咨询与建议

限定检索结果

文献类型

  • 652 篇 会议
  • 303 篇 期刊文献

馆藏范围

  • 955 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 502 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 102 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 60 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 59 篇 控制科学与工程
    • 45 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 342 篇 理学
    • 170 篇 数学
    • 128 篇 物理学
    • 69 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 25 篇 化学
  • 148 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 malware
  • 17 篇 semantics
  • 17 篇 cryptography
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 927 篇 英文
  • 18 篇 中文
  • 10 篇 其他
检索条件"机构=State Key Laboratary of Mathematical Engineering and Advanced Computing"
955 条 记 录,以下是51-60 订阅
排序:
LOM: A Website Fingerprinting Defense Method based on Local Optimal Mutation  10
LOM: A Website Fingerprinting Defense Method based on Local ...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Wang, Jue Zhu, Yuefei Lin, Wei Li, Ding Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Website Fingerprinting (WF) is a traffic analysis attack. The potential local adversary can infer the user's web activity by extracting implicit pattern information from traffic traces. Leveraging the latest advan... 详细信息
来源: 评论
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Pi, Qiankun Lu, Jicang Sun, Yepeng Fan, Qinlong Zhou, Xukun Shang, Shouxin State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
UEFI Security Threats Introduced by S3 and Mitigation Measure  7
UEFI Security Threats Introduced by S3 and Mitigation Measur...
收藏 引用
7th International Conference on Signal and Image Processing, ICSIP 2022
作者: Jiao, Weihua Li, Qingbao Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
UEFI is widely used as the new generation BIOS, except for some new features, it also brings some security issues. The threat brought by S3 sleep jeopardizes the security of computer platforms seriously. An attacker c... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code  6
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
6th International Conference on Communications, Information System and Computer engineering, CISCE 2024
作者: Xiong, Zhe Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions  25th
Towards Efficient and Privacy-Preserving Anomaly Detection ...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Song, Yuhan Zhu, Yuefei Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm  4
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
4th International Conference on Consumer Electronics and Computer engineering, ICCECE 2024
作者: Lin, Jiang Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address... 详细信息
来源: 评论
Honeypot Detection Method Based on Anomalous Requests Response Differences  23
Honeypot Detection Method Based on Anomalous Requests Respon...
收藏 引用
6th International Conference on Electronics, Communications and Control engineering, ICECC 2023
作者: Chen, Xingyu Lu, Bin Sun, Rongbo Jiang, Mi State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University China Cyber Security College Information Engineering University China
Honeypot detection is a popular technology in the current cyber security, which can be used to check the disguise and protection level of deployed honeypots. To address the problem of low detection accuracy of existin... 详细信息
来源: 评论
Resolving Anonymous Nodes Based on "Watermelon Patterns" Towards Constructing Router-Level Topology in Mesh Network  29th
Resolving Anonymous Nodes Based on "Watermelon Patterns" Tow...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Li, Ruixiang Feng, Xinzhu Liu, Chong Yuan, Fuxiang Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China Sichuan University Chengdu China
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr... 详细信息
来源: 评论
An Opposition-Based Learning Adaptive Chaotic Particle Swarm Optimization Algorithm
收藏 引用
Journal of Bionic engineering 2024年 第6期21卷 3076-3097页
作者: Chongyang Jiao Kunjie Yu Qinglei Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China Henan Information Engineering School Zhengzhou Vocational College of Industrial SafetyZhengzhou450000China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou450001China School of Computer and Artificial Intelligence Zhengzhou UniversityZhengzhou450001China
To solve the shortcomings of Particle Swarm Optimization(PSO)algorithm,local optimization and slow convergence,an Opposition-based Learning Adaptive Chaotic PSO(LCPSO)algorithm was *** chaotic elite opposition-based l... 详细信息
来源: 评论
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论