咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是771-780 订阅
排序:
An Efficient Improved Model for Tor Anonymous Network
An Efficient Improved Model for Tor Anonymous Network
收藏 引用
2017 4th International Conference on engineering Technology and Application (ICETA 2017)
作者: Yitong Meng Yimin Liu Jinlong Fei Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security a... 详细信息
来源: 评论
Cross-Platform Embedded-System Dynamic Information Acquisition Method
Cross-Platform Embedded-System Dynamic Information Acquisiti...
收藏 引用
2017 2nd International Conference on Computer engineering,Information Science and Internet Technology(CII 2017)
作者: YISEN WANG JING JING JIANJING SHEN WEIYU DONG State Key Laboratory of Mathematical Engineering and Advanced Computing
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen... 详细信息
来源: 评论
VBD-MF:A Block Device to Monitor the File System of Virtual Machine
VBD-MF:A Block Device to Monitor the File System of Virtual ...
收藏 引用
2017 International Conference on Mathematics, Modelling and Simulation Technologies and Applications(MMSTA 2017)
作者: Rui LOU Lie-hui JIANG Yi-sen WANG State Key Laboratory of Mathematical Engineering and Advanced Computing
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD... 详细信息
来源: 评论
ShenTu: Processing Multi-Trillion Edge Graphs on Millions of Cores in Seconds  18
ShenTu: Processing Multi-Trillion Edge Graphs on Millions of...
收藏 引用
ACM/IEEE International Conference for High Performance computing, Networking, Storage, and Analysis
作者: Heng Lin Xiaowei Zhu Bowen Yu Xiongchao Tang Wei Xue Wenguang Chen Lufei Zhang Torsten Hoefler Xiaosong Ma Xin Liu Weimin Zheng Jingfang Xu Tsinghua University and Fma Technology Tsinghua University and Qatar Computing Research Institute Tsinghua University State Key Laboratory of Mathematical Engineering and Advanced Computing ETH Zurich Qatar Computing Research Institute National Research Centre of Parallel Computer Engineering and Technology Beijing Sogou Technology Development Co. Ltd
Graphs are an important abstraction used in many scientific fields. With the magnitude of graph-structured data constantly increasing, effective data analytics requires efficient and scalable graph processing systems.... 详细信息
来源: 评论
Intrusion Detection Algorithm Based on Convolutional Neural Network
Intrusion Detection Algorithm Based on Convolutional Neural ...
收藏 引用
2017 4th International Conference on engineering Technology and Application (ICETA 2017)
作者: Yuchen Liu Shengli Liu Xing Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing
A periodic load balancing method is proposed according to the load imbalance of network server in a clustered system of high concurrency. It is divided into different load periods based on the load condition of server... 详细信息
来源: 评论
A Technique for Bytecode Decompilation of PLC Program
A Technique for Bytecode Decompilation of PLC Program
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Xuefeng LV Yaobin Xie Xiaodong Zhu Lu Ren State Key Laboratory of Mathematical Engineering and Advanced Computing
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
来源: 评论
Route Intrusion Detection Based on Long Short Term Memory Recurrent Neural Network
Route Intrusion Detection Based on Long Short Term Memory Re...
收藏 引用
2017 2nd International Conference on Computer engineering,Information Science and Internet Technology(CII 2017)
作者: YUCHEN LIU SHENGLI LIU YANG WANG State Key Laboratory of Mathematical Engineering and Advanced Computing
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is neces... 详细信息
来源: 评论
Identification of mobile device threats based on PCA-fused neural network
Boletin Tecnico/Technical Bulletin
收藏 引用
Boletin Tecnico/Technical Bulletin 2017年 第3期55卷 278-285页
作者: Chu, Sijun Wu, Hao Lu, Yulin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
To monitor and identify whether a mobile device is under threat or at risk effectively, in this paper, we summarize feature data from threat information of common mobile devices and set up an identification model of m... 详细信息
来源: 评论
Biological data processing based on bio-processor unit(BPU), a new concept for next generation computational biology
收藏 引用
Science China(Life Sciences) 2018年 第5期61卷 597-598页
作者: Di Liu Dongbo Bu Tieliu Shi Jianxiao Quan Depeng Wang Yongyong Shi Xiao-Chen Bo Wenbao Han Computational Virology Group Wuhan Institute of Virology Chinese Academy of Sciences Wuhan 430071 China Key Laboratory of InteUigent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Center for Bioinformatics and Computational Biology and the Institute of Biomedical Sciences School of Life Sciences East China Normal University Shanghai 200214 China State Key Laboratory of Mathematical Engineering and Advanced Computation Wuxi 214122 China Jiangsu Variable Supercomputer Tech Co Ltd. Wuxi 214125 China NextOmics Blosctences Wuhan 430074 China Bio-X Institutes Key Laboratory for the Genetics of Developmental and Neuropsychiatric Disorders (Ministry of Education) Shanghai Jiao Tong University Shanghai 200030 China Beijing Institute of Radiation Medicine Beifing 100850 China
The revolution of biotechnology has pushed forward life sciences into the Big Data ***,high-throughput bio-techniques have greatly accelerated the integration of biology,computing and informatics,and hence substantial... 详细信息
来源: 评论
A WeChat user geolocating algorithm based on the relation between reported and actual distance  1
收藏 引用
9th International Symposium on Cyberspace Safety and Security, CSS 2017
作者: Shi, Wenqi Luo, Xiangyang Zhao, Fan Peng, Ziru Gan, Yong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China
The accuracy of existing geolocation methods for WeChat users depends on the stable correspondence between reported distance and actual distance. In view of the difficulty to pinpoint users’ location in real-world du... 详细信息
来源: 评论