咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是521-530 订阅
排序:
Improving Steganalysis by Fusing SVM Classifiers for JPEG Images
Improving Steganalysis by Fusing SVM Classifiers for JPEG Im...
收藏 引用
International Conference on Computer Science and Mechanical Automation (CSMA)
作者: Peiqing Liu Fenlin Liu Chunfang Yang Xiaofeng Song State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As the present fusing strategies cannot utilize the correlation of different detection results for image steganography effectively, a steganalysis method is proposed based on fusing SVM classifiers. Firstly, different... 详细信息
来源: 评论
TS-GGNN: Combining Graph and Sequence Features for Vulnerability Detection in Source Code
TS-GGNN: Combining Graph and Sequence Features for Vulnerabi...
收藏 引用
International Conference on Communications, Information System and Computer engineering (CISCE)
作者: Xin Zhou Jianmin Pang Chunyan Zhang Feng Yue Junchao Wang Guangming Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability...
来源: 评论
Vulnerability Model and Evaluation of the UEFI Platform Firmware Based on Improved Attack Graphs
Vulnerability Model and Evaluation of the UEFI Platform Firm...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Fei Cao Qingbao Li Zhifeng Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of... 详细信息
来源: 评论
Thinking and Practice of Online Teaching under COVID-19 Epidemic
Thinking and Practice of Online Teaching under COVID-19 Epid...
收藏 引用
IEEE International Conference on Computer Science and Educational Informatization (CSEI)
作者: Zhang Ping Liu Fudong Shan Zheng State Key Laboratory of Mathematical Engineering and Advanced computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Xiangyang Chang Junhu Zhu Shibin Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论
Optimal Strategy Selection of Dynamic Protocol Stack Based on Game Theory
Optimal Strategy Selection of Dynamic Protocol Stack Based o...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Zhengke He Bin Lu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Mobile target defense technology not only protects system security, but also increases the cost of system operation. How to reduce the defense cost as much as possible while achieving the defense function is a current... 详细信息
来源: 评论
Research on Technology of Process Hiding Based on VMM
Research on Technology of Process Hiding Based on VMM
收藏 引用
International Conference on Computer Sciences and Applications (CSA)
作者: Wei-Liang Kong Guang-Yu Zeng Deng-Yuan Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Kernel-level Rootkit injects malicious code in the system kernel and realizes vicious function by modifying kernel code and data. The emergence of virtualization technology makes Rootkit hide itself and accesses syste... 详细信息
来源: 评论
Executable Program Code Segment Address Randomization
Executable Program Code Segment Address Randomization
收藏 引用
International Conference on Computer Sciences and Applications (CSA)
作者: Jian Lin Yu-Dong Guo Yu-Jia Man Shao-Huang Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In Linux Address Space layout Randomization, not all memory addresses are random. Executable Program is still loaded to a static address, so an attacker can do code reuse attack by using gadgets in executable program ... 详细信息
来源: 评论
Network Topology Change Detection Based on Statistical Process Control  20
Network Topology Change Detection Based on Statistical Proce...
收藏 引用
4th High Performance computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020
作者: Liu, Yan Liu, Lian Yan, Yu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Investigation Technology Center PLCMC Beijing China First Affiliated Hospital of Chongqing Medical University Chongqing China
Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the tradition... 详细信息
来源: 评论
Feature-based identification method of MCU firmware IO interface
Feature-based identification method of MCU firmware IO inter...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Yuanbo Sun Weiyu Dong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ... 详细信息
来源: 评论