咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是341-350 订阅
排序:
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1307-1324页
作者: Ke Liu Jing-Yi Wang Qiang Wei Zhen-Yong Zhang Jun Sun Rong-Kuan Ma Rui-Long Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China College of Computer Science and Technology Guizhou UniversityGuiyang 550025China School of Information Systems Singapore Management UniversitySingapore 689867Singapore
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ... 详细信息
来源: 评论
The Design and Research for Network Address Space Randomization in OpenFlow Network
收藏 引用
Journal of Computer and Communications 2015年 第5期3卷 203-211页
作者: Ziyu Zhao Yuanbo Guo Wei Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility... 详细信息
来源: 评论
Improved integral and zero-correlation linear cryptanalysis of CLEFIA block cipher  12th
Improved integral and zero-correlation linear cryptanalysis ...
收藏 引用
12th International Conference on Information Security and Cryptology, INSCRYPT 2016
作者: Yi, Wentan Wu, Baofeng Chen, Shaozhen Lin, Dongdai State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100049 China
CLEFIA is a block cipher developed by Sony Corporation in 2007. It is a recommended cipher of CRYPTREC, and has been adopted as ISO/IEC international standard in lightweight cryptography. In this paper, some new 9-rou... 详细信息
来源: 评论
Topologically protected edge states in time photonic crystals with chiral symmetry
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Yukun Hu, Hao Liu, Liangliang Yang, Yihao Yu, Youxiu Long, Yang Zheng, Xuezhi Luo, Yu Li, Zhuo Garcia-Vidal, Francisco J. National Key Laboratory of Microwave Photonics College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing211106 China State Key Laboratory of Extreme Photonics and Instrumentation ZJU-Hangzhou Global Scientific and Technological Innovation Center Zhejiang University Hangzhou310027 China International Joint Innovation Center The Electromagnetics Academy Zhejiang University Zhejiang University Haining314400 China Key Lab. of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang Jinhua Institute of Zhejiang University Zhejiang University Jinhua321099 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University Singapore637371 Singapore Department of Electrical Engineering KU Leuven Leuven3001 Belgium Universidad Autónoma de Madrid MadridE-28049 Spain
Time photonic crystals are media in which their electromagnetic parameters are modulated periodically in time, showing promising applications in non-resonant lasers and particle accelerators, among others. Traditional... 详细信息
来源: 评论
Disentangling Ensemble Models on Adversarial Generalization in Image Classification  5
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
5th International Conference on Electronic engineering and Informatics, EEI 2023
作者: Li, Chenwei Pan, Mengyuan Yang, Bo Zhang, Hengwei Henan Key Laboratory of Information Security State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp... 详细信息
来源: 评论
SROBR: Semantic Representation of Obfuscation-Resilient Binary Code
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Tang, Ke Shan, Zheng Liu, Fudong Huang, Yizhao Sun, Rongbo Qiao, Meng Zhang, Chunyan Wang, Jue Gui, Hairen State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software p... 详细信息
来源: 评论
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
收藏 引用
Frontiers of Computer Science 2024年 第3期18卷 183-197页
作者: Xingxing CHEN Qingfeng CHENG Weidong YANG Xiangyang LUO State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China Henan Key Laboratory of Grain Photoelectric Detection and Control Henan University of TechnologyZhengzhou 450001China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of ***,i... 详细信息
来源: 评论
An anonymous key agreement protocol with robust authentication for smart grid infrastructure
收藏 引用
Science China(Information Sciences) 2022年 第09期65卷 291-293页
作者: Ting CHEN Qingfeng CHENG Xinghua LI School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart device... 详细信息
来源: 评论
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 249-251页
作者: Ting CHEN Xinghua LI Qingfeng CHENG School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist... 详细信息
来源: 评论
HHL Analysis and Simulation Verification Based on Origin Quantum Platform  4
HHL Analysis and Simulation Verification Based on Origin Qua...
收藏 引用
2021 4th International Conference on Mechatronics and Computer Technology engineering, MCTE 2021
作者: Liu, Xiaonan Jing, Lina Han, Lin Gao, Jie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Henan Supercomputing Center Zhengzhou University Zhengzhou450001 China
Solving large-scale linear equations is of great significance in many engineering fields, such as weather forecasting and bioengineering. The classical computer solves the linear equations, no matter adopting the elim... 详细信息
来源: 评论