咨询与建议

限定检索结果

文献类型

  • 675 篇 会议
  • 397 篇 期刊文献

馆藏范围

  • 1,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 718 篇 工学
    • 525 篇 计算机科学与技术...
    • 416 篇 软件工程
    • 119 篇 信息与通信工程
    • 76 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 64 篇 电气工程
    • 63 篇 控制科学与工程
    • 62 篇 生物工程
    • 33 篇 机械工程
    • 32 篇 化学工程与技术
    • 29 篇 光学工程
    • 23 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 412 篇 理学
    • 200 篇 数学
    • 170 篇 物理学
    • 74 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 157 篇 管理学
    • 95 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 641 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 52 篇 luo xiangyang
  • 32 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 999 篇 英文
  • 53 篇 其他
  • 21 篇 中文
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1072 条 记 录,以下是901-910 订阅
Defense strategy selection based on signaling game  3
Defense strategy selection based on signaling game
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Zhang, Hengwei Wang, Jindong Yu, Dingkun Han, Jihong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
Nowadays, network security defense based on game theory mostly used complete information or static game model. In order to get closer to the actual network and defend actively, we proposed a network attack-defense gam... 详细信息
来源: 评论
Research on service trust evaluation approach under cloud computing environment  3
Research on service trust evaluation approach under cloud co...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Yu, Zhi-Yong Zhang, Heng-Wei Niu, Kan Wang, Jin-Dong Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
In cloud computing, the resources of service are widely distributed, complex and fickle. The trust relationship between service entities is hard to establish and maintain with high uncertainty. The characteristics of ... 详细信息
来源: 评论
Fuzzy subspace clustering algorithm based on modified firefly algorithm  3
Fuzzy subspace clustering algorithm based on modified firefl...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: He, Jia-Jing Zhang, Heng-Wei Wang, Na Niu, Kan Zhengzhou Institute of Information Science and Technology Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Aiming at the clustering problems in selected features and the shortcomings that fuzzy C- means clustering is sensitive to initial value and easy to fall into local optimum, a new fuzzy subspace clustering algorithm b... 详细信息
来源: 评论
Research for modeling network security based on attack-defense grapy of state reduction  3
Research for modeling network security based on attack-defen...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Li, Tao Zhang, Hengwei Wang, Jindong Wang, Na Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to assess network security threats better, we model the attacker's and defender's behavior based on attackdefense graph from the perspective of both attacker and defender, which lays the foundation of... 详细信息
来源: 评论
SGCAM-an comprehensive analysis method for information risk assessment index system  3
SGCAM-an comprehensive analysis method for information risk ...
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Chen, Yu Wang, Jin-Dong Wang, Kun Li, Tao Zhengzhou Institute of Information Science and Technology Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
The method based on index system is a typical quantitative method for information security risk assessment. But, because of the complexity of the safety-related factors, during the process ofbuilding its index system,... 详细信息
来源: 评论
Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
收藏 引用
Physical Review A 2015年 第5期91卷 052305-052305页
作者: Yangyang Fei Ming Gao Weilong Wang Chaobo Li Zhi Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m... 详细信息
来源: 评论
Perovskite Solar Cells: Unique Seamlessly Bonded CNT@Graphene Hybrid Nanostructure Introduced in an Interlayer for Efficient and Stable Perovskite Solar Cells (Adv. Funct. Mater. 32/2018)
收藏 引用
advanced Functional Materials 2018年 第32期28卷
作者: Xuanhua Li Tengteng Tong Qinjiang Wu Shaohui Guo Qiang Song Jian Han Zhixiang Huang State Key Laboratory of Solidification Processing Research and Development Institute of Northwestern Polytechnical University In Shenzhen Center for Nano Energy Materials School of Materials Science and Engineering Northwestern Polytechnical University and Shaanxi Joint Lab of Graphene (NPU) Xi'an 710072 China Northwestern Polytechnical University‐Queen Mary University of London (NPU‐QMUL) Joint Research Institute of Advanced Materials and Structures (JRI‐AMAS) Xi'an 710072 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University No. 3 Feixi Road Hefei Anhui Province 230039 P. R. China
来源: 评论
Business process mining based insider threat detection system
收藏 引用
Tongxin Xuebao/Journal on Communications 2016年 37卷 180-188页
作者: Zhu, Tai-Ming Guo, Yuan-Bo Ju, An-Kang Ma, Jun School of Cyberspace Security PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214000 China
