咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是381-390 订阅
排序:
Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis
收藏 引用
Security and Communication Networks 2022年 第0期2022卷
作者: Wu, Zehui Zhang, Wenbin Wang, Yunchao Yan, Chenyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software-defined network (SDN) controllers, the core of SDN network architecture, need to deal with network events of the whole network, which has huge program state space and complex logic dependency, with security i... 详细信息
来源: 评论
Association Analysis of User Promiscuous Traffic Based on Convolutional Neural Network  4
Association Analysis of User Promiscuous Traffic Based on Co...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Li, Yonglin Liu, Yan Zhengzhou University Zhong Yuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Analyzing user behavior from promiscuous network traffic, digging out user characteristics, and analyzing user behavior patterns are the main purposes of user association analysis. Existing methods start from the traf... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm  4
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
4th International Conference on Consumer Electronics and Computer engineering, ICCECE 2024
作者: Lin, Jiang Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code  6
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
6th International Conference on Communications, Information System and Computer engineering, CISCE 2024
作者: Xiong, Zhe Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
Directed Association-based User Identification Algorithm  2
Directed Association-based User Identification Algorithm
收藏 引用
2nd International Conference on Computer, Big Data and Artificial Intelligence, ICCBDAI 2021
作者: Jiang, Qiuyan Gong, Daofu Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
This paper studies the social network with directed association semantics, and proposes an unsupervised user identification algorithm (DAUM-P). The algorithm construct a user associations graph based on multiple types... 详细信息
来源: 评论
Malicious Traffic Detection Model Refactor Method Based on Adaptive Sample Generation  5
Malicious Traffic Detection Model Refactor Method Based on A...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Jiao, Liang Fei, Jinlong Zhao, Min State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Tianjin University of Science and Technology School of Electronic Information and Automation Tianjin China
As machine learning models are widely used in malicious traffic detection, model security has become an important research topic. Aiming at the problems that the model refactor attack methods need a large amount of pr... 详细信息
来源: 评论
IP geolocation base on local delay distribution similarity  9th
IP geolocation base on local delay distribution similarity
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Zhao, Fan Luo, Xiangyang Gan, Yong Zu, Shuodi Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou450001 China
IP geolocation technology can be used to obtain the real-time locations of target Internet hosts especially mobile computers, which can help law enforcement to quickly get the criminal evidence or arrest criminals. Am... 详细信息
来源: 评论
Multi Association Semantics-Based User Matching Algorithm Without Prior Knowledge
Multi Association Semantics-Based User Matching Algorithm Wi...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
作者: Jiang, Qiuyan Gong, Daofu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
Cross-network user matching is one of the basic issues for realizing social network data integration. Existing research based on structure features provides a good matching method for nodes with high-degree, but ignor... 详细信息
来源: 评论
A Data Assured Deletion Scheme in Cloud Storage
收藏 引用
China Communications 2014年 第4期11卷 98-110页
作者: LI Chaoling CHEN Yue ZHOU Yanzhou PLA Information Engineering University Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dy... 详细信息
来源: 评论
Computation Offloading for Multi-user Sequential Tasks in Heterogeneous Mobile Edge computing  17th
Computation Offloading for Multi-user Sequential Tasks in He...
收藏 引用
17th EAI International Conference on Collaborative computing: Networking, Applications, and Worksharing, CollaborateCom 2021
作者: Xu, Huanhuan Zhou, Jingya Gu, Fei School of Computer Science and Technology Soochow University Suzhou215006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Currently, many computation offloading studies in Mobile Edge computing (MEC) mainly focus on the multi-user and multi-task offloading, where the tasks are independent and inseparable. However, nowadays many mobile ap... 详细信息
来源: 评论