security, ICBDS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Shi, Wenqi Guo, Jiashan School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
To solve the multi-platform user association problem of complex trajectory matching process and high time cost in cross-platform association positioning of instant messaging users, and at the same time make full use o... 详细信息
来源: 评论
Binary semantic Similarity Comparison based on software gene
Binary semantic Similarity Comparison based on software gene
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Sun, Wenjie Chen, Yihang Shan, Zheng Liu, Fudong Wang, Qiuna State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Materials Branch of State Grid Henan Electric Power Company Zhengzhou China
The similarity of binary code is widely used in code copyright protection, vulnerability mining, malicious code analysis and etc. In this paper, we proposed a method for measuring/evaluating the similarity of two bina... 详细信息
来源: 评论
Establishment and Application of Cryptographic Library Model
收藏 引用
Journal of Computer and Communications 2015年 第5期3卷 21-32页
作者: Tie-Ming Liu Lie-Hui Jiang Jing Jing Yuan-Yuan Zhang The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models ... 详细信息
来源: 评论
HM-QCNN: Hybrid Multi-branches Quantum-Classical Neural Network for Image Classification  9th
HM-QCNN: Hybrid Multi-branches Quantum-Classical Neural Netw...
收藏 引用
19th International Conference on advanced Data Mining and Applications, ADMA 2023
作者: Liu, Haowen Gao, Yufei Shi, Lei Wei, Lin Shan, Zheng Zhao, Bo School of Cyber Science and Engineering Songshan Laboratory Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Quantum machine learning has been developing in recent years, demonstrating great potential in various research domains and promising applications for pattern recognition. However, due to the constraints of quantum ha... 详细信息
来源: 评论
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1307-1324页
作者: Ke Liu Jing-Yi Wang Qiang Wei Zhen-Yong Zhang Jun Sun Rong-Kuan Ma Rui-Long Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China College of Computer Science and Technology Guizhou UniversityGuiyang 550025China School of Information Systems Singapore Management UniversitySingapore 689867Singapore
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ... 详细信息
来源: 评论
The Design and Research for Network Address Space Randomization in OpenFlow Network
收藏 引用
Journal of Computer and Communications 2015年 第5期3卷 203-211页
作者: Ziyu Zhao Yuanbo Guo Wei Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility... 详细信息
来源: 评论
Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher  12th
Improved integral and zero-correlation linear cryptanalysis ...
收藏 引用
12th International Conference on Information Security and Cryptology, INSCRYPT 2016
作者: Yi, Wentan Wu, Baofeng Chen, Shaozhen Lin, Dongdai State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100049 China
CLEFIA is a block cipher developed by Sony Corporation in 2007. It is a recommended cipher of CRYPTREC, and has been adopted as ISO/IEC international standard in lightweight cryptography. In this paper, some new 9-rou... 详细信息
来源: 评论