咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是491-500 订阅
排序:
Static-Dynamic Control Flow Integrity
Static-Dynamic Control Flow Integrity
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Xiaolong Liu Qiang Wei Ziwei Ye State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
CCFIR (Compact Control Flow Integrity and Randomization) has low performance overhead as an exploit mitigation, but it is hard to mitigate exploits by hijacking virtual function pointer, which are emerging in recent y... 详细信息
来源: 评论
Convergence and Scalarization in Whole Function Vectorization
Convergence and Scalarization in Whole Function Vectorizatio...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Feng Yue Jianmin Pang Jiuzhen Jin Dai Chao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
When implementing SPMD programs on multi core platforms, whole function vectorization is an important optimization method. SPMD program has drawback that lots of instructions across multi threads are redundant which i... 详细信息
来源: 评论
An Automatic Parallel-Stage Decoupled Software Pipelining Parallelization Algorithm Based on OpenMP
An Automatic Parallel-Stage Decoupled Software Pipelining Pa...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Xiaoxian Liu Rongcai Zhao Lin Han Peng Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
While multicore processors increase throughput for multi-programmed and multithreaded codes, many important applications are single threaded and thus do not benefit. Automatic parallelization techniques play an import... 详细信息
来源: 评论
An Efficient Sieve Algorithm with Evolutionary Technique
An Efficient Sieve Algorithm with Evolutionary Technique
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Zedong Sun Chunxiang Gu Yonghui Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t... 详细信息
来源: 评论
Detecting Information Leakage Based on Subtracting Matrix
Detecting Information Leakage Based on Subtracting Matrix
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Zongda Han Binglong Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper proposes an approach of detecting information leakage based on subtracting matrix to determine files when and where were leaked from file system. Due to the low efficiency of detecting leak operation and th... 详细信息
来源: 评论
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph
ZeroDVS: Trace-Ability and Security Detection of Container I...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Yan Zheng Weiyu Dong Jiangtao Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
Docker image is the foundation for container operation. Docker Hub is the largest online repository of public container images. Users can upload and download any random image file to the hub due to the absence of adeq... 详细信息
来源: 评论
An Intrusion Detection Feature Selection Method Based on Improved Mutual Information
An Intrusion Detection Feature Selection Method Based on Imp...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Zan Qi Jinlong Fei Jue Wang Xue Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u... 详细信息
来源: 评论
Method of multi-feature fusion based on SVM and D-S evidence theory in Trojan detection
收藏 引用
Computer Modelling and New Technologies 2014年 第6期18卷 304-310页
作者: Liu, Shengli Gao, Xiang Xu, Pan Liu, Long State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
According to the low accuracy and low stability of the single feature-based method for Trojan detection, a multi-feature fusion method based on SVM and DS evidence theory is proposed. First, three types of flow featur... 详细信息
来源: 评论
Distributed key revocation scheme based on shared binary tree
Distributed key revocation scheme based on shared binary tre...
收藏 引用
IEEE International Conference on Progress in Informatics and computing (PIC)
作者: Shaoren Wang Xuehui Du Zhi Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on sha... 详细信息
来源: 评论
Bintaint: A Static Taint Analysis Method for Binary Vulnerability Mining
Bintaint: A Static Taint Analysis Method for Binary Vulnerab...
收藏 引用
International Conference on Cloud computing, Big Data and Blockchain (ICCBB)
作者: Zenan Feng Zhenyu Wang Weiyu Dong Rui Chang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Vulnerabilities in the current network space has been increasingly concerned by all parties. More and more software is currently in the form of binary code in practical applications. Therefore, the research on vulnera... 详细信息
来源: 评论