咨询与建议

限定检索结果

文献类型

  • 652 篇 会议
  • 303 篇 期刊文献

馆藏范围

  • 955 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 502 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 102 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 60 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 59 篇 控制科学与工程
    • 45 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 342 篇 理学
    • 170 篇 数学
    • 128 篇 物理学
    • 69 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 25 篇 化学
  • 148 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 malware
  • 17 篇 semantics
  • 17 篇 cryptography
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 927 篇 英文
  • 18 篇 中文
  • 10 篇 其他
检索条件"机构=State Key Laboratary of Mathematical Engineering and Advanced Computing"
955 条 记 录,以下是81-90 订阅
排序:
Disentangling Ensemble Models on Adversarial Generalization in Image Classification  5
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
5th International Conference on Electronic engineering and Informatics, EEI 2023
作者: Li, Chenwei Pan, Mengyuan Yang, Bo Zhang, Hengwei Henan Key Laboratory of Information Security State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp... 详细信息
来源: 评论
Research on Web application injection vulnerabilities detection method based on pattern matching
Research on Web application injection vulnerabilities detect...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Ma, Qican Wu, Zehui Wang, Xinlei Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin... 详细信息
来源: 评论
Automated Quantum Volume Test  2
Automated Quantum Volume Test
收藏 引用
2022 2nd International Conference on Electronics, Circuits and Information engineering, ECIE 2022
作者: Liu, Xiaonan He, Ming Wang, Junchao Xie, Haoshan Zhao, Chenyan Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As a benchmark for the overall performance of quantum computers, quantum volume has the advantage of being able to reflect the depth of running quantum circuits. But, the quantum volume test code provided by IBM needs... 详细信息
来源: 评论
A Vulnerability Automation Exploitation Method Based on Symbolic Execution
A Vulnerability Automation Exploitation Method Based on Symb...
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information service room Unit 32738 China
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln... 详细信息
来源: 评论
A Survey of Automatic Exploitation of Binary Vulnerabilities
A Survey of Automatic Exploitation of Binary Vulnerabilities
收藏 引用
2023 International Conference on Computer Network Security and Software engineering, CNSSE 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini... 详细信息
来源: 评论
IoT Device Multi-Classification Using Traffic Behavior Analysis  3
IoT Device Multi-Classification Using Traffic Behavior Analy...
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Shi, Jiaqi Liu, Tieming Zhang, Yuanyuan Ren, Huajuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The management of Internet of Things (IoT) devices is becoming increasingly complex. One of the reasons is that IoT device manufacturers are different, and there are different degrees of heterogeneity in service, tech... 详细信息
来源: 评论
Meta Transductive Linear Probing for Few-Shot Node Classification
Meta Transductive Linear Probing for Few-Shot Node Classific...
收藏 引用
Pattern Recognition and Machine Learning (PRML), IEEE International Conference on
作者: Mingjing Lan Ningbo Huang Gang Zhou Yi Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Graph few-shot learning aims to predict well by training with very few labeled data. Meta learning has been the most popular solution for few-shot learning problem. However, transductive linear probing shows that fine... 详细信息
来源: 评论
Rotation Model Enhancement for Adversarial Attack
Rotation Model Enhancement for Adversarial Attack
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Li, Zheming Liu, Hao Yang, Bo Li, Chenwei Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur... 详细信息
来源: 评论
Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge computing Environments
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 93-104页
作者: Huanhuan Xu Jingya Zhou Wenqi Wei Baolei Cheng School of Computer Science and Technology Soochow UniversitySuzhou 215006China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China School of Computer Science Georgia Institute of TechnologyAtlantaGA 30332USA
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  6
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Li, Chenwei Li, Zheming Yang, Bo Zhang, Hengwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论