咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是611-620 订阅
排序:
An Improved Demand-Driven Pointer Alias Analysis Algorithm
An Improved Demand-Driven Pointer Alias Analysis Algorithm
收藏 引用
2014 International Conference on Computer,Network Security and Communication engineering(CNSCE 2014)
作者: Peng LIU Rong-cai ZHAO Wei GAO Xiang-jie MENG State Key Laboratory of Mathematical Engineering and Advanced Computing Personnel Department of Henan Meteorological Bureau
Pointer alias analysis is a key technology in dataflow analysis, the analysis results are the basis of compilation optimization and program transformation. Based on the analysis of demand-driven pointer analysis algor... 详细信息
来源: 评论
Hidden System APIs Based Code Obfuscation
Hidden System APIs Based Code Obfuscation
收藏 引用
2015 International Conference on Mechanical,Electronic and Information Technology engineering
作者: Fei Xiang Fenlin Liu Bin Lu Daofu Gong Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by c... 详细信息
来源: 评论
CinfoFuzz: Fuzzing Method Based on Web Service Correlation Information of Embedded Devices
CinfoFuzz: Fuzzing Method Based on Web Service Correlation I...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Qi Feng Weiyu Dong Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop... 详细信息
来源: 评论
Median Filtering Detection Based on Quaternion Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 929-943页
作者: Jinwei Wang Qiye Ni Yang Zhang Xiangyang Luo Yunqing Shi Jiangtao Zhai Sunil Kr Jha Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing100093China Department of Electrical Computer Engineering New Jersey Institute of TechnologyNew JerseyNJ07102USA
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m... 详细信息
来源: 评论
Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
Vulnerability Analysis for Complex Networks under the Shorte...
收藏 引用
2016 International Conference on Communications, Information Management and Network Security (CIMNS2016)
作者: Yaohui Hao Jihong Han Qinghua Cheng Yongjin Hu Zhengzhou Institute of Information Science and technology State Key Laboratory of Mathematical Engineering and Advanced Computing
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random ... 详细信息
来源: 评论
A Traffic Classification Method Based on Wavelet Spectrum of Scatter Factor and Improved K-means
A Traffic Classification Method Based on Wavelet Spectrum of...
收藏 引用
2016 3rd International Conference on engineering Technology and Application(ICETA 2016)
作者: Jinlong Fei Tianpeng Wang Xinzheng He Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Science and Technology on Communication Security Laboratory
Based on the problem that supervised machine learning requires labeled samples and fails to identify unknown traffic,the author innovatively integrates wavelet transform and K-means algorithm of unsupervised machine l... 详细信息
来源: 评论
CRNet:3D Face Reconstruction with Contour Map Regression Network
CRNet:3D Face Reconstruction with Contour Map Regression Net...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Tongxin Wei Qingbao Li Jinjin Liu School of Software Zhengzhou University Zhengzhou State Key Laboratory of Mathematical Engineering and Advanced Computing
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D... 详细信息
来源: 评论
Semi-Markov Network Traffic Model Based on Pareto Distribution
Semi-Markov Network Traffic Model Based on Pareto Distributi...
收藏 引用
2016 3rd International Conference on engineering Technology and Application(ICETA 2016)
作者: Jinlong Fei Tianpeng Wang Xinzheng He Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Science and Technology on Communication Security Laboratory
The establishment of the network traffic model has an important significance on the research of *** the basis of existing researches,this paper proposes the improved Semi-Markov network traffic model,and re-divides th... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
2021国际计算机前沿大会
作者: Wenning Zhang Qinglei Zhou Chongyang Jiao Ting Xu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhongyuan University of Technology Zhengzhou University
To solve the emerging complex optimization problems,multi objective optimization algorithms are *** introducing the surrogate model for approximate fitness calculation,the multi objective firefly algorithm with surrog...
来源: 评论
A secure spectrum auction scheme without the trusted party based on the smart contract
收藏 引用
Digital Communications and Networks 2021年 第2期7卷 223-234页
作者: Jiaqi Wang Ning Lu Qingfeng Cheng Lu Zhou Wenbo Shi School of Computer Science and Engineerings Northeastern University Shenyang 110004China School of Computer Science and Technology Xidian UniversityXi'anChina Strategic Support Force Information Engineering University Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Division of Computer Science University ofAizuAizu-WakamatsuJapan School of Computer and Communication Engineering Nordieastem UniversityQinhuangdao066004China
With the development of communication 5G networks and technologies,spectrum resources are increasingly *** scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum a... 详细信息
来源: 评论