咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是581-590 订阅
排序:
THE Furnace temperature curve based on one-dimensional unsteady heat conduction model
THE Furnace temperature curve based on one-dimensional unste...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Jiaqi Liu Hongchuan Zhou Benchao Yang State Key Laboratory of Mathematical Engineering and advanced computing Information Engineering University Zhengzhou China
This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to... 详细信息
来源: 评论
A Survey on Neural Machine Translation Applied to Sign Language Generation  3
A Survey on Neural Machine Translation Applied to Sign Langu...
收藏 引用
3rd International Conference on Applied Machine Learning, ICAML 2021
作者: Zhang, Yue Cao, Lihong State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China Neuroscience and Intelligent Media Institute Communication University of China Beijing100024 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is increasing at a rapid rate. There is a signifîcant com... 详细信息
来源: 评论
Steganalysis of adaptive JPEG steganography using 2D Gabor filters  15
Steganalysis of adaptive JPEG steganography using 2D Gabor f...
收藏 引用
3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015
作者: Song, Xiaofeng Liu, Fenlin Yang, Chunfang Luo, Xiangyang Zhang, Yi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Zhengzhou Information Science and Technology Institute Zhengzhou450001 China Zhengzhou Information Science and Technology Institute China State Key Laboratory of Information Assurance Beijing100072 China
Adaptive JPEG steganographic schemes are difficult to preserve the image texture features in all scales and orientations when the embedding changes are constrained to the complicated texture regions, then a steganalys... 详细信息
来源: 评论
Research on Security Protocol Analysis Tool SmartVerif
Research on Security Protocol Analysis Tool SmartVerif
收藏 引用
2021 International Conference on Computer Technology, Information engineering and Electron Materials, CTIEEM 2021
作者: Lu, Siqi Han, Qingdi Miao, Xuyang Liu, Yubo State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450000 China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450000 China Department of Information Science and Engineering Ocean University of China Shandong Qingdao266100 China
Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol... 详细信息
来源: 评论
Exploration and Research of Blended Learning in the“ Principles of Computer Organization”
Exploration and Research of Blended Learning in the“ Princi...
收藏 引用
IEEE International Conference on Computer Science and Educational Informatization (CSEI)
作者: Yifan Hou Wei Wang Fudong Liu Zheng Shan Junchao Wang Lixin Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
The“Principles of Computer Organization” is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the “Principles of Computer Organization “Aimi... 详细信息
来源: 评论
Boosting adversarial attacks on neural networks with better optimizer
arXiv
收藏 引用
arXiv 2020年
作者: Yin, Heng Zhang, Hengwei Wang, Jindong Dou, Ruiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Convolutional neural networks have outperformed humans in image recognition tasks, but they remain vulnerable to attacks from adversarial examples. Since these data are crafted by adding imperceptible noise to normal ... 详细信息
来源: 评论
Research on Timestamp-based Port Hopping in Software Defined Network
Research on Timestamp-based Port Hopping in Software Defined...
收藏 引用
2016 3rd International Conference on engineering Technology and Application(ICETA 2016)
作者: Ziyu Zhao Wei Huang Yuanbo Guo Wei Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Institute of Cryptography EngineeringInformation Engineering University
Port hopping is a typical technology in moving target defense which constantly changes communication port number to confuse potential attackers and protect target *** port hopping technology,time synchronization is th... 详细信息
来源: 评论
A Novel Timing-based Network Covert Channel Detection Method
A Novel Timing-based Network Covert Channel Detection Method
收藏 引用
作者: Shoupu Lu Zhifeng Chen Guangxin Fu Qingbao Li State Key laboratory of Mathematical Engineering and Advanced Computing Henan University of Economics and Law
Network stealth events are endless,and covert timing channel is one of the most difficult means to *** order to further improve the detection rate of covert timing channel,several typical network covert timing channel... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
作者: Shoupu Lu Qingbao Li Xinbing Zhu State Key laboratory of Mathematical Engineering and Advanced Computing Henan University of Economics and Law
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac... 详细信息
来源: 评论
Whole-Function Vectorization Based on Simplified Openmp Directives
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Lili Yao, Jinyang Li, Yingying Zhang, Ping Xu, Jinlong Zhao, Bo Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
With the continuous development of computing technology, an increasing number of vendors have integrated SIMD extension components into processors. These components can accelerate program execution efficiency and have... 详细信息
来源: 评论