咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是681-690 订阅
排序:
A robust image steganography method resistant to scaling and detection
A robust image steganography method resistant to scaling and...
收藏 引用
作者: Zhang, Yue Luo, Xiangyang Wang, Jinwei Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer and Software Nanjing University of Information Science and Technology China Zhengzhou Science and Technology Institute China
The current image steganography algorithms mainly focus on the anti-detectability rather than the robustness to scaling attacks. Therefore, it is difficult to extract the secret messages correctly after stego images s... 详细信息
来源: 评论
Analysis of GLV/GLS method for elliptic curve scalar multiplication  6th
Analysis of GLV/GLS method for elliptic curve scalar multipl...
收藏 引用
6th International Conference on Frontier computing, FC 2017
作者: Dou, Yunqi Weng, Jiang Ma, Chuangui Wei, Fushan State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information and Navigation College Air Force Engineering University Xi’an China Department of Basic Army Aviation Institution Beijing China
GLV method is an important research direction to accelerate the scalar multiplication on classes of elliptic curves with efficiently computable endomorphisms, which can reduce the number of doublings by using Straus-S... 详细信息
来源: 评论
A multi-cubic-kilometre neutrino telescope in the western Pacific Ocean
arXiv
收藏 引用
arXiv 2022年
作者: Ye, Z.P. Hu, F. Tian, W. Chang, Q.C. Chang, Y.L. Cheng, Z.S. Gao, J. Ge, T. Gong, G.H. Guo, J. Guo, X.X. He, X.G. Huang, J.T. Jiang, K. Jiang, P.K. Jing, Y.P. Li, H.L. Li, J.L. Li, L. Li, W.L. Li, Z. Liao, N.Y. Lin, Q. Lin, J. Liu, F. Liu, J.L. Liu, X.H. Miao, P. Mo, C. Morton-Blake, I. Peng, T. Sun, Z.Y. Tang, J.N. Tang, Z.B. Tao, C.H. Tian, X.L. Wang, M.X. Wang, Y. Wang, Y. Wei, H.D. Wei, Z.Y. Wu, W.H. Xian, S.S. Xiang, D. Xu, D.L. Xue, Q. Yang, J.H. Yang, J.M. Yu, W.B. Zeng, C. Zhang, F.Y.D. Zhang, T. Zhang, X.T. Zhang, Y.Y. Zhi, W. Zhong, Y.S. Zhou, M. Zhu, X.H. Zhuang, G.J. Tsung-Dao Lee Institute Shanghai Jiao Tong University Shanghai200240 China School of Physics and Astronomy Shanghai Jiao Tong University MOE Key Laboratory for Particle Astrophysics and Cosmology Shanghai Key Laboratory for Particle Physics and Cosmology Shanghai200240 China Department of Astronomy School of Physics Peking University Being 100871 China State Key Laboratory of Ocean Engineering School of Naval Architecture Ocean and Civil Engineering Shanghai Jiao Tong University Shanghai200240 China Shanghai Jiao Tong University Sanya Yazhou Bay Institute of Deep Sea Technology Sanya572024 China Center for High Energy Physics Peking University Beijing100871 China Department of Engineering Physics Tsinghua University Beijing100084 China State Key Laboratory of Particle Detection and Electronics University of Science and Technology of China Hefei230026 China Department of Modern Physics University of Science and Technology of China Hefei230026 China Shanghai Key Lab of Electrical Insulation and Thermal Aging School of Chemistry and Chemical Engineering Shanghai Jiao Tong University Shanghai200240 China Key Laboratory of Marine Ecosystem Dynamics Second Institute of Oceanography MNR Hangzhou310012 China Kavli Institute for Astronomy and Astrophysics Peking University Bejing100871 China Center for High Performance Computing Shanghai Jiao Tong University Shanghai200240 China Shanghai Jiao Tong University Sichuan Research Institute Chengdu610213 China School of Oceanography Shanghai Jiao Tong University Shanghai200030 China Key Laboratory of Submarine Geosciences Second Institute of Oceanography MNR Hangzhou310012 China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China MOE Key Laboratory for Laser Plasmas School of Physics and Astronomy Shanghai Jiao Tong University Shanghai200240 China Shanghai Jiao Tong University Shanghai200240 China Zhangjiang Institute for Advanced Study
Next-generation neutrino telescopes with significantly improved sensitivity are required to pinpoint the sources of the diffuse astrophysical neutrino flux detected by IceCube and uncover the century-old puzzle of cos... 详细信息
来源: 评论
Improvement in Diversify Active Defense for Web Application by Using Language and Database Heterogeneity  11
Improvement in Diversify Active Defense for Web Application ...
收藏 引用
2017 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification(ASID)
作者: Weichao Li Zheng Zhang Liqun Wang State Key Laboratory of Mathematical Engineering and Advanced Computing
According to OWASP selected web application Top 10 vulnerabilities in 2013 and 2017,structured query language(SQL)injection is consistently ranked the 1 ***,the protection of SQL injection,which is one of the most pre... 详细信息
来源: 评论
Text clustering algorithm based on deep representation learning
Text clustering algorithm based on deep representation learn...
收藏 引用
作者: Wang, Binyu Liu, Wenfen Lin, Zijie Hu, Xuexian Wei, Jianghong Liu, Chun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541000 China
Text clustering is an important method for effectively organising, summarising, and navigating text information. However, in the absence of labels, the text data to be clustered cannot be used to train the text repres... 详细信息
来源: 评论
Image Classification for Malware Detection using Extremely Randomized Trees  11
Image Classification for Malware Detection using Extremely R...
收藏 引用
2017 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification(ASID)
作者: Xin Zhou Jianmin Pang Guanghui Liang State Key Laboratory of Mathematical Engineering and Advanced Computing
With the development of machine learning and computer vision, we combined the image classification and malware detection in this work. Based on the technology of image classification, we achieved the detection of malw... 详细信息
来源: 评论
Research and Implementation of Reconfigurable Architecture of DES and ZUC  2
Research and Implementation of Reconfigurable Architecture o...
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Yuhan Chen Xuehui Du Wei Xiao Haiyang Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing
Reconfigurable cipher chip has become a research hotspot because of its flexibility, security and good resource utilization. At present, research of reconfigurable cipher chip usually focuses on the s
来源: 评论
Bintaint: A Static Taint Analysis Method for Binary Vulnerability Mining
Bintaint: A Static Taint Analysis Method for Binary Vulnerab...
收藏 引用
International Conference on Cloud computing, Big Data and Blockchain (ICCBB)
作者: Zenan Feng Zhenyu Wang Weiyu Dong Rui Chang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Vulnerabilities in the current network space has been increasingly concerned by all parties. More and more software is currently in the form of binary code in practical applications. Therefore, the research on vulnera... 详细信息
来源: 评论
Vulnerability Model and Evaluation of the UEFI Platform Firmware Based on Improved Attack Graphs
Vulnerability Model and Evaluation of the UEFI Platform Firm...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Fei Cao Qingbao Li Zhifeng Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of... 详细信息
来源: 评论
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 84-95页
作者: Yupeng JIANG Qun-Xiong ZHENG Dongdai LIN State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficien... 详细信息
来源: 评论