咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 383 篇 期刊文献

馆藏范围

  • 1,055 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 518 篇 计算机科学与技术...
    • 411 篇 软件工程
    • 114 篇 信息与通信工程
    • 72 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 62 篇 生物工程
    • 61 篇 电气工程
    • 60 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 20 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 406 篇 理学
    • 197 篇 数学
    • 168 篇 物理学
    • 73 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1055 条 记 录,以下是361-370 订阅
排序:
Lightweight DCT-Like Domain Forensics Model for Adversarial Example  19th
Lightweight DCT-Like Domain Forensics Model for Adversarial ...
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Junjie Wang, Jinwei Nanjing University of Information Science and Technology Jiangsu210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
Since the emergence of adversarial examples brings great security threat to deep neural network which is widely used in various fields, their forensics become very important. In this paper, a lightweight model for the... 详细信息
来源: 评论
The Lattice Sieve Field Selection of Cado-NFS  2
The Lattice Sieve Field Selection of Cado-NFS
收藏 引用
2019 2nd International Conference on Computer Information Science and Artificial Intelligence, CISAI 2019
作者: Xue, Ping Chen, Shaozhen Fu, Zhixin Institute of Cyberspace Security PLA Information Engineering University Hennan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Hennan450001 China
The software application of the discrete logarithms on the "large" finite field is studied. The most effective algorithm for the problem is the general number field sieve (GNFS). Focusing on the theory of GN... 详细信息
来源: 评论
Implementation of Hodgkin-Huxley Spiking Neuron Model Using FPGA  19
Implementation of Hodgkin-Huxley Spiking Neuron Model Using ...
收藏 引用
19th IEEE International Conference on Communication Technology, ICCT 2019
作者: Yi, Zexuan Fu, Wenlong Cao, Lihong Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
For the study of new computer architecture inspired by brain, implementing neuron function on hardware has become an emerging research direction. To study the feasibility of biological neuron implementation and accele... 详细信息
来源: 评论
SGCAM-an comprehensive analysis method for information risk assessment index system  3
SGCAM-an comprehensive analysis method for information risk ...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Chen, Yu Wang, Jin-Dong Wang, Kun Li, Tao Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system,... 详细信息
来源: 评论
Research for modeling network security based on attack-defense grapy of state reduction  3
Research for modeling network security based on attack-defen...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Li, Tao Zhang, Hengwei Wang, Jindong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of... 详细信息
来源: 评论
Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
收藏 引用
Physical Review A 2015年 第5期91卷 052305-052305页
作者: Yangyang Fei Ming Gao Weilong Wang Chaobo Li Zhi Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m... 详细信息
来源: 评论
IoT Device Multi-Classification Using Traffic Behavior Analysis  3
IoT Device Multi-Classification Using Traffic Behavior Analy...
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Shi, Jiaqi Liu, Tieming Zhang, Yuanyuan Ren, Huajuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The management of Internet of Things (IoT) devices is becoming increasingly complex. One of the reasons is that IoT device manufacturers are different, and there are different degrees of heterogeneity in service, tech... 详细信息
来源: 评论
Malware homology identification based on a gene perspective
收藏 引用
Frontiers of Information Technology & Electronic engineering 2019年 第6期20卷 801-815页
作者: Bing-lin ZHAO Zheng SHAN Fu-dong LIU Bo ZHAO Yi-hang CHEN Wen-jie SUN State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China Georg-August-University of Goettingen Goettingen 37077 Germany
Malware homology identification is important in attacking event tracing, emergency response scheme generation, and event trend prediction. Current malware homology identification methods still rely on manual analysis,... 详细信息
来源: 评论
Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
收藏 引用
Frontiers of Information Technology & Electronic engineering 2022年 第3期23卷 351-360页
作者: Rongkuan MA Hao ZHENG Jingyi WANG Mufeng WANG Qiang WEI Qingxian WANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Zhejiang University NGICS Platform Hangzhou 310000China
Proprietary(or semi-proprietary)protocols are widely adopted in industrial control systems(ICSs).Inferring protocol format by reverse engineering is important for many network security applications,e.g.,program tests ... 详细信息
来源: 评论
Detection and localization of cyber attacks on water treatment systems:an entropy-based approach
收藏 引用
Frontiers of Information Technology & Electronic engineering 2022年 第4期23卷 587-603页
作者: Ke LIU Mufeng WANG Rongkuan MA Zhenyong ZHANG Qiang WEI State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China College of Control Science and Engineering Zhejiang UniversityHangzhou310027China
With the advent of Industry 4.0,water treatment systems(WTSs)are recognized as typical industrial cyber-physical systems(iCPSs)that are connected to the open *** information technology(IT)benefits the WTS in the aspec... 详细信息
来源: 评论