咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是441-450 订阅
排序:
LID-senone extraction via deep neural networks for end-to-end language identification
LID-senone extraction via deep neural networks for end-to-en...
收藏 引用
Speaker and Language Recognition Workshop, Odyssey 2016
作者: Jin, Ma Song, Yan McLoughlin, Ian Dai, Li-Rong Ye, Zhong-Fu National Engineering Laboratory of Speech and Language Information Processing University of Science and Technology of China China School of Computing University of Kent Medway United Kingdom State Key Laboratory of Mathematical Engineering and Advanced Computing China
A key problem in spoken language identification (LID) is how to effectively model features from a given speech utterance. Recent techniques such as end-to-end schemes and deep neural networks (DNNs) utilising transfer... 详细信息
来源: 评论
A survey on federated learning:a perspective from multi-party computation
收藏 引用
Frontiers of Computer Science 2024年 第1期18卷 93-103页
作者: Fengxia LIU Zhiming ZHENG Yexuan SHI Yongxin TONG Yi ZHANG Institute of Artificial Intelligence and Key Laboratory of Mathematics Informatics Behavioral Semantics Beihang UniversityBeijing 100191China State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang UniversityBeijing 100191China Pengcheng Laboratory Shenzhen 518055China Zhongguancun Laboratory Beijing 100190China Institute for Mathematical Sciences and Engineering Research Center of Financial Computing and Digital Engineering Renmin University of ChinaBeijing 100872China
Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw *** enhance privacy in federated learning,multi-party computation ... 详细信息
来源: 评论
Simulation detection based on single photon quantum key distribution protocol
Simulation detection based on single photon quantum key dist...
收藏 引用
2020 International Conference on Electronics, Communications and Information Technology, CECIT 2020
作者: Liu, X.N. Hu, C.C. Yin, M.J. Jin, L. School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyberspace and Security Information Engineering University Zhengzhou China
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour... 详细信息
来源: 评论
Research on General Permutation Encryption Module Based on Chaos Theory
收藏 引用
International Journal of Technology Management 2014年 第7期 58-61页
作者: Sun Wenjie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 102206
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp... 详细信息
来源: 评论
Research on Stream Cipher Model Based on Chaos Theory
收藏 引用
International Journal of Technology Management 2013年 第2期 91-93页
作者: Sun Wenjie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 102206
Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disa... 详细信息
来源: 评论
Method based on GSCPN for network vulnerability analysis
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2032-2038页
作者: Gao, Xiang Zhu, Yue-Fei Fei, Jin-Long Han, Tao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
With the development of network security research, network attack modeling and analysis techniques have been paid more and more attention. A generalized stochastic colored Petri Net (GSCPN) Model is proposed. To each ... 详细信息
来源: 评论
Identification of mobile device threats based on PCA-fused neural network
Boletin Tecnico/Technical Bulletin
收藏 引用
Boletin Tecnico/Technical Bulletin 2017年 第3期55卷 278-285页
作者: Chu, Sijun Wu, Hao Lu, Yulin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
To monitor and identify whether a mobile device is under threat or at risk effectively, in this paper, we summarize feature data from threat information of common mobile devices and set up an identification model of m... 详细信息
来源: 评论
A WeChat user geolocating algorithm based on the relation between reported and actual distance  1
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Shi, Wenqi Luo, Xiangyang Zhao, Fan Peng, Ziru Gan, Yong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China
The accuracy of existing geolocation methods for WeChat users depends on the stable correspondence between reported distance and actual distance. In view of the difficulty to pinpoint users’ location in real-world du... 详细信息
来源: 评论
Improved Impossible Polytopic Attacks on Round-reduced des  4
Improved Impossible Polytopic Attacks on Round-reduced des
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Wang, Jing Wu, Qianqiong Fu, Chaohui Zhou, Guomiao Duan, Ming State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China College of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang Henan471000 China
In Eurocrypt 2016, Tyge Tiessen introduced the d-difference which considering the differences between multiple plaintexts, and proposed the impossible polytopic attack on block cipher which effectively reducing the da... 详细信息
来源: 评论
PS-HOMO: A Protection Scheme for iOS SMS  4
PS-HOMO: A Protection Scheme for iOS SMS
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Zhou, Guomiao Wu, Qianqiong Duan, Ming Xi, Qi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China Institute of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang Henan471000 China
iOS Short Message Service (SMS) transmits messages in plaintext, which would lead to potential security threats of data. It is meaningful to design a safe and effective SMS. In this paper, all iOS Security Guides are ... 详细信息
来源: 评论