咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是531-540 订阅
排序:
Embedding Attribute and Relation Information for Person Entity Alignment
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Can Wang Xiaonan Liu Meijuan Yin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
Recommendation of cyber attack method based on knowledge graph
Recommendation of cyber attack method based on knowledge gra...
收藏 引用
Computer engineering and Intelligent Control (ICCEIC) International Conference on
作者: Yunjia Ou Tianyang Zhou Junhu Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ... 详细信息
来源: 评论
Software Deployment Strategy Based on Performance and Heterogeneity
Software Deployment Strategy Based on Performance and Hetero...
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Hao Liu Zheng Zhang Zhenwu Liu Gaofei Zhang Yufeng Zhao State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the current cyberspace field, the positions of offensive and defensive parties are extremely imbalanced. Aiming at the weakness of web virtual hosting in this paper, we combine software diversity technology to buil... 详细信息
来源: 评论
One Wide-Sense Circuit Tree per Traffic Class Based Inter-domain Multicast
One Wide-Sense Circuit Tree per Traffic Class Based Inter-do...
收藏 引用
International Conference on Networking, Architecture, and Storage (NAS)
作者: Chen Yue Li Chaoling Huang Kaixiang Zhang Xiaobo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas... 详细信息
来源: 评论
ALEmu: A Framework for Application-layer Programs Emulation of Embedded Devices
ALEmu: A Framework for Application-layer Programs Emulation ...
收藏 引用
International Conference on Computer engineering and Applications (ICCEA)
作者: Heng He Xiaobing Xiong Yuntian Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ...
来源: 评论
A method of metamorphic relations constructing for object-oriented software testing
A method of metamorphic relations constructing for object-or...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Xinglong Zhang Lei Yu Xuemei Hou State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To solve the Oracle problem of methods sequence in object-oriented software testing, a method of metamorphic relations constructing for object-oriented software testing based on algebraic specification was proposed. F... 详细信息
来源: 评论
A Software Upgrade Security Analysis Method on Network Traffic Classification using Deep Learning
A Software Upgrade Security Analysis Method on Network Traff...
收藏 引用
Urban engineering and Management Science (ICUEMS), International Conference on
作者: Bing Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论
The Speedup Model for Manycore Processor
The Speedup Model for Manycore Processor
收藏 引用
International Conference on Information Science and Cloud computing Companion (ISCC-C)
作者: Nan Ye Ziyu Hao Xianghui Xie State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Integrating a large number of simple cores on the chip to provide the desired performance and throughput, microprocessor has entered the many core era. In order to fully extract the ability of the many core processor,... 详细信息
来源: 评论
Leveraging Markov chain and optimal mutation strategy for smart fuzzing
Leveraging Markov chain and optimal mutation strategy for sm...
收藏 引用
ICINS 2014 - 2014 International Conference on Information and Network Security
作者: Yongji Ouyang Zehui Wu Qing Mu Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzz testing is an important way of vulnerability discovery, however, the existing fuzzers based on symbolic execution and others have inherent shortcomings like needing more computing resource, in-depth analysis and ... 详细信息
来源: 评论
Fully secure decentralized ciphertext-policy attribute-based encryption in standard model  14th
Fully secure decentralized ciphertext-policy attribute-based...
收藏 引用
14th International Conference on Information Security and Cryptology, Inscrypt 2018
作者: Ma, Chuangui Ge, Aijun Zhang, Jie Army Aviation Institute Beijing China Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Jinan China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we introduce a new multi-authority ciphertext policy attribute-based encryption (MA-CP-ABE) system. In our system, there are multiple central authorities (CAs) and attribute authorities (AAs). The CAs w... 详细信息
来源: 评论