咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是741-750 订阅
排序:
Research on Heterogeneity of Information System with Dissimilar Redundant Architecture Based on Attack Surface
Research on Heterogeneity of Information System with Dissimi...
收藏 引用
International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC)
作者: Liqun Wang Zheng Zhang Weichao Li Guangwei Xie State key Laboratory of Mathematical Engineering and Advanced Computing MEAC Zhengzhou China Shanghai RedNeurons Co. Ltd. Shanghai China
Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in ord...
来源: 评论
New strategy for searching disturbance vector of SHA-1 collision attack
收藏 引用
Science China(Information Sciences) 2017年 第12期60卷 280-282页
作者: Hao FENG Guang ZENG Wenbao HAN Yang YANG State Key Laboratory of Mathematical Engineering and Advanced Computing Centrum Wiskunde & Informatica Amsterdam 1098 XG Zhengzhou Information Science and Technology Institute Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 1... 详细信息
来源: 评论
A new socio-rational secret sharing scheme
收藏 引用
International Journal of Innovative computing and Applications 2017年 第1期8卷 21-30页
作者: Jin, Jianghao Zhou, Xie Ma, Chuangui Wang, Xu'an State Key laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan China Department of Basic Courses Army Aviation Institute Beijing China Engineering University of CAPF Xi'anShanxi China
We introduce the concept of a socio-rational secret sharing scheme, in which shares are delivered based on players' reputation and the way they contact with other participants. At the secret sharing stage, weights... 详细信息
来源: 评论
Delay-Distance Correlation Study for IP Geolocation
收藏 引用
Wuhan University Journal of Natural Sciences 2017年 第2期22卷 157-164页
作者: DING Shichang LUO Xiangyang YE Dengpan LIU Fenlin The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 Henan China School of Computer Wuhan University Wuhan 430072Hubei China
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to... 详细信息
来源: 评论
Residual Networks for Light Field Image Super-Resolution
Residual Networks for Light Field Image Super-Resolution
收藏 引用
IEEE/CVF Conference on Computer Vision and Pattern Recognition
作者: Shuo Zhang Youfang Lin Hao Sheng Beijing Key Lab of Traffic Data Analysis and Mining School of Computer and Information Technology Beijing Jiaotong University Key Laboratory of Intelligent Passenger Service of Civil Aviation CAAC State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University
Light field cameras are considered to have many potential applications since angular and spatial information is captured simultaneously. However, the limited spatial resolution has brought lots of difficulties in deve...
来源: 评论
A Forensic Method for Efficient File Extraction in HDFS Based on Three-Level Mapping
收藏 引用
Wuhan University Journal of Natural Sciences 2017年 第2期22卷 114-126页
作者: GAO Yuanzhao LI Binglong The Forth College Information Engineering UniversityZhengzhou 450001 Henan China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou 450001 Henan China
The large scale and distribution of cloud computing storage have become the major challenges in cloud forensics for file extraction. Current disk forensic methods do not adapt to cloud computing well and the forensic ... 详细信息
来源: 评论
Multi-Variant Execution Research of Software Diversity
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1325卷
作者: Zhenwu Liu Zheng Zhang Jiexin Zhang Hao Liu State key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University ZhengZhou HeNan 450001 China
As more and more software products are threatened by malicious reverse analysis, along with software products are pirated, tampered with and so on, it is of great significance to study software security protection tec...
来源: 评论
Erratum: “Spin wave propagation in a ferrimagnetic thin film with perpendicular magnetic anisotropy” [Appl. Phys. Lett. 117, 232407 (2020)]
收藏 引用
Applied Physics Letters 2021年 第2期118卷
作者: Lutong Sheng Yawen Liu Jilei Chen Hanchen Wang Jianyu Zhang Mingfeng Chen Ji Ma Chuanpu Liu Sa Tu Ce-Wen Nan Haiming Yu 1Fert Beijing Institute School of Integrated Circuit Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing 100191 China 2Department of Physics and Astronomy University of California Riverside California 92521 USA 3State Key Lab of New Ceramics and Fine Processing School of Materials Science and Engineering Tsinghua University Beijing 100084 China
In the original article,1 the line spectrum in Fig. 2(b) is missing. The correct Fig. 2(b), given here, shows how we get the frequency difference from this spec
来源: 评论
A probabilistic framework of preference discovery from folksonomy corpus
收藏 引用
Frontiers of Computer Science 2017年 第6期11卷 1075-1084页
作者: Xiaohui GUO Chunming HU Richong ZHANG Jinpeng HUAI State Key Lab of Software Development Environment Beihang University Beijing 100191 China Institute of Advanced Computing Technology School of Computer Science and Engineering Beihang University Beijing 100191 China
The increasing availability of folksonomy data makes them vital for user profiling approaches to precisely detect user preferences and better understand user interests, so as to render some personalized recommendation... 详细信息
来源: 评论
A Demand-Driven Pointer-Range Analysis Technique for Data Transmission Optimization
A Demand-Driven Pointer-Range Analysis Technique for Data Tr...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Bo Zhao Xiaoyan Xu Peng Liu Yingying Li Rongcai Zhao Ramin Yahyapour Gesellschaft für wissenschaftliche Datenverarbeitung mbH Göttingen Göettingen Germany State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The goal of range analysis is to determine a program variable's minimum and maximum value at runtime and it becomes more complex to calculate the range space when the variable is a pointer. In this paper, we analy... 详细信息
来源: 评论