咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是891-900 订阅
排序:
SGCAM-an comprehensive analysis method for information risk assessment index system  3
SGCAM-an comprehensive analysis method for information risk ...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Chen, Yu Wang, Jin-Dong Wang, Kun Li, Tao Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system,... 详细信息
来源: 评论
Research for modeling network security based on attack-defense grapy of state reduction  3
Research for modeling network security based on attack-defen...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Li, Tao Zhang, Hengwei Wang, Jindong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of... 详细信息
来源: 评论
Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
收藏 引用
Physical Review A 2015年 第5期91卷 052305-052305页
作者: Yangyang Fei Ming Gao Weilong Wang Chaobo Li Zhi Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m... 详细信息
来源: 评论
Perovskite Solar Cells: Unique Seamlessly Bonded CNT@Graphene Hybrid Nanostructure Introduced in an Interlayer for Efficient and Stable Perovskite Solar Cells (Adv. Funct. Mater. 32/2018)
收藏 引用
advanced Functional Materials 2018年 第32期28卷
作者: Xuanhua Li Tengteng Tong Qinjiang Wu Shaohui Guo Qiang Song Jian Han Zhixiang Huang State Key Laboratory of Solidification Processing Research and Development Institute of Northwestern Polytechnical University In Shenzhen Center for Nano Energy Materials School of Materials Science and Engineering Northwestern Polytechnical University and Shaanxi Joint Lab of Graphene (NPU) Xi'an 710072 China Northwestern Polytechnical University‐Queen Mary University of London (NPU‐QMUL) Joint Research Institute of Advanced Materials and Structures (JRI‐AMAS) Xi'an 710072 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University No. 3 Feixi Road Hefei Anhui Province 230039 P. R. China
来源: 评论
Business process mining based insider threat detection system
收藏 引用
Tongxin Xuebao/Journal on Communications 2016年 37卷 180-188页
作者: Zhu, Tai-Ming Guo, Yuan-Bo Ju, An-Kang Ma, Jun School of Cyberspace Security PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214000 China
Current intrusion detection systems are mostly for detecting external attacks, but sometimes the internal staff may bring greater harm to organizations in information security. Traditional insider threat detection met... 详细信息
来源: 评论
Search for Gravitational Waves Associated with Fast Radio Bursts Detected by CHIME/FRB during the LIGO-Virgo Observing Run O3a
收藏 引用
Astrophysical Journal 2023年 第2期955卷 155-155页
作者: Abbott, R. Abbott, T.D. Acernese, F. Ackley, K. Adams, C. Adhikari, N. Adhikari, R.X. Adya, V.B. Affeldt, C. Agarwal, D. Agathos, M. Agatsuma, K. Aggarwal, N. Aguiar, O.D. Aiello, L. Ain, A. Ajith, P. Akutsu, T. Albanesi, S. Allocca, A. Altin, P.A. Amato, A. Anand, C. Anand, S. Ananyeva, A. Anderson, S.B. Anderson, W.G. Ando, M. Andrade, T. Andres, N. Andrić, T. Angelova, S.V. Ansoldi, S. Antelis, J.M. Antier, S. Appert, S. Arai, Koya Arai, Y. Araki, S. Araya, A. Araya, M.C. Areeda, J.S. Arène, M. Aritomi, N. Arnaud, N. Aronson, S.M. Arun, K.G. Asada, H. Asali, Y. Ashton, G. Aso, Y. Assiduo, M. Aston, S.M. Astone, P. Aubin, F. Austin, C. Babak, S. Badaracco, F. Bader, M.K.M. Badger, C. Bae, S. Bae, Y. Baer, A.M. Bagnasco, S. Bai, Y. Baiotti, L. Baird, J. Bajpai, R. Ball, M. Ballardin, G. Ballmer, S.W. Balsamo, A. Baltus, G. Banagiri, S. Bankar, D. Barayoga, J.C. Barbieri, C. Barish, B.C. Barker, D. Barneo, P. Barone, F. Barr, B. Barsotti, L. Barsuglia, M. Barta, D. Bartlett, J. Barton, M.A. Bartos, I. Bassiri, R. Basti, A. Bawaj, M. Bayley, J.C. Baylor, A.C. Bazzan, M. Bécsy, B. Bedakihale, V.M. Bejger, M. Belahcene, I. Benedetto, V. Beniwal, D. Bennett, T.F. Bentley, J.D. BenYaala, M. Bergamin, F. Berger, B.K. Bernuzzi, S. Berry, C.P.L. Bersanetti, D. Bertolini, A. Betzwieser, J. Beveridge, D. Bhandare, R. Bhardwaj, U. Bhattacharjee, D. Bhaumik, S. Bilenko, I.A. Billingsley, G. Bini, S. Birney, R. Birnholtz, O. Biscans, S. Bischi, M. Biscoveanu, S. Bisht, A. Biswas, B. Bitossi, M. Bizouard, M.