咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是561-570 订阅
排序:
On the Sharing-Based Model of Steganography  19th
On the Sharing-Based Model of Steganography
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Xianfeng Yang, Chunfang Liu, Fenlin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100195 China School of Cyber Security University of Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Steganography has long been considered as a way of hiding the fact of secret communication. However, the fact that a message sender and a receiver communicated with each other is seldom protected. It can be dangerous ... 详细信息
来源: 评论
Rapid Detection of Stego Images Based on Identifiable Features
Rapid Detection of Stego Images Based on Identifiable Featur...
收藏 引用
International Conference on advanced Communication Technology
作者: Weiwei Pang Xiangyang Luo Jie Ren Chunfang Yang Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on iden... 详细信息
来源: 评论
Deity: Finding Deep Rooted Bugs in JavaScript Engines
Deity: Finding Deep Rooted Bugs in JavaScript Engines
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Hongyang Lin Junhu Zhu Jianshan Peng Dixia Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Fuzzing [1] is a well-known technique which was employed to provide unexpected or random data as input to JavaScript engines in hopes of finding a security vulnerability. For effective fuzzing, the input must be both ... 详细信息
来源: 评论
The Executors Scheduling Algorithm for the Web Server Based on the Attack Surface
The Executors Scheduling Algorithm for the Web Server Based ...
收藏 引用
Advances in Electrical engineering and Computer Applications( AEECA), 2020 IEEE International Conference on
作者: Guanglai Nie Zheng Zhang Yufeng Zhao State key Laboratory of Mathematical Engineering and Advanced Computing MEAC Zhengzhou China
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith... 详细信息
来源: 评论
The Stacked Seq2seq-attention Model for Protocol Fuzzing
The Stacked Seq2seq-attention Model for Protocol Fuzzing
收藏 引用
作者: Zicong Gao Weiyu Dong Rui Chang Chengwei Ai Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing
Fuzzing is an effective approach to discover vulnerabilities in software by generating the amount of unexcepted data as inputs to a program. It is difficult to fuzz the protocol automatically because it is necessary t... 详细信息
来源: 评论
Network security assessment based on full host-based attack graph  2020
Network security assessment based on full host-based attack ...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of advanced Technologies
作者: Xiao-fan Wang Tian-yang Zhou Jun-hu Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to... 详细信息
来源: 评论
New Virus Infection Technology and Its Detection
New Virus Infection Technology and Its Detection
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Zhixu Yangchun Yuntian Zhao Ju Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Computer virus detection technology is an important basic security technology in the information age. The current detection technology has a high success rate for the detection of known viruses and known virus infecti... 详细信息
来源: 评论
spotFuzzer: Static Instrument and Fuzzing Windows COTs
arXiv
收藏 引用
arXiv 2022年
作者: Gu, Yeming Shu, Hui Ma, Rongkuan Yan, Lin Zhu, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
The security research on Windows has received little attention in the academic circle. Most of the new methods are usually designed for Linux system, and are difficult to transplant to Windows. Fuzzing for Windows pro... 详细信息
来源: 评论
Dynamic program behavior model based on layered dependencies
Dynamic program behavior model based on layered dependencies
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Chao Fan Rongcai Zhao Zheng Shan Hongbo Cai State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
It is effective to ensure the credibility of program to monitor the real-time status in the whole process when the program is been executed. Aiming at the problem of high convexity of feature extracting and interactio... 详细信息
来源: 评论
Extraction of Secret Message Based on Uniformly Most Powerful Test
SSRN
收藏 引用
SSRN 2022年
作者: Du, Hansong Liu, Jiufen Luo, Xiangyang Zhang, Yi The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As the ultimate goal of steganalysis, secret message extraction is a bottleneck and difficulty that has long plagued the development of steganalysis technology. Existing pioneering work on secret message extraction fo... 详细信息
来源: 评论