咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是511-520 订阅
排序:
Stability Analysis of a Rumor Propagation Model in Complex Networks with Holling II Type Functional Response
Stability Analysis of a Rumor Propagation Model in Complex N...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Ze Yu Gang Zhou Junyong Luo Mengli Zhang Ningbo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ... 详细信息
来源: 评论
Crop Enclave Interface for SGX Programs
Crop Enclave Interface for SGX Programs
收藏 引用
IEEE International Conference on Joint Cloud computing (JCC)
作者: Yaqi Fan Zhifeng Chen Qingbao Li Wenbo Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Existing memory attacks against SGX use the enclave interface, such as ECALLs and OCALLs, to inject malicious data into the enclave’s trusted memory to trigger memory corruption vulnerabilities therein. Therefore, en...
来源: 评论
Data layout transformation for structure vectorization on SIMD architectures
Data layout transformation for structure vectorization on SI...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Peng-yuan Li Qing-hua Zhang Rong-cai Zhao Hai-ning Yu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Structure references are commonly-used at the core of applications in a multitude of domains such as image processing, signal processing, especially the scientific and engineering applications. SIMD instruction sets, ... 详细信息
来源: 评论
FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virtual Execution
FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virt...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Zhijie Gui Hui Shu Ju Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Considering that the deployment of IoT devices is becoming more and more widespread, the security analysis of the firmware of these devices is extremely important. However, a large number of devices now have vulnerabi... 详细信息
来源: 评论
Virtual Sample Generation for Retraining the Malicious PDF Detection Model
Virtual Sample Generation for Retraining the Malicious PDF D...
收藏 引用
作者: Kang HE Long LIU Dong-zhe LU Yuefei ZHU State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University
PDF files are adopted for launching cyberattacks because of their popularity and the increasing number of relative *** learning algorithms are developed to detect the maliciousness of PDF *** the exploits of new vulne... 详细信息
来源: 评论
Research on security assessment based on big data and multi-entity profile
Research on security assessment based on big data and multi-...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Wenfu Liu Jianmin Pang Shudan Yang Nan Li Qiming Du Daozhu Sun Fudong Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties" (entities in this paper) have intern... 详细信息
来源: 评论
Web Service QoS Prediction with Adaptive Calibration
Web Service QoS Prediction with Adaptive Calibration
收藏 引用
International Conference on Computer Sciences and Applications (CSA)
作者: Guo-Sheng Li Na Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Web services QoS (Quality of Service) prediction in dynamic environment is a critical method to support service selection and service composition. The existing QoS prediction methods focus on the user-side QoS but not... 详细信息
来源: 评论
mathematical modeling of lunar soft landing —Take chang'e-3 as an example
Mathematical modeling of lunar soft landing —Take chang'e-3...
收藏 引用
IEEE International Conference on Automation, Electronics and Electrical engineering (AUTEEE)
作者: Benchao Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, the three-dimensional sphere dynamic model of lunar precise soft landing of the probe is discussed. Taking the National College Students' mathematical modeling competition as the background and Chan... 详细信息
来源: 评论
Research on Cross-site Scripting Attack Detection Technology Based on Few-shot Learning
Research on Cross-site Scripting Attack Detection Technology...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Dongzhe Lu Long Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the intensification of informatization and mobility, various web security threats are emerging. Cross-site scripting (XSS) attack is the most common type of web attack. Most traditional detection methods have bee... 详细信息
来源: 评论
A Partial-Lifting-Based Compiling Concolic Execution Approach
A Partial-Lifting-Based Compiling Concolic Execution Approac...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE International Conference on
作者: Haotian Zhang Weiyu Dong Jian Lin State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
It has been a common phenomenon that embedded devices are used ubiquitously while the security of proprietary software running on devices has become more and more significant. These softwares are often presented to re... 详细信息
来源: 评论