咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是451-460 订阅
排序:
Carrier-depletion mach-zehnder silicon optical modulator for bpsk and multi-level applications
Carrier-depletion mach-zehnder silicon optical modulator for...
收藏 引用
Asia Communications and Photonics Conference, ACPC 2015
作者: Ding, Jianfeng Yang, Lin Zhang, Lei State Key Laboratory on Integrated Optoelectronics Institute of Semiconductors P. O. Box 912 Beijing100083 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
We demonstrate a BPSK carrier-depletion modulator. The device generates a PAM-4 optical signal which means it is possible to be used in a 16-QAM applications. © 2015 OSA.
来源: 评论
Color Image Steganalysis Algorithm Based on Quaternion Convolutional Neural Network  30th
Color Image Steganalysis Algorithm Based on Quaternion Convo...
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Xu, Meng Wang, Jinwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
Most of the images on the Internet are color images, and steganalysis of color images is a very critical issue in the field of steganalysis. The current proposed color image steganalysis features mainly rely on manual... 详细信息
来源: 评论
A Software Diversity-Based lab in Operating System for Cyber Security Students  3
A Software Diversity-Based Lab in Operating System for Cyber...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Wang, Junchao Pang, Jianmin Shan, Zheng Wei, Jin Yao, Jinyang Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zheng Zhou China School of Computer Science Data Arena Institute Fudan University Zheng Zhou China
The course of operating system's labs usually fall behind the state of art technology. In this paper, we propose a Software Diversity-Assisted Defense (SDAD) lab based on software diversity, mainly targeting for s... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network  2
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
2019 2nd International Symposium on Big Data and Applied Statistics, ISBDAS 2019
作者: Lu, Shoupu Li, Qingbao Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Province Zhengzhou450001 China Henan University of Economics and Law Henan Province Zhengzhou450000 China
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model  7th
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Zhang, Wenning Zhou, Qinglei Jiao, Chongyang Xu, Ting State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China Zhongyuan University of Technology Zhengzhou450000 China Zhengzhou University Zhengzhou450000 China
To solve the emerging complex optimization problems, multi objective optimization algorithms are needed. By introducing the surrogate model for approximate fitness calculation, the multi objective firefly algorithm wi... 详细信息
来源: 评论
A Malware Similarity Analysis Method Based on Network Control Structure Graph
A Malware Similarity Analysis Method Based on Network Contro...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Duanyi Wang Hui Shu Fei Kang Wenjuan Bu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Recently, graph-based malware similarity analysis has been widely used in the field of malware detection. However, the wide application of code obfuscation, polymorphism, and deformation changes the structure of malic... 详细信息
来源: 评论
Optimal scheme for dynamic adjustment of active mirror in FAST system  2021
Optimal scheme for dynamic adjustment of active mirror in FA...
收藏 引用
2021 5th International Conference on Computer Science and Artificial Intelligence
作者: Hongchuan Zhou Jiaqi Liu Junyan Song Benchao Yang State Key Laboratory of Mathematical Engineering and advanced computing China
This paper mainly studies the optimal scheme of dynamic adjustment of active mirror in FAST system by establishing mathematical model. According to the constraints such as distance variation range, a mathematical mode... 详细信息
来源: 评论
Research on Unpredetermined Behavior Recognition Techniques Based on Network Attacks  23
Research on Unpredetermined Behavior Recognition Techniques ...
收藏 引用
Proceedings of the 2023 5th International Conference on Internet of Things, Automation and Artificial Intelligence
作者: Yuxuan Xiao Jinlong Fei Junyi Wang State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o...
来源: 评论
Towards optimized tensor code generation for deep learning on sunway many-core processor
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 1-15页
作者: Mingzhen LI Changxi LIU Jianjin LIAO Xuegui ZHENG Hailong YANG Rujun SUN Jun XU Lin GAN Guangwen YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China National University of Singapore Singapore 119077Singapore State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214000China Science and Technology on Special System Simulation Laboratory Beijing Simulation Center Beijing 100854China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing dee... 详细信息
来源: 评论
An Abnormal Domain Name Generation Method Based on a Character-Level Model  22
An Abnormal Domain Name Generation Method Based on a Charact...
收藏 引用
Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence
作者: Chunbing Wu Jinlong Fei State Key Laboratory of Mathematical Engineering and Advanced Computing China
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli...
来源: 评论