咨询与建议

限定检索结果

文献类型

  • 652 篇 会议
  • 302 篇 期刊文献

馆藏范围

  • 954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 502 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 102 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 60 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 59 篇 控制科学与工程
    • 45 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 342 篇 理学
    • 170 篇 数学
    • 128 篇 物理学
    • 69 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 25 篇 化学
  • 148 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 malware
  • 17 篇 semantics
  • 17 篇 cryptography
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 926 篇 英文
  • 18 篇 中文
  • 10 篇 其他
检索条件"机构=State Key Laboratary of Mathematical Engineering and Advanced Computing"
954 条 记 录,以下是911-920 订阅
排序:
Cryptanalysis of an Implementation of TTM Cryptosystems Based on Q2k-module
Cryptanalysis of an Implementation of TTM Cryptosystems Base...
收藏 引用
2013 International Conference on advanced Computer Science and Electronics Information(ICACSEI 2013)
作者: Hongwei Tao State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouChina China National Digital Switching System Engineering and Technological Research Center
TTM cryptosystems proposed by *** are very fast due to the properties of tame automorphisms and small finite fields. The success of the first implementation of this system relies on the construction of Q 8 -module. Un... 详细信息
来源: 评论
Dynamic evolution of collective emotions in social networks: a case study of Sina weibo
收藏 引用
Science China(Information Sciences) 2013年 第7期56卷 150-167页
作者: XIONG XiaoBing ZHOU Gang HUANG YongZhong CHEN HaiYong XU Ke State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Software Development Environment Beihang University
Emotion is a fundamental object of human existence and determined by a complex set of factors. With the rapid development of online social networks (OSNs), more and more people would like to express their emotion in O... 详细信息
来源: 评论
Program Crash Analysis Based on Taint Analysis
Program Crash Analysis Based on Taint Analysis
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Zhang Puhan Wu Jianxiong Wang Xin Zehui Wu China Information Technology Security Evaluation Center Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception an... 详细信息
来源: 评论
Improving guide-based vulnerability detection with hybrid symbolic execution
Improving guide-based vulnerability detection with hybrid sy...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yongji Ouyang Shuai Zeng Chao Yang Qingxian Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Management and Control for Complex System Institute of Automation Chinese Academy of Sciences Beijing China
Symbolic Execution is a key and useful technology in current refinement software test, but there still exists some problems such as space explosion. In order to mitigate this problem and improve the ability for detect... 详细信息
来源: 评论
Chip waveforms attribute recognition model research and design
Chip waveforms attribute recognition model research and desi...
收藏 引用
2014 International Conference on Manufacturing Technology and Electronics Applications, ICMTEA 2014
作者: Xiao, Da Feng, Jing Zhu, Yue Fei Peng, Fei Lan, Jing Hong Computer network department ZhengZhou Information Science University ZhengZhouHeNan China State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhouHeNan China Urumqi General Hospital of PLA.Urumqi 7 Jianxue Street Xinjiang Uygur Zizhiqu Jinshui District ZhengZhouHeNan China
For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction sche... 详细信息
来源: 评论
Adaptability of BFS algorithm and multicore processor
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2014年 35卷 96-101页
作者: Ye, Nan Hao, Zi-Yu Zheng, Fang Xie, Xiang-Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214083 China
The typical features of graph algorithm represented by breadth-first search (BFS) were investigated, and a lightweight heuristic switch strategy was designed and implemented by automatically switching through two basi... 详细信息
来源: 评论
G Bytes Data Hiding Method Based on Cluster Chain Structure
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第5期18卷 443-448页
作者: NIU Xiaopeng LI Qingbao WANG Wei WANG Yulong State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University
Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To impro... 详细信息
来源: 评论
One wide-sense circuit tree per traffic class based inter-domain multicast
One wide-sense circuit tree per traffic class based inter-do...
收藏 引用
2013 IEEE 8th International Conference on Networking, Architecture and Storage, NAS 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas... 详细信息
来源: 评论
Carrying multicast traffic across domain by per-access-network based Wide-Sense Circuit Tree
Carrying multicast traffic across domain by per-access-netwo...
收藏 引用
2013 IEEE International Conference of IEEE Region 10, IEEE TENCON 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
IP multicast suffers from scalability and QoS provisioning problems when supporting large scale group communication cross domain. To solve the problems, we propose WSCT-PAN, a per-access-network based wide-sense circu... 详细信息
来源: 评论
Efficient client-to-client password authenticated key exchange based on RSA
Efficient client-to-client password authenticated key exchan...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Ma, Chuangui Wei, Fushan Gao, Fengxiu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The design of secure password authenticated key exchange (PAKE) protocols with RSA is a nontrivial hard work. Until now there have been only a few secure PAKE protocols based on RSA and most of them work in the two-pa... 详细信息
来源: 评论