咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 388 篇 期刊文献

馆藏范围

  • 1,060 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 713 篇 工学
    • 522 篇 计算机科学与技术...
    • 413 篇 软件工程
    • 117 篇 信息与通信工程
    • 75 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 66 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 化学工程与技术
    • 27 篇 光学工程
    • 25 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 413 篇 理学
    • 200 篇 数学
    • 170 篇 物理学
    • 74 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 41 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 26 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 protocols
  • 11 篇 heuristic algori...

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 43 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 26 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,025 篇 英文
  • 21 篇 中文
  • 15 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1060 条 记 录,以下是431-440 订阅
排序:
DPW-RRM: Random Routing Mutation Defense Method Based on Dynamic Path Weight
DPW-RRM: Random Routing Mutation Defense Method Based on Dyn...
收藏 引用
作者: Jin, Hui Li, Zhaoyang Hu, Ruiqin Tan, Jinglei Zhang, Hongqi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China School of Cyberspace Security Zhengzhou University Zhengzhou Henan450001 China
Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the... 详细信息
来源: 评论
FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images
收藏 引用
Journal on Internet of Things 2022年 第1期4卷 1-20页
作者: Yingchao Yu Shuitao Gan Xiaojun Qin State Key Laboratory of Mathematical Engineering and Advanced Computing WuxiJiangsu214083China
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine... 详细信息
来源: 评论
Ultra-Fast Mini License Plate Recognition System Based-on Vision Processing Unit  2
Ultra-Fast Mini License Plate Recognition System Based-on Vi...
收藏 引用
2nd International Conference on Big-Data Service and Intelligent Computation, BDSIC 2020
作者: Wang, Junhui Ren, Shuangyin He, Jiezhong Ji, Xiaolan Huang, Diqing College of Computer National University of Defense Technology State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Computer National University of Defense Technology
As more embedded environments need license plate recognition systems, how to recognize car plates with high speed/accuracy and low energy has become an important and challenging problem. In this paper, we propose a ul... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
作者: Jinzhu Wang Ruijie Cai Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing
Cisco IOS is an operating system that runs on Cisco routing and switching *** security is important to the entire *** vulnerability attacks have become one of the main sources of threat to Cisco IOS security,it is nec... 详细信息
来源: 评论
Summary of Large Scale Graph computing Models
Summary of Large Scale Graph Computing Models
收藏 引用
2019 2nd International Conference on Mechanical,Electronic and engineering Technology(MEET 2019)
作者: Sheng Yang State Key Laboratory of Mathematical Engineering and Advanced Computing
Large-scale graph data is a research hotspot in the processing of big data and is generally used in traffic management, analysis of social network and semantic web, etc., resulting in the emergence of a variety of lar... 详细信息
来源: 评论
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware
Fw-fuzz: A code coverage-guided fuzzing framework for networ...
收藏 引用
作者: Gao, Zicong Dong, Weiyu Chang, Rui Wang, Yisen Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Fuzzing is an effective approach to detect software vulnerabilities utilizing changeable generated inputs. However, fuzzing the network protocol on the firmware of IoT devices is limited by inefficiency of test case g... 详细信息
来源: 评论
LID-senone extraction via deep neural networks for end-to-end language identification
LID-senone extraction via deep neural networks for end-to-en...
收藏 引用
Speaker and Language Recognition Workshop, Odyssey 2016
作者: Jin, Ma Song, Yan McLoughlin, Ian Dai, Li-Rong Ye, Zhong-Fu National Engineering Laboratory of Speech and Language Information Processing University of Science and Technology of China China School of Computing University of Kent Medway United Kingdom State Key Laboratory of Mathematical Engineering and Advanced Computing China
A key problem in spoken language identification (LID) is how to effectively model features from a given speech utterance. Recent techniques such as end-to-end schemes and deep neural networks (DNNs) utilising transfer... 详细信息
来源: 评论
Simulation detection based on single photon quantum key distribution protocol
Simulation detection based on single photon quantum key dist...
收藏 引用
2020 International Conference on Electronics, Communications and Information Technology, CECIT 2020
作者: Liu, X.N. Hu, C.C. Yin, M.J. Jin, L. School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour... 详细信息
来源: 评论
A survey on federated learning:a perspective from multi-party computation
收藏 引用
Frontiers of Computer Science 2024年 第1期18卷 93-103页
作者: Fengxia LIU Zhiming ZHENG Yexuan SHI Yongxin TONG Yi ZHANG Institute of Artificial Intelligence and Key Laboratory of Mathematics Informatics Behavioral Semantics Beihang UniversityBeijing 100191China State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang UniversityBeijing 100191China Pengcheng Laboratory Shenzhen 518055China Zhongguancun Laboratory Beijing 100190China Institute for Mathematical Sciences and Engineering Research Center of Financial Computing and Digital Engineering Renmin University of ChinaBeijing 100872China
Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw *** enhance privacy in federated learning,multi-party computation ... 详细信息
来源: 评论
Method based on GSCPN for network vulnerability analysis
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2032-2038页
作者: Gao, Xiang Zhu, Yue-Fei Fei, Jin-Long Han, Tao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
With the development of network security research, network attack modeling and analysis techniques have been paid more and more attention. A generalized stochastic colored Petri Net (GSCPN) Model is proposed. To each ... 详细信息
来源: 评论