咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 384 篇 期刊文献

馆藏范围

  • 1,056 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 521 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 23 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,020 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1056 条 记 录,以下是571-580 订阅
排序:
A survey of industrial control system testbeds  2
A survey of industrial control system testbeds
收藏 引用
2019 2nd International Conference on advanced Materials, Intelligent Manufacturing and Automation, AMIMA 2019
作者: Geng, Yangyang Wang, Yi Liu, Wenwen Wei, Qiang Liu, Ke Wu, Haolan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Department of Research and Development Center Beijing Sifang Automation Co. Ltd Beijing100085 China
Industrial Control System(ICS) testbed is the basis of ICS safety research. In order to build an ICS testbed, it is necessary to have a deep understanding of the current research status. This paper introduced the stru... 详细信息
来源: 评论
Field-aware Evolutionary Fuzzing Based on Input Specifications and Vulnerability Metrics
Field-aware Evolutionary Fuzzing Based on Input Specificatio...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Yunchao Wang Zehui Wu Qiang Wei Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Evolutionary fuzzing technology based on genetic algorithm has become one of the most effective vulnerability discovery techniques due to its fast and scalable advantages. How to effectively mutate the seed input play...
来源: 评论
DSA-NIE: Double Static Attributes Based Node Importance Evaluation of Inter-Domain Routing System
DSA-NIE: Double Static Attributes Based Node Importance Eval...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Huihu Zhu Han Qiu Junhu Zhu Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Assessing the importance of AS nodes is important for the protection of inter-domain routing system security. However, the existing literature on node importance evaluation methods based on static attributes are diffi... 详细信息
来源: 评论
NIG-AP: a new method for automated penetration testing
收藏 引用
Frontiers of Information Technology & Electronic engineering 2019年 第9期20卷 1277-1288页
作者: Tian-yang ZHOU Yi-chao ZANG Jun-hu ZHU Qing-xian WANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450001China
Penetration testing offers strong advantages in the discovery of hidden vulnerabilities in a network and assessing network ***,it can be carried out by only security analysts,which costs considerable time and *** natu... 详细信息
来源: 评论
A biologically plausible audio-visual integration model for continual learning
arXiv
收藏 引用
arXiv 2020年
作者: Chen, Wenjie Du, Fengtong Wang, Ye Cao, Lihong State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The problem of catastrophic forgetting has a history of more than 30 years and has not been completely solved yet. Since the human brain has natural ability to perform continual lifelong learning, learning from the br... 详细信息
来源: 评论
Spinful Topological Phases in Acoustic Crystals with Projective PT Symmetry
收藏 引用
Physical Review Letters 2023年 第2期130卷 026101-026101页
作者: Yan Meng Shuxin Lin Bin-jie Shi Bin Wei Linyun Yang Bei Yan Zhenxiao Zhu Xiang Xi Yin Wang Yong Ge Shou-qi Yuan Jingming Chen Gui-Geng Liu Hong-xiang Sun Hongsheng Chen Yihao Yang Zhen Gao Department of Electrical and Electronic Engineering Southern University of Science and Technology Shenzhen 518055 China Research Center of Fluid Machinery Engineering and Technology School of Physics and Electronics Engineering Jiangsu University Zhenjiang 212013 China SKLSM Institute of Semiconductors Chinese Academy of Sciences Beijing 100083 China Center for Excellence in Topological Quantum Computation University of Chinese Academy of Sciences Beijing 100190 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link Singapore 637371 Singapore State Key Laboratory of Acoustics Institute of Acoustics Chinese Academy of Sciences Beijing 100190 China Interdisciplinary Center for Quantum Information State Key Laboratory of Extreme Photonics and Instrumentation ZJU-Hangzhou Global Scientific and Technological Innovation Center Zhejiang University Hangzhou 310027 China International Joint Innovation Center The Electromagnetics Academy at Zhejiang University Zhejiang University Haining 314400 China Key Lab. of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang Jinhua Institute of Zhejiang University Zhejiang University Jinhua 321099 China Shaoxing Institute of Zhejiang University Zhejiang University Shaoxing 312000 China
For the classification of topological phases of matter, an important consideration is whether a system is spinless or spinful, as these two classes have distinct symmetry algebra that gives rise to fundamentally diffe... 详细信息
来源: 评论
Upper Security Bounds for Coherent-One-Way Quantum key Distribution
收藏 引用
Physical Review Letters 2020年 第26期125卷 260510-260510页
作者: Javier González-Payo Róbert Trényi Weilong Wang Marcos Curty Escuela de Ingeniería de Telecomunicación Department of Signal Theory and Communications University of Vigo Vigo E-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan 450001 China
The performance of quantum key distribution (QKD) is severely limited by multiphoton pulses emitted by laser sources due to the photon-number splitting attack. Coherent-one-way (COW) QKD has been introduced as a promi... 详细信息
来源: 评论
Factoring integers with sublinear resources on a superconducting quantum processor
arXiv
收藏 引用
arXiv 2022年
作者: Yan, Bao Tan, Ziqi Wei, Shijie Jiang, Haocong Wang, Weilong Wang, Hong Luo, Lan Duan, Qianheng Liu, Yiting Shi, Wenhao Fei, Yangyang Meng, Xiangdong Han, Yu Shan, Zheng Chen, Jiachen Zhu, Xuhao Zhang, Chuanyu Jin, Feitong Li, Hekang Song, Chao Wang, Zhen Ma, Zhi Wang, H. Long, Gui-Lu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics Tsinghua University Beijing100084 China School of Physics ZJU-Hangzhou Global Scientific and Technological Innovation Center Interdisciplinary Center for Quantum Information Zhejiang Province Key Laboratory of Quantum Technology and Device Zhejiang University Hangzhou310000 China Beijing Academy of Quantum Information Sciences Beijing100193 China Institute of Information Technology Information Engineering University Zhengzhou450001 China Beijing National Research Center for Information Science and Technology School of Information Tsinghua University Beijing100084 China Frontier Science Center for Quantum Information Beijing100084 China
Shor’s algorithm has seriously challenged information security based on public key cryptosystems. However, to break the widely used RSA-2048 scheme, one needs millions of physical qubits, which is far beyond current ... 详细信息
来源: 评论
Deity: Finding Deep Rooted Bugs in JavaScript Engines
Deity: Finding Deep Rooted Bugs in JavaScript Engines
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Hongyang Lin Junhu Zhu Jianshan Peng Dixia Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Fuzzing [1] is a well-known technique which was employed to provide unexpected or random data as input to JavaScript engines in hopes of finding a security vulnerability. For effective fuzzing, the input must be both ... 详细信息
来源: 评论
Incorporating Multiple Features to Predict Bug Fixing Time with Neural Networks
Incorporating Multiple Features to Predict Bug Fixing Time w...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Wei Yuan Yuan Xiong Hailong Sun Xudong Liu SKLSDE Lab School of Computer Science and Engineering Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing China SKLSDE Lab School of Software Beihang University Beijing China
Debugging is a well-known time-consuming task, and knowing how long it would take to resolve bugs is of great importance for allocating the limited resources in a software development team. However, it is challenging ...
来源: 评论