咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是821-830 订阅
排序:
A framework for test data generation of object-oriented programs based on complete testing chain
A framework for test data generation of object-oriented prog...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Gang Li Lei Yu Huihui Sun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Test data generation is always a hot topic in software testing since efficient test data generation method can significantly increase the efficiency of software testing and decrease the cost. Method call relation and ... 详细信息
来源: 评论
A method of metamorphic relations constructing for object-oriented software testing
A method of metamorphic relations constructing for object-or...
收藏 引用
ACIS International Conference on Software engineering, Artificial Intelligence, Networking, and Parallel/Distributed computing (SNPD)
作者: Xinglong Zhang Lei Yu Xuemei Hou State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To solve the Oracle problem of methods sequence in object-oriented software testing, a method of metamorphic relations constructing for object-oriented software testing based on algebraic specification was proposed. F... 详细信息
来源: 评论
Secure and efficient smart card based remote user password authentication scheme
收藏 引用
International Journal of Network Security 2016年 第4期18卷 782-792页
作者: Wei, Jianghong Liu, Wenfen Hu, Xuexian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Province450002 China
In distributed systems, the smart card based password authentication, as one of the most convenient and efficienttwo-factor authentication mechanisms, is widely used toensure that the protected services are not availa... 详细信息
来源: 评论
A hidden service model based on HS-HS anonymous network
收藏 引用
AIP Conference Proceedings 2017年 第1期1890卷
作者: Yitong Meng Xing Zhao Jinlong Fei Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
The Hidden Service provided by Tor anonymous network can effectively protect the anonymity and security of the Hidden server, this article through the analysis of the data packet structure of Tor, three jump transmiss...
来源: 评论
Rapid Detection of Stego Images Based on Identifiable Features
Rapid Detection of Stego Images Based on Identifiable Featur...
收藏 引用
International Conference on advanced Communication Technology
作者: Weiwei Pang Xiangyang Luo Jie Ren Chunfang Yang Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on iden... 详细信息
来源: 评论
Corrigendum to “Research on a New Signature Scheme on Blockchain”
收藏 引用
Security and Communication Networks 2017年 第1期2017卷
作者: Chao Yuan Mi-xue Xu Xue-ming Si State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou 450001 China
来源: 评论
Rapid detection of stego images based on identifiable features  18
Rapid detection of stego images based on identifiable featur...
收藏 引用
18th International Conference on advanced Communications Technology, ICACT 2016
作者: Pang, Weiwei Luo, Xiangyang Ren, Jie Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Zhengzhou Science and Technology Institute Zhengzhou450001 China Science and Technology on Information Assurance Laboratory Beijing100072 China
An increasing number of images in the Internet brings forward a higher requirement on the speed of steganalysis. For the problem of real-time detection of stego images, a rapid images steganalysis method based on iden... 详细信息
来源: 评论
An advanced Automatic Construction Method of ROP
收藏 引用
Wuhan University Journal of Natural Sciences 2015年 第2期20卷 119-128页
作者: OUYANG Yongji WANG Qingxian PENG Jianshan ZENG Jie State Key Laboratory of Mathematical Engineering and Advanced Computing
Automatic return oriented programming (ROP) technology can effectively improve the efficiency of ROP constructed, but the existing research results still have some shortcomings including needing more address space, ... 详细信息
来源: 评论
Research on Timestamp-based Port Hopping in Software Defined Network
Research on Timestamp-based Port Hopping in Software Defined...
收藏 引用
2016 3rd International Conference on engineering Technology and Application(ICETA 2016)
作者: Ziyu Zhao Wei Huang Yuanbo Guo Wei Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Institute of Cryptography EngineeringInformation Engineering University
Port hopping is a typical technology in moving target defense which constantly changes communication port number to confuse potential attackers and protect target *** port hopping technology,time synchronization is th... 详细信息
来源: 评论
An energy-efficient bandwidth allocation method for single-chip heterogeneous processor  7
An energy-efficient bandwidth allocation method for single-c...
收藏 引用
7th International Green and Sustainable computing Conference, IGSC 2016
作者: Zhu, Yatao Zhang, Shuai Ye, Xiaochun Wang, Da Tan, Xu Fan, Dongrui Zhang, Zhimin Li, Hongliang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi Jiangsu China
In recent years, many studies on optimization of energy consumption have focused on heterogeneous processor architectures. Heterogeneous computing model composed of CPU and GPU has developed from co-processing between... 详细信息
来源: 评论