咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是611-620 订阅
排序:
nnTaint: An Optimized Dynamic Taint Analysis Method Based on Neural Network
nnTaint: An Optimized Dynamic Taint Analysis Method Based on...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Yuming Zhu Weiyu Dong Cyber Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction ... 详细信息
来源: 评论
An IP geolocation method based on rich-connected sub-networks
An IP geolocation method based on rich-connected sub-network...
收藏 引用
International Conference on advanced Communication Technology (ICACT)
作者: Shichang Ding Xiangyang Luo Meijuan Yin Yan Liu Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute China
Recent years have seen a rapid growth of location-aware applications such as targeted marketing, restricted content delivery and location-based security check. Although existing delay-based IP geolocation techniques w... 详细信息
来源: 评论
Comments on Privacy-preserving Yoking proof with key exchange in the three-party setting
收藏 引用
International Journal of Network Security 2019年 第2期21卷 355-358页
作者: Cheng, Qingfeng Zhang, Xinglong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Province450001 China
In 2017, Tian, Yang and Mu presented a new three-party key exchange protocol YPKE in radio frequency identification environment, which is based on the HMQV protocol. They claimed that the proposed YPKE protocol in the... 详细信息
来源: 评论
Research of Teaching Methods for Professional Training Based on Project Driven Teaching Practices
Research of Teaching Methods for Professional Training Based...
收藏 引用
International Conference on Industrial Technology and Management Science(ITMS 2015)
作者: Da Xiao Yong Liu Lujia Cao Shengli Liu Dongyue Yan Zheng Zhou Information Science University State Key Laboratory of Mathematical Engineering and Advanced Computing
For business-oriented type of short-term training courses of this new task of teaching and teaching needs, to carry out an in-depth analysis and research, detailed the demand characteristics of these new teaching curr... 详细信息
来源: 评论
An Improved Demand-Driven Pointer Alias Analysis Algorithm
An Improved Demand-Driven Pointer Alias Analysis Algorithm
收藏 引用
2014 International Conference on Computer,Network Security and Communication engineering(CNSCE 2014)
作者: Peng LIU Rong-cai ZHAO Wei GAO Xiang-jie MENG State Key Laboratory of Mathematical Engineering and Advanced Computing Personnel Department of Henan Meteorological Bureau
Pointer alias analysis is a key technology in dataflow analysis, the analysis results are the basis of compilation optimization and program transformation. Based on the analysis of demand-driven pointer analysis algor... 详细信息
来源: 评论
Hidden System APIs Based Code Obfuscation
Hidden System APIs Based Code Obfuscation
收藏 引用
2015 International Conference on Mechanical,Electronic and Information Technology engineering
作者: Fei Xiang Fenlin Liu Bin Lu Daofu Gong Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by c... 详细信息
来源: 评论
CinfoFuzz: Fuzzing Method Based on Web Service Correlation Information of Embedded Devices
CinfoFuzz: Fuzzing Method Based on Web Service Correlation I...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Qi Feng Weiyu Dong Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop... 详细信息
来源: 评论
Median Filtering Detection Based on Quaternion Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 929-943页
作者: Jinwei Wang Qiye Ni Yang Zhang Xiangyang Luo Yunqing Shi Jiangtao Zhai Sunil Kr Jha Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Department of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing100093China Department of Electrical Computer Engineering New Jersey Institute of TechnologyNew JerseyNJ07102USA
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m... 详细信息
来源: 评论
Vulnerability Analysis for Complex Networks under the Shortest Path-Attack Strategies
Vulnerability Analysis for Complex Networks under the Shorte...
收藏 引用
2016 International Conference on Communications, Information Management and Network Security (CIMNS2016)
作者: Yaohui Hao Jihong Han Qinghua Cheng Yongjin Hu Zhengzhou Institute of Information Science and technology State Key Laboratory of Mathematical Engineering and Advanced Computing
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random ... 详细信息
来源: 评论
A Traffic Classification Method Based on Wavelet Spectrum of Scatter Factor and Improved K-means
A Traffic Classification Method Based on Wavelet Spectrum of...
收藏 引用
2016 3rd International Conference on engineering Technology and Application(ICETA 2016)
作者: Jinlong Fei Tianpeng Wang Xinzheng He Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Science and Technology on Communication Security Laboratory
Based on the problem that supervised machine learning requires labeled samples and fails to identify unknown traffic,the author innovatively integrates wavelet transform and K-means algorithm of unsupervised machine l... 详细信息
来源: 评论