咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是541-550 订阅
排序:
A survey of industrial control system testbeds  2
A survey of industrial control system testbeds
收藏 引用
2019 2nd International Conference on advanced Materials, Intelligent Manufacturing and Automation, AMIMA 2019
作者: Geng, Yangyang Wang, Yi Liu, Wenwen Wei, Qiang Liu, Ke Wu, Haolan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Department of Research and Development Center Beijing Sifang Automation Co. Ltd Beijing100085 China
Industrial Control System(ICS) testbed is the basis of ICS safety research. In order to build an ICS testbed, it is necessary to have a deep understanding of the current research status. This paper introduced the stru... 详细信息
来源: 评论
SIMD vectorization of nested loop based on strip mining
SIMD vectorization of nested loop based on strip mining
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Jinlong Xu Huihui Sun Rongcai Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between vector machine and SIMD extension is analyzed at the very start. The multilevel loop vector code generation algorithm termed Codegen put forward by Kennedy and other fellows can't be directl... 详细信息
来源: 评论
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Ling Chen Wenwen Liu Daofu Gong Yan Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
A malware detection system based on intermediate language
A malware detection system based on intermediate language
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Binglin Zhao Jin Han Xi Meng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Malware remains a serious problem for economic corporations, government agencies, and individuals. With the evolution of malware, the malware detection method based on signature, reputation or anomaly show the lack of... 详细信息
来源: 评论
Binary software vulnerability detection method based on attention mechanism
Binary software vulnerability detection method based on atte...
收藏 引用
International Conference on Mechanical, Control and Computer engineering (ICMCCE)
作者: Wenjie Han Jianmin Pang Xin Zhou Di Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Aiming at the stack overflow vulnerability in binary software, this paper proposes a binary vulnerability detection method based on the attention mechanism. First, this paper analyze the basic characteristics of stack... 详细信息
来源: 评论
Field-aware Evolutionary Fuzzing Based on Input Specifications and Vulnerability Metrics
Field-aware Evolutionary Fuzzing Based on Input Specificatio...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Yunchao Wang Zehui Wu Qiang Wei Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Evolutionary fuzzing technology based on genetic algorithm has become one of the most effective vulnerability discovery techniques due to its fast and scalable advantages. How to effectively mutate the seed input play...
来源: 评论
Unknown Traffic Identification Based on Deep Adaptation Networks
Unknown Traffic Identification Based on Deep Adaptation Netw...
收藏 引用
IEEE Conference on ALocal Computer Networks Workshops (LCN Workshops)
作者: Ziji Yang Wei Lin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Network traffic classification has become an important basis for computer networks. However, the emergence of new applications, which generate unknown traffic constantly, has brought new challenges. The most critical ... 详细信息
来源: 评论
DSA-NIE: Double Static Attributes Based Node Importance Evaluation of Inter-Domain Routing System
DSA-NIE: Double Static Attributes Based Node Importance Eval...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Huihu Zhu Han Qiu Junhu Zhu Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi... 详细信息
来源: 评论
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Ling Chen Wenwen Liu Daofu Gong Yan Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论
Integrating KNN and Gradient Boosting Decision Tree for Recommendation
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
IEEE advanced Information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Qiming Du Nan Li Shudan Yang Daozhu Sun Wenfu Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论