咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是461-470 订阅
排序:
Automatically Generating High-performance Matrix Multiplication Kernels on the Latest Sunway Processor  22
Automatically Generating High-performance Matrix Multiplicat...
收藏 引用
Proceedings of the 51st International Conference on Parallel Processing
作者: Xiaohan Tao Yu Zhu Boyang Wang Jinlong Xu Jianmin Pang Jie Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing China
We present an approach to the automatic generation of efficient matrix multiplication code on the latest Sunway processor, which will be employed by the next-generation machine of Sunway TaihuLight, one of the fastest... 详细信息
来源: 评论
A Survey on Knowledge Graph Representation Learning with Text Information  21
A Survey on Knowledge Graph Representation Learning with Tex...
收藏 引用
Proceedings of the 3rd World Symposium on Software engineering
作者: Ling Wang Jicang Lu Gang Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing China
Knowledge graph representation learning provides a lot of help for subsequent tasks such as knowledge graph completion, information retrieval, and intelligent question answering. By representing the knowledge graph as... 详细信息
来源: 评论
Malware Detection Method based on Control Flow Analysis  2019
Malware Detection Method based on Control Flow Analysis
收藏 引用
Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City
作者: Peng Shan Qingbao Li Ping Zhang Yanyang Gu State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the rapid development of computer technology and the iteration of malware, numerous computer malware detection methods have been proposed, among which malware detection based on machine learning has become an imp... 详细信息
来源: 评论
Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis  22
Accelerating Command Injection Vulnerability Discovery in Em...
收藏 引用
Proceedings of the 12th International Conference on the Internet of Things
作者: Xiaokang Yin Ruijie Cai Yizheng Zhang Lukai Li Qichao Yang Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing China
Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they wa... 详细信息
来源: 评论
A Sample-Based Approximate Ranking Method for Large Graphs
A Sample-Based Approximate Ranking Method for Large Graphs
收藏 引用
International Conference on advanced Cloud and Big Data (CBD)
作者: Rujun Sun Lufei Zhang Zuoning Chen State Key Laboratory of Mathematical Engineering and Advanced Computing China
Graph centrality can be estimated by random walk algorithms such as PageRank. These algorithms are useful when ranking items with relationships, and are based on global structure of the graph. It needs to traverse the... 详细信息
来源: 评论
Path test data generation using adaptive simulated annealing particle swarm optimization
收藏 引用
Soft computing 2024年 第17-18期28卷 9587-9607页
作者: Jiao, Chongyang Zhou, Qinglei State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Henan Information Engineering School Zhengzhou Vocational College of Industrial Safety Zhengzhou450000 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi... 详细信息
来源: 评论
Software Vulnerability Mining Techniques Based on Data Fusion and Reverse engineering
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Liu, Tieming State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Software vulnerability mining is an important component of network attack and defense technology. To address the problems of high leakage rate and false positive rate of existing static analysis methods, this paper pr... 详细信息
来源: 评论
Accountable multi-authority ciphertext-policy attribute-based encryption without key escrow and key abuse  9th
Accountable multi-authority ciphertext-policy attribute-base...
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Yu, Gang Ma, Xiaoxiao Cao, Zhenfu Zhu, Weihua Zeng, Junjie State Key Laboratory of Mathematical Engineering and Advanced Computing Information Science and Technology Institute Zhengzhou450001 China Shanghai Key Lab for Trustworthy Computing East China Normal University Shanghai200062 China Zheng Zhou Vocational University of Information and Technology Zhengzhou450046 China
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising public key encryption primitive enabling fine-grained access control on shared data in public cloud. However, two quite challenging issues, the prev... 详细信息
来源: 评论
A robust image steganography method resistant to scaling and detection
A robust image steganography method resistant to scaling and...
收藏 引用
作者: Zhang, Yue Luo, Xiangyang Wang, Jinwei Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer and Software Nanjing University of Information Science and Technology China Zhengzhou Science and Technology Institute China
The current image steganography algorithms mainly focus on the anti-detectability rather than the robustness to scaling attacks. Therefore, it is difficult to extract the secret messages correctly after stego images s... 详细信息
来源: 评论
Open Set Recognition for Encrypted Traffic using Intra-class Partition and Boundary Sample Generation  5
Open Set Recognition for Encrypted Traffic using Intra-class...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Li, Xue Fei, Jinlong Qi, Zan Lv, Zhuo Jiang, Heng PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China PLA Information Engineering University National Digital Switching System Engineering Technological Research Center Zhengzhou China
Existing deep learning-based encrypted traffic recognition methods can achieve high precision identification performance while protecting user privacy, but almost all of them focus on closed sets, in which training da... 详细信息
来源: 评论