咨询与建议

限定检索结果

文献类型

  • 676 篇 会议
  • 398 篇 期刊文献

馆藏范围

  • 1,074 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 724 篇 工学
    • 528 篇 计算机科学与技术...
    • 418 篇 软件工程
    • 121 篇 信息与通信工程
    • 76 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 64 篇 电气工程
    • 64 篇 控制科学与工程
    • 62 篇 生物工程
    • 33 篇 机械工程
    • 33 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 170 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 158 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 14 篇 医学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 644 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 53 篇 luo xiangyang
  • 32 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 985 篇 英文
  • 70 篇 其他
  • 21 篇 中文
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1074 条 记 录,以下是611-620 订阅
排序:
A review of cryptographic algorithm recognition technology for binary code
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1856卷
作者: Chenxia Zhao Fei Kang Ju Yang Hui Shu Zhengzhou University Zhengzhou Henan 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo...
来源: 评论
A Security-Sensitive Function Mining Framework for Source Code  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Chen, Lin Yang, Chunfang Liu, Fenlin Gong, Daofu Ding, Shichang Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China University of Göttingen Goldschmidtstr. 7 Göttingen37077 Germany
The security-sensitive functions can be effectively used to improve the efficiency of vulnerability mining techniques, but mining security-sensitive functions of the large-scale code base is difficult. An automatic mi... 详细信息
来源: 评论
Multi-label Classification with High-rank and High-order label Correlations
arXiv
收藏 引用
arXiv 2022年
作者: Si, Chongjie Jia, Yuheng Wang, Ran Zhang, Min-Ling Feng, Yanghe Qu, Chongxiao The Chien-Shiung Wu College Southeast University Nanjing210096 China The MoE Key Lab of Artificial Intelligence AI Institute Shanghai Jiao Tong University Shanghai200240 China The School of Computer Science and Engineering Southeast University Nanjing210096 China Ministry of Education China School of Computing & Information Sciences Caritas Institute of Higher Education Hong Kong The Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China The School of Mathematical Science Shenzhen University Shenzhen518060 China Shenzhen Key Laboratory of Advanced Machine Learning and Applications Shenzhen University Shenzhen518060 China The College of Systems Engineering National University of Defense Technology China The 52nd Research Institute of China Electronics Technology Group China
Exploiting label correlations is important to multi-label classification. Previous methods capture the high-order label correlations mainly by transforming the label matrix to a latent label space with low-rank matrix... 详细信息
来源: 评论
SECP-AKE: Secure and efficient certificateless-password-based authenticated key exchange protocol for smart healthcare systems
收藏 引用
Journal of Systems Architecture 2025年 167卷
作者: Zhiqiang Zhao Xuexian Hu Yining Liu Jianghong Wei Yuanjun Xia Yangfan Liang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou 450000 Henan China School of Data Science and Artificial Intelligence Wenzhou University of Technology Wenzhou 325027 Zhejiang China School of Computer and Information Security Guilin University of Electronic Technology Guilin 541004 Guangxi China College of Information Science and Engineering the Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems the Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province and the Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing University Jiaxing 314001 Zhejiang China
Due to the importance and sensitivity of medical data, the security protection and privacy preservation of the Healthcare Internet of Things (IoT) are current research hotspots. However, existing research schemes stil...
来源: 评论
Comments on Privacy-preserving Yoking proof with key exchange in the three-party setting
收藏 引用
International Journal of Network Security 2019年 第2期21卷 355-358页
作者: Cheng, Qingfeng Zhang, Xinglong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Province450001 China
In 2017, Tian, Yang and Mu presented a new three-party key exchange protocol YPKE in radio frequency identification environment, which is based on the HMQV protocol. They claimed that the proposed YPKE protocol in the... 详细信息
来源: 评论
GREYONE: data flow sensitive fuzzing  20
GREYONE: data flow sensitive fuzzing
收藏 引用
Proceedings of the 29th USENIX Conference on Security Symposium
作者: Shuitao Gan Chao Zhang Peng Chen Bodong Zhao Xiaojun Qin Dong Wu Zuoning Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Institute for Network Science and Cyberspace Tsinghua University and Beijing National Research Center for Information Science and Technology ByteDance AI lab Institute for Network Science and Cyberspace Tsinghua University National Research Center of Parallel Computer Engineering and Technology
Data flow analysis (e.g., dynamic taint analysis) has proven to be useful for guiding fuzzers to explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is labor-intensive, inaccurate ...
来源: 评论
A Format Protection Method of Greybox Fuzzing  19
A Format Protection Method of Greybox Fuzzing
收藏 引用
19th IEEE International Conference on Communication Technology, ICCT 2019
作者: Zhao, Shibin Zhou, Tianyang Duan, Xiaoli Lin, Hongyang Ying, Xinlei Shi, Qibo Peng, Jianshan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China China United Network Communications Group Co. Ltd Shanxi Yuncheng Branch Yuncheng044000 China Ant-financial Light-Year Security Lab hangzhou310000 China
Greybox fuzzing, which can fuzz without knowledge of the format, is one of the most advanced fuzzing techniques. However, the lack of format knowledge makes the test cases' format messy as the fuzzing proceeds and... 详细信息
来源: 评论
A dynamic network change detection method using network embedding  4th
A dynamic network change detection method using network embe...
收藏 引用
4th International Conference on Cloud computing and Security, ICCCS 2018
作者: Sun, Tong Liu, Yan China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic networks are ubiquitous. Detecting dynamic network changes is helpful to understand the network development trend and discover network anomalies in time. It is a research hotspot at present. The structure of t... 详细信息
来源: 评论
HHL Analysis and Simulation Verification Based on Origin Quantum Platform
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2113卷
作者: Xiaonan Liu Lina Jing Lin Han Jie Gao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China Henan Supercomputing Center Zhengzhou University Zhengzhou 450001 China
Solving large-scale linear equations is of great significance in many engineering fields, such as weather forecasting and bioengineering. The classical computer solves the linear equations, no matter adopting the elim...
来源: 评论
Truth discovery on categorical multi-valued attributes with source relations  4
Truth discovery on categorical multi-valued attributes with ...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Zheng, Yan Luo, Junyong Yin, Meijuan Yang, Wen China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the era of big data, a mass of data fusion applications need to obtain accurate and complete attribute information about various objects. Most existing truth discovery methods are for single-valued attributes, whic... 详细信息
来源: 评论