-A. Blackburn, J.K. Blair, C.D. Blair, D.G. Blair, R.M. Bobba, F. Bode, N. Boer, M. Bogaert, G. Boldrini, M. Bonavena, L.D. Bondu, F. Bonilla, E. Bonnand, R. Booker, P. Boom, B.A. Bork, R. Boschi, V. Bose, N. Bose, S. Bossilkov, V. Boudart, V. Bouffanais, Y. Boumerdassi, A. Bozzi, A. Bradaschia, C. Brady, P.R. Bramley, A. Branch, A. Branchesi, M. Brau, J.E. Breschi, M. Briant, T. Briggs, J.H. Brillet, A. Brinkmann, M. Brockill, P. Brooks, A.F. Brooks, J. Brown, D.D. Brunett, S. Bruno, G. Bruntz, R. Bryant, J. Buchanan, J. B LIGO Laboratory California Institute of Technology Pasadena 91125 CA United States Louisiana State University Baton Rouge 70803 LA United States Dipartimento di Farmacia Università di Salerno Fisciano Salerno I-84084 Italy INFN Sezione di Napoli Complesso Universitario di Monte S. Angelo Napoli I-80126 Italy OzGrav School of Physics & Astronomy Monash University Clayton 3800 VIC Australia LIGO Livingston Observatory Livingston 70754 LA United States University of Wisconsin-Milwaukee Milwaukee 53201 WI United States OzGrav Australian National University Canberra 0200 ACT Australia Max Planck Institute for Gravitational Physics (Albert Einstein Institute) Hannover D-30167 Germany Leibniz Universität Hannover Hannover D-30167 Germany Inter-University Centre for Astronomy and Astrophysics Pune 411007 India University of Cambridge Cambridge CB2 1TN United Kingdom Theoretisch-Physikalisches Institut Friedrich-Schiller-Universität Jena Jena D-07743 Germany University of Birmingham Birmingham B15 2TT United Kingdom Center for Interdisciplinary Exploration & Research in Astrophysics (CIERA) Northwestern University Evanston 60208 IL United States Instituto Nacional de Pesquisas Espaciais São Paulo São José dos Campos 12227-010 Brazil Gravity Exploration Institute Cardiff University Cardiff CF24 3AA United Kingdom INFN Sezione di Pisa Pisa I-56127 Italy International Centre for Theoretical Sciences Tata Institute of Fundamental Research Bengaluru 560089 India Gravitational Wave Science Project National Astronomical Observatory of Japan (NAOJ) Mitaka City Tokyo 181-8588 Japan Advanced Technology Center National Astronomical Observatory of Japan (NAOJ) Mitaka City Tokyo 181-8588 Japan INFN Sezione di Torino Torino I-10125 Italy Università di Napoli “Federico II Complesso Universitario di Monte S. Angelo Napoli I-80126 Italy Université de Lyon Université Claude Bernard Lyon 1 CNRS Institut Lumière Matière Villeurbanne F-69622
We search for gravitational-wave (GW) transients associated with fast radio bursts (FRBs) detected by the Canadian Hydrogen Intensity Mapping Experiment Fast Radio Burst Project, during the first part of the third obs... 详细信息
来源: 评论
Junk code elimination based on idle object set
Junk code elimination based on idle object set
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Wei Lin Jin-long Fei Rui-jie Cai State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f...
来源: 评论
Round-optimal password-based group key exchange protocols in the standard model  13th
Round-optimal password-based group key exchange protocols in...
收藏 引用
13th International Conference on Applied Cryptography and Network Security, ACNS 2015
作者: Xu, Jing Hu, Xue-Xian Zhang, Zhen-Feng Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450002 China
Password-based group key exchange protocols allow group users who share only a short, low entropy password to agree on a cryptographically strong session key. One fundamental complexity measure of such protocols is it... 详细信息
来源: 评论
FPGA-Based Parallel Implementation of SURF Algorithm
FPGA-Based Parallel Implementation of SURF Algorithm
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Wenjie Chen Shuaishuai Ding Zhilei Chai Daojing He Weihua Zhang Guanhua Zhang Qiwei Peng Wang Luo MoE Engineering Research Center for Software/Hardware Co-design Technology and Application East China Normal University Shanghai China School of loT Engineering Jiangnan University Wuxi China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Parallel Processing Institute Fudan University Shanghai China
SURF (Speeded up robust features) detection is used extensively in object detection, tracking and matching. However, due to its high complexity, it is usually a challenge to perform such detection in real time on a ge... 详细信息
来源: 评论
An SIMD Code Generation Technology for Indirect Array
An SIMD Code Generation Technology for Indirect Array
收藏 引用
2015 7th International Conference on Computer Research and Development (ICCRD 2015)
作者: Peng-yuan Li Rong-cai Zhao Qing-hua Zhang Lin Han State Key Laboratory of Mathematical Engineering and Advanced Computing
Due to disjoint memory references and non-aligned memory references, existing SIMD compilers can't vectorize loops containing indirect array utilizing SIMD(Single Instruction Multiple Data) instructions. However, ... 详细信息
来源: 评论