咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是551-560 订阅
排序:
NIG-AP: a new method for automated penetration testing
收藏 引用
Frontiers of Information Technology & Electronic engineering 2019年 第9期20卷 1277-1288页
作者: Tian-yang ZHOU Yi-chao ZANG Jun-hu ZHU Qing-xian WANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450001China
Penetration testing offers strong advantages in the discovery of hidden vulnerabilities in a network and assessing network ***,it can be carried out by only security analysts,which costs considerable time and *** natu... 详细信息
来源: 评论
Implementation of Multi-compartment Neuron Model with Synaptic Plasticity Using FPGA  21
Implementation of Multi-compartment Neuron Model with Synapt...
收藏 引用
21st IEEE International Conference on Communication Technology, ICCT 2021
作者: DIng, Yiwen Fu, Wenlong Cao, Lihong Communication University of China State Key Laboratory of Media Convergence and Communication Beijing China Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Computational neuroscience is interdisciplinary and plays an essential role in facilitating the development of cognitive neuroscience and Artificial General Intelligence (AGI). To explore the computational efficiency ... 详细信息
来源: 评论
SoK: A Survey on Redundant Execution Technology
SoK: A Survey on Redundant Execution Technology
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zijing Liu Zheng Zhang Ruicheng Xi Pengzhe Zhu Bolin Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the... 详细信息
来源: 评论
Secure and efficient smart card based remote user password authentication scheme
收藏 引用
International Journal of Network Security 2016年 第4期18卷 782-792页
作者: Wei, Jianghong Liu, Wenfen Hu, Xuexian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Province450002 China
In distributed systems, the smart card based password authentication, as one of the most convenient and efficienttwo-factor authentication mechanisms, is widely used toensure that the protected services are not availa... 详细信息
来源: 评论
Research on 3D Human Body Reconstruction Algorithm of Monocular Image  5
Research on 3D Human Body Reconstruction Algorithm of Monocu...
收藏 引用
5th Asian Conference on Artificial Intelligence Technology, ACAIT 2021
作者: Liang, Zijian Liang, Huan Fu, Wenlong Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The three-dimensional human body feature parameters extracted by the neural network method are coupled in the high-dimensional feature space. The fully connected network processes the three-dimensional human pose and ... 详细信息
来源: 评论
Embedding change rate estimation based on ensemble learning  13
Embedding change rate estimation based on ensemble learning
收藏 引用
1st ACM Workshop on Information Hiding and Multimedia Security, IH and MMSec 2013
作者: Li, Zhenyu Hu, Zongyun Luo, Xiangyang Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China Zhengzhou Institute of Information Science and Technology Zhengzhou 450002 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
In order to achieve higher estimation accuracy of the embedding change rate of a stego object, an ensemble learning-based estimation method is presented. First of all, a framework of embedding change rate estimation b... 详细信息
来源: 评论
An algorithm/hardware co-optimized method to accelerate CNNs with compressed convolutional weights on FPGA
An algorithm/hardware co-optimized method to accelerate CNNs...
收藏 引用
作者: Shang, Jiangwei Zhang, Zhan Zhang, Kun Li, Chuanyou Qian, Lei Liu, Hongwei School of Computer Science and Technology Harbin Institute of Technology Harbin China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China School of Computer Science and Engineering Southeast University Nanjing China
Convolutional neural networks (CNNs) have shown remarkable advantages in a wide range of domains at the expense of huge parameters and computations. Modern CNNs still tend to be more complex and larger to achieve bett... 详细信息
来源: 评论
A software trustworthiness measure based on the decompositions of trustworthy attributes and its validation
A software trustworthiness measure based on the decompositio...
收藏 引用
International Conference on Industrial engineering, Management Science and Applications, ICIMSA 2015
作者: Tao, Hongwei Chen, Yixiang Pang, Jianmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou45002 China MoE Engineering Center for Software/Hardware Co-Design Technology and Application East China Normal University Shanghai200062 China
There exist many software trustworthiness measures based on the decompositions of attributes. However, few of them are concerned with using more rigorous approaches to measure software trustworthiness and carrying out... 详细信息
来源: 评论
Network Topology Overlapping Group Detection Based on h-Core Pruning  6
Network Topology Overlapping Group Detection Based on h-Core...
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Zhang, Qi Liu, Yan Cai, Yuheng Zhong Yuan Network Security Research Institute Zhengzhou University Zhengzhou China Pla Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The network group detection has a large number of application researches and has achieved certain results in network security, IP entity location and load balancing. However, due to the large scale of the network topo... 详细信息
来源: 评论
Social User Geolocation Method Based on POI Location Feature Enhancement in Context  1
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Liu, Yu Qiao, Yaqiong Liu, Yimin Du, Shaoyong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China School of Information Engineering North China University of Water Resources and Electric Power Zhengzhou China
The geolocation information in social media user generated text is one of the important bases for inferring users' location. The existing methods often rely on the mentioned Point of Interest (POI) and location In... 详细信息
来源: 评论