咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是351-360 订阅
排序:
Overview of Intrusion Detection in Smart Substation  10
Overview of Intrusion Detection in Smart Substation
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Li, Zecun Ma, Rongkuan Xie, Yaobin Lu, Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Shangu Cyber Security Technology Co. Ltd Zhengzhou China
The development of Cyber-Physical Fusion Technology gradually takes the power grid in the direction of intelligence, making the smart substation a typical cyber-physical fusion system. However, while the introduction ... 详细信息
来源: 评论
A Vulnerability Automation Exploitation Method Based on Symbolic Execution
A Vulnerability Automation Exploitation Method Based on Symb...
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information service room Unit 32738 China
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln... 详细信息
来源: 评论
Image Electronic Evidence Screening Based on Improved SSD  6
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Liu, Yafei Jiang, Liehui Liu, Tieming Zhang, Youwei Zhengzhou University Zhongyuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论
CSFW-SC: A high-dimensional clustering algorithm based on cuckoo search  3
CSFW-SC: A high-dimensional clustering algorithm based on cu...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Wang, Jindong He, Jiajing Zhang, Hengwei Yu, Zhiyong Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
With the development of the research in data mining, cluster analysis has been widely used in several areas. Aiming at the issue that traditional clustering methods are not appropriate to high-dimensional data, a cuck... 详细信息
来源: 评论
IG-C4.5: An improved feature selection method based on information gain
IG-C4.5: An improved feature selection method based on infor...
收藏 引用
2014 International Conference on Mechatronics, Electronic, Industrial and Control engineering, MEIC 2014
作者: Luo, Kai Yin, MeiJuan Luo, JunYong Li, JianLin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China Jiuquan Satellite Launch Center of China Jiuquan Gansu China
Feature selection is an important means to solve the problem of dimension reduction in anomaly network traffic detection. Focusing on the problem of traditional feature selection algorithm based on information gain ne... 详细信息
来源: 评论
Cloud resource scheduling method based on estimation of distirbution shuffled frog leaping algorithm  3
Cloud resource scheduling method based on estimation of dist...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Niu, Kan Wang, Jin-Dong Zhang, Heng-Wei Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Focusing on the problem of high efficiency resource scheduling in cloud computing environment, since current resource scheduling algorithm has been less given consideration to the shortest completion time and the leas... 详细信息
来源: 评论
A Survey of Automatic Exploitation of Binary Vulnerabilities
A Survey of Automatic Exploitation of Binary Vulnerabilities
收藏 引用
2023 International Conference on Computer Network Security and Software engineering, CNSSE 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini... 详细信息
来源: 评论
Defense strategy selection based on signaling game  3
Defense strategy selection based on signaling game
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Zhang, Hengwei Wang, Jindong Yu, Dingkun Han, Jihong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Nowadays, network security defense based on game theory mostly used complete information or static game model. In order to get closer to the actual network and defend actively, we proposed a network attack-defense gam... 详细信息
来源: 评论
Active defense strategy selection based on static Bayesian game  3
Active defense strategy selection based on static Bayesian g...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Zhang, Hengwei Wang, Jindong Yu, Dingkun Han, Jihong Li, Tao Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Nowadays, the network defense based on incomplete information game model ignored the type of the defender, used simple cost quantitative method, and chosen defense strategies improperly. Aiming at the problem, this pa... 详细信息
来源: 评论
A presenter discovery method based on analysis of reputation record
A presenter discovery method based on analysis of reputation...
收藏 引用
International Conference on Computer, Communication and Computational Sciences, ICCCCS 2016
作者: Wang, Jin-dong Yu, Zhi-yong Liu, Xiang Sun, Miao Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
In order to satisfy the requirement of service presenters’ credibility for recommendation system, this paper puts forward a method based on the analysis of the presenters’ reputation record to find the credible pres... 详细信息
来源: 评论