Current intrusion detection systems are mostly for detecting external attacks, but sometimes the internal staff may bring greater harm to organizations in information security. Traditional insider threat detection met... 详细信息
来源: 评论
Search for Gravitational Waves Associated with Fast Radio Bursts Detected by CHIME/FRB during the LIGO-Virgo Observing Run O3a
收藏 引用
Astrophysical Journal 2023年 第2期955卷 155-155页
作者: Abbott, R. Abbott, T.D. Acernese, F. Ackley, K. Adams, C. Adhikari, N. Adhikari, R.X. Adya, V.B. Affeldt, C. Agarwal, D. Agathos, M. Agatsuma, K. Aggarwal, N. Aguiar, O.D. Aiello, L. Ain, A. Ajith, P. Akutsu, T. Albanesi, S. Allocca, A. Altin, P.A. Amato, A. Anand, C. Anand, S. Ananyeva, A. Anderson, S.B. Anderson, W.G. Ando, M. Andrade, T. Andres, N. Andrić, T. Angelova, S.V. Ansoldi, S. Antelis, J.M. Antier, S. Appert, S. Arai, Koya Arai, Y. Araki, S. Araya, A. Araya, M.C. Areeda, J.S. Arène, M. Aritomi, N. Arnaud, N. Aronson, S.M. Arun, K.G. Asada, H. Asali, Y. Ashton, G. Aso, Y. Assiduo, M. Aston, S.M. Astone, P. Aubin, F. Austin, C. Babak, S. Badaracco, F. Bader, M.K.M. Badger, C. Bae, S. Bae, Y. Baer, A.M. Bagnasco, S. Bai, Y. Baiotti, L. Baird, J. Bajpai, R. Ball, M. Ballardin, G. Ballmer, S.W. Balsamo, A. Baltus, G. Banagiri, S. Bankar, D. Barayoga, J.C. Barbieri, C. Barish, B.C. Barker, D. Barneo, P. Barone, F. Barr, B. Barsotti, L. Barsuglia, M. Barta, D. Bartlett, J. Barton, M.A. Bartos, I. Bassiri, R. Basti, A. Bawaj, M. Bayley, J.C. Baylor, A.C. Bazzan, M. Bécsy, B. Bedakihale, V.M. Bejger, M. Belahcene, I. Benedetto, V. Beniwal, D. Bennett, T.F. Bentley, J.D. BenYaala, M. Bergamin, F. Berger, B.K. Bernuzzi, S. Berry, C.P.L. Bersanetti, D. Bertolini, A. Betzwieser, J. Beveridge, D. Bhandare, R. Bhardwaj, U. Bhattacharjee, D. Bhaumik, S. Bilenko, I.A. Billingsley, G. Bini, S. Birney, R. Birnholtz, O. Biscans, S. Bischi, M. Biscoveanu, S. Bisht, A. Biswas, B. Bitossi, M. Bizouard, M.-A. Blackburn, J.K. Blair, C.D. Blair, D.G. Blair, R.M. Bobba, F. Bode, N. Boer, M. Bogaert, G. Boldrini, M. Bonavena, L.D. Bondu, F. Bonilla, E. Bonnand, R. Booker, P. Boom, B.A. Bork, R. Boschi, V. Bose, N. Bose, S. Bossilkov, V. Boudart, V. Bouffanais, Y. Boumerdassi, A. Bozzi, A. Bradaschia, C. Brady, P.R. Bramley, A. Branch, A. Branchesi, M. Brau, J.E. Breschi, M. Briant, T. Briggs, J.H. Brillet, A. Brinkmann, M. Brockill, P. Brooks, A.F. Brooks, J. Brown, D.D. Brunett, S. Bruno, G. Bruntz, R. Bryant, J. Buchanan, J. B LIGO Laboratory California Institute of Technology Pasadena 91125 CA United States Louisiana State University Baton Rouge 70803 LA United States Dipartimento di Farmacia Università di Salerno Fisciano Salerno I-84084 Italy INFN Sezione di Napoli Complesso Universitario di Monte S. Angelo Napoli I-80126 Italy OzGrav School of Physics & Astronomy Monash University Clayton 3800 VIC Australia LIGO Livingston Observatory Livingston 70754 LA United States University of Wisconsin-Milwaukee Milwaukee 53201 WI United States OzGrav Australian National University Canberra 0200 ACT Australia Max Planck Institute for Gravitational Physics (Albert Einstein Institute) Hannover D-30167 Germany Leibniz Universität Hannover Hannover D-30167 Germany Inter-University Centre for Astronomy and Astrophysics Pune 411007 India University of Cambridge Cambridge CB2 1TN United Kingdom Theoretisch-Physikalisches Institut Friedrich-Schiller-Universität Jena Jena D-07743 Germany University of Birmingham Birmingham B15 2TT United Kingdom Center for Interdisciplinary Exploration & Research in Astrophysics (CIERA) Northwestern University Evanston 60208 IL United States Instituto Nacional de Pesquisas Espaciais São Paulo São José dos Campos 12227-010 Brazil Gravity Exploration Institute Cardiff University Cardiff CF24 3AA United Kingdom INFN Sezione di Pisa Pisa I-56127 Italy International Centre for Theoretical Sciences Tata Institute of Fundamental Research Bengaluru 560089 India Gravitational Wave Science Project National Astronomical Observatory of Japan (NAOJ) Mitaka City Tokyo 181-8588 Japan Advanced Technology Center National Astronomical Observatory of Japan (NAOJ) Mitaka City Tokyo 181-8588 Japan INFN Sezione di Torino Torino I-10125 Italy Università di Napoli “Federico II Complesso Universitario di Monte S. Angelo Napoli I-80126 Italy Université de Lyon Université Claude Bernard Lyon 1 CNRS Institut Lumière Matière Villeurbanne F-69622
We search for gravitational-wave (GW) transients associated with fast radio bursts (FRBs) detected by the Canadian Hydrogen Intensity Mapping Experiment Fast Radio Burst Project, during the first part of the third obs... 详细信息
来源: 评论
Junk code elimination based on idle object set
Junk code elimination based on idle object set
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Wei Lin Jin-long Fei Rui-jie Cai State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f...
来源: 评论