咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 387 篇 期刊文献

馆藏范围

  • 1,059 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 716 篇 工学
    • 523 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 117 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 71 篇 网络空间安全
    • 65 篇 电气工程
    • 62 篇 控制科学与工程
    • 62 篇 生物工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 22 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 19 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 411 篇 理学
    • 199 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 54 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 topology
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 45 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,023 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1059 条 记 录,以下是651-660 订阅
排序:
Timing Strategy for Active Detection of APT Attack Based on FlipIt Model and Q-learning Method
Timing Strategy for Active Detection of APT Attack Based on ...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Zhilin Liu Hengwei Zhang Pengyu Sun Yan Mi Xiaoning Zhang Jindong Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr... 详细信息
来源: 评论
Network Attack Intention Recognition Based on Signaling Game Model and Netlogo Simulation
Network Attack Intention Recognition Based on Signaling Game...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Xiaoning Zhang Hengwei Zhang Chenwei Li Pengyu Sun Zhilin Liu Jindong Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes... 详细信息
来源: 评论
Binary semantic Similarity Comparison based on software gene
Binary semantic Similarity Comparison based on software gene
收藏 引用
作者: Wenjie Sun Yihang Chen Zheng Shan Fudong liu Qiuna Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Materials branch of State Grid Henan Electric Power Company
The similarity of binary code is widely used in code copyright protection, vulnerability mining, malicious code analysis and etc. In this paper, we proposed a method for measuring/evaluating the similarity of two bina... 详细信息
来源: 评论
LLMEmbed: Rethinking Lightweight LLM's Genuine Function in Text Classification
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Chun Zhang, Hongguang Zhao, Kainan Ju, Xinghai Yang, Lin Systems Engineering Institute AMS Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the booming of Large Language Models (LLMs), prompt-learning has become a promising method mainly researched in various research areas. Recently, many attempts based on prompt-learning have been made to improve t... 详细信息
来源: 评论
Data Dependence Constraints on SIMD Extensions
Data Dependence Constraints on SIMD Extensions
收藏 引用
2014 International Conference on Computer,Network Security and Communication engineering(CNSCE 2014)
作者: Yong-sheng HOU Rong-cai ZHAO Shi-jie YAN Xuan LI State Key Laboratory of Mathematical Engineering and Advanced Computing School of Automation and Electrical Engineering Beijing University of Science and Technology
Exploiting fine-grained data-level parallelism via SIMD(Single Instruction Multiple Data) extension instructions is a universal approach in recent decades. A parallelizing compiler with SIMD vectorization is a widespr... 详细信息
来源: 评论
DSSA: Dual-Side Sparse Systolic Array Architecture for Accelerating Convolutional Neural Network Training  22
DSSA: Dual-Side Sparse Systolic Array Architecture for Accel...
收藏 引用
Proceedings of the 51st International Conference on Parallel Processing
作者: Zhengbo Chen Qi Yu Fang Zheng Feng Guo Zuoning Chen Information Engineering University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Chinese Academy of Engineering China
Ever-growing CNN size incurs a significant amount of redundancy in model parameters, which in turn, puts considerable burden on hardware. Unstructured pruning is widely used to reduce model sparsity. While, the irregu... 详细信息
来源: 评论
A practical and aggressive loop fission technique  18th
A practical and aggressive loop fission technique
收藏 引用
18th International Conference on Algorithms and Architectures for Parallel Processing - ICA3PP 2018 Collocated Workshops: ICA3PP 2018 Workshop on Intelligent Algorithms for Large-scale Complex Optimization Problems, IALCOP 2018, ICA3PP 2018 Workshop on Security and Privacy in Data Processing, SPDP 2018
作者: Zhao, Bo Li, Yingying Han, Lin Zhao, Jie Gao, Wei Zhao, Rongcai Yahyapour, Ramin Gesellschaft für wissenschaftliche Datenverarbeitung mbH Göttingen Göttingen37077 Germany State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China French Institute for Research in Computer Science and Automation Rocquencourt France
Loop fission is an effective loop optimization for exploiting fine-grained parallelism. Currently, loop fission is widely used in existing parallelizing compilers. To fully exploit the optimization, we proposed and im... 详细信息
来源: 评论
SARF: A Spark Based Recommendation Framework in the Cloud
SARF: A Spark Based Recommendation Framework in the Cloud
收藏 引用
International Conference on advanced Cloud and Big Data (CBD)
作者: Jieyao Zhou Yifei Lu Ka Bian Lei Qian School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi China
With the development of the IT industry, the information resources and services that people come into contact with have been growing. The sharing and interaction of these two types of information has led to further gr... 详细信息
来源: 评论
The interactive mechanism of static and dynamic analysis in the reverse analysis of embedded software
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2016年 第10期11卷 33-44页
作者: Tie-Ming, Liu Lie-Hui, Jinag Jing-Si, Zhu Gang, Meng The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China ZhengZhou University of Science and Technology Zhengzhou450064 China
Because the software reverse analysis method which combined the dynamic and static analyses lacks normative interactive mode, the work of the software reverse analysis is inefficient, and its reusability is poor. Base... 详细信息
来源: 评论
DCTCP with Front Marking: Decouple ECN Control Loop From The Queuing Delay
DCTCP with Front Marking: Decouple ECN Control Loop From The...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Xu Ma Yifei Lu Zhengzhi Xu School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi China
Datacenter transports should provide low flow completion times (FCT) to achieve desired application performance for short flows, and it should also ensure largely sustained throughput for long flows. DCTCP is designed... 详细信息
来源: 评论