咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是601-610 订阅
排序:
A Security-Sensitive Function Mining Framework for Source Code  5th
A Security-Sensitive Function Mining Framework for Source Co...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Chen, Lin Yang, Chunfang Liu, Fenlin Gong, Daofu Ding, Shichang Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China University of Göttingen Goldschmidtstr. 7 Göttingen37077 Germany
The security-sensitive functions can be effectively used to improve the efficiency of vulnerability mining techniques, but mining security-sensitive functions of the large-scale code base is difficult. An automatic mi... 详细信息
来源: 评论
Research and Design of Square Kilometer Array Astronomical Data Management Model Based on Fabric  13
Research and Design of Square Kilometer Array Astronomical D...
收藏 引用
2020 IEEE Congress on Cybermatics: 13th IEEE International Conferences on Internet of Things, iThings 2020, 16th IEEE International Conference on Green computing and Communications, GreenCom 2020, 13th IEEE International Conference on Cyber, Physical and Social computing, CPSCom 2020 and 6th IEEE International Conference on Smart Data, SmartData 2020
作者: Fu, Jinhua Xu, Jie Zhang, Shulin Zhang, Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou University of Light Industry Zhengzhou China Zhengzhou University of Light Industry Zhengzhou China Qinghai University Department of Computer Technology and Applications Xining China
At present, how to safely share data among different participants has become a huge challenge. The reliable traceability of SKA data is a powerful technical tool for controlling its security and sharing. In order to s... 详细信息
来源: 评论
Steganalysis of F5-like steganography based on selection of joint distribution features  13
Steganalysis of F5-like steganography based on selection of ...
收藏 引用
5th International Conference on Internet Multimedia computing and Service, ICIMCS 2013
作者: Liu, Yuan Luo, Xiangyang Lu, Jicang Gong, Daofu Zhengzhou Information Science and Technology Institute Zhengzhou 450001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
For steganalysis of F5-like steganography with two types of widely used joint distribution statistical features: co-occurrence matrix and Markov transition probability matrix, a feature selection and fusion method bas... 详细信息
来源: 评论
Enhancing reliability and efficiency for real-time robust adaptive steganography using cyclic redundancy check codes
Enhancing reliability and efficiency for real-time robust ad...
收藏 引用
作者: Zhang, Yi Luo, Xiangyang Zhu, Xiaodong Li, Zhenyu Bors, Adrian G. State Key Laboratory of Mathematical Engineering and Advanced Computing 62# Science Rd Zhengzhou China Department of Computer Science University of York YorkYO10 5GH United Kingdom
The development of multimedia and deep learning technology bring new challenges to steganography and steganalysis techniques. Meanwhile, robust steganography, as a class of new techniques aiming to solve the problem o... 详细信息
来源: 评论
An energy-efficient bandwidth allocation method for single-chip heterogeneous processor  7
An energy-efficient bandwidth allocation method for single-c...
收藏 引用
7th International Green and Sustainable computing Conference, IGSC 2016
作者: Zhu, Yatao Zhang, Shuai Ye, Xiaochun Wang, Da Tan, Xu Fan, Dongrui Zhang, Zhimin Li, Hongliang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu China
In recent years, many studies on optimization of energy consumption have focused on heterogeneous processor architectures. Heterogeneous computing model composed of CPU and GPU has developed from co-processing between... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
A Dual-Watermarking Scheme Robust to Affine Transformation
A Dual-Watermarking Scheme Robust to Affine Transformation
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Liu, Feng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou City Henan Province450000 China College of Software Engineering Zhengzhou University of Light Industry Zhengzhou City Henan Province450000 China
This paper proposes a robust watermarking algorithm based on dual watermarking and robust affine transformation. First, the color image is divided into three channels, feature point extraction, watermark embedding, an... 详细信息
来源: 评论
A Robust Watermarking Scheme based on Delaunay Image Reconstruction Robust to Affine Transformation  6
A Robust Watermarking Scheme based on Delaunay Image Reconst...
收藏 引用
2021 6th International Symposium on Advances in Electrical, Electronics and Computer engineering, ISAEECE 2021
作者: Feng, Liu Gong, Daofu Wang, Wenbing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou City Henan Province450000 China College of Software Engineering Zhengzhou University of Light Industry Zhengzhou City Henan Province450000 China
This paper proposes a sub-channel image reconstruction algorithm based on Delaunay triangle. First, according to the different sensitivity of the human eye to the three color channels, different channels are used to a... 详细信息
来源: 评论
Exploiting transmission lines on heterogeneous networks-on-chip to improve the adaptivity and efficiency of cache coherence  15
Exploiting transmission lines on heterogeneous networks-on-c...
收藏 引用
9th IEEE/ACM International Symposium on Networks-on-Chip, NOCS 2015
作者: Hu, Qi Liu, Peng Huang, Michael C. Xie, Xiang-Hui College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China Dept. of Electrical and Computer Engineering University of Rochester RochesterNY14627 United States State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Emerging heterogeneous interconnects have shown lower latency and higher throughput, which can improve the efficiency of communication and create new opportunities for memory system designs. In this paper, transmissio... 详细信息
来源: 评论
A security routing model based on trust for medical sensor networks
A security routing model based on trust for medical sensor n...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Yan Gao Wenfen Liu Zhengzhou Institute of Information Science and Technology State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou Institute of Information Science and Technology State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of medical sensor networks, the security has becomes an important issue. In this paper, a security routing model based on trust is proposed for medical sensor networks. To measure the credibility ... 详细信息
来源: 评论