咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是981-990 订阅
排序:
A Data Assured Deletion Scheme in Cloud Storage
收藏 引用
China Communications 2014年 第4期11卷 98-110页
作者: LI Chaoling CHEN Yue ZHOU Yanzhou PLA Information Engineering University Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
In order to provide a practicable solution to data confidentiality in cloud storage service,a data assured deletion scheme,which achieves the fine grained access control,hopping and sniffing attacks resistance,data dy... 详细信息
来源: 评论
Research on General Permutation Encryption Module based on Chaos Theory
Research on General Permutation Encryption Module based on C...
收藏 引用
2014 5th International Conference on Information Technology for Manufacturing Systems(ITMS 2014)
作者: Wenjie Sun State Key Laboratory of Mathematical Engineering and Advanced Computing
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modern cryptology. For exam... 详细信息
来源: 评论
Register one-to-one mapping strategy in Dynamic Binary Translation
Register one-to-one mapping strategy in Dynamic Binary Trans...
收藏 引用
2014 International Conference on Network Security and Communication engineering(NSCE 2014)
作者: Y.N.Cui J.M.Pang Z.Shan F.Yue State Key Laboratory of Mathematical Engineering and Advanced Computing
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation ... 详细信息
来源: 评论
Research on General Permutation Encryption Module Based on Chaos Theory
收藏 引用
International Journal of Technology Management 2014年 第7期 58-61页
作者: Sun Wenjie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 102206
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp... 详细信息
来源: 评论
Cross-platform parallel programming in PARRAY: A case study
Cross-platform parallel programming in PARRAY: A case study
收藏 引用
11th IFIP WG 10.3 International Conference on Network and Parallel computing, NPC 2014
作者: Cui, Xiang Li, Xiaowen Chen, Yifeng HCST Key Lab. School of EECS Peking University Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Air Defense Forces Academy Zhengzhou China College of Computer and Information Engineering Henan University Kaifeng China
PARRAY (or Parallelizing ARRAYs) is an extension of C language that supports system-level succinct programming for heterogeneous parallel systems. Parray extends mainstream C programming with novel array types. This l... 详细信息
来源: 评论
Randomness expansion with a one-sided trusted device
收藏 引用
Physical Review A 2015年 第5期91卷 052308-052308页
作者: Hong Wang Kai Chen Ming Gao Zhi Ma Weilong Wang Chaobo Li Chuangui Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China Zhengzhou Information Science and Technology Institute Zhengzhou 450002 China National Laboratory for Physical Sciences at Microscale and Department of Modern Physics University of Science and Technology of China Hefei 230026 P.R. China CAS Excellence Innovation Center Synergetic Innovation Center of Quantum Information and Quantum Physics University of Science and Technology of China Hefei Anhui 230026 China
We study a semi-device-independent (SDI) randomness expansion protocol with a trusted source or detector. It is not difficult to characterize the source or the detector when their dimensions are limited in the SDI sce... 详细信息
来源: 评论
Static-Dynamic Control Flow Integrity
Static-Dynamic Control Flow Integrity
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Xiaolong Liu Qiang Wei Ziwei Ye State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
CCFIR (Compact Control Flow Integrity and Randomization) has low performance overhead as an exploit mitigation, but it is hard to mitigate exploits by hijacking virtual function pointer, which are emerging in recent y... 详细信息
来源: 评论
Detecting Information Leakage Based on Subtracting Matrix
Detecting Information Leakage Based on Subtracting Matrix
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Zongda Han Binglong Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper proposes an approach of detecting information leakage based on subtracting matrix to determine files when and where were leaked from file system. Due to the low efficiency of detecting leak operation and th... 详细信息
来源: 评论
Method of multi-feature fusion based on SVM and D-S evidence theory in Trojan detection
收藏 引用
Computer Modelling and New Technologies 2014年 第6期18卷 304-310页
作者: Liu, Shengli Gao, Xiang Xu, Pan Liu, Long State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
According to the low accuracy and low stability of the single feature-based method for Trojan detection, a multi-feature fusion method based on SVM and DS evidence theory is proposed. First, three types of flow featur... 详细信息
来源: 评论
Leveraging Markov chain and optimal mutation strategy for smart fuzzing
Leveraging Markov chain and optimal mutation strategy for sm...
收藏 引用
ICINS 2014 - 2014 International Conference on Information and Network Security
作者: Yongji Ouyang Zehui Wu Qing Mu Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzz testing is an important way of vulnerability discovery, however, the existing fuzzers based on symbolic execution and others have inherent shortcomings like needing more computing resource, in-depth analysis and ... 详细信息
来源: 评论