咨询与建议

限定检索结果

文献类型

  • 652 篇 会议
  • 302 篇 期刊文献

馆藏范围

  • 954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 502 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 102 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 60 篇 生物工程
    • 59 篇 电子科学与技术(可...
    • 59 篇 控制科学与工程
    • 45 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 18 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 342 篇 理学
    • 170 篇 数学
    • 128 篇 物理学
    • 69 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 25 篇 化学
  • 148 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 malware
  • 17 篇 semantics
  • 17 篇 cryptography
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 633 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 926 篇 英文
  • 18 篇 中文
  • 10 篇 其他
检索条件"机构=State Key Laboratary of Mathematical Engineering and Advanced Computing"
954 条 记 录,以下是921-930 订阅
排序:
Results on constructions of rotation symmetric bent and semi-bent functions
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2014年 8865卷 21-33页
作者: Carlet, Claude Gao, Guangpu Liu, Wenfen University of Paris 8 and University of Paris 13 CNRS 2 Rue de la Liberté Saint-Denis Cedex93526 France State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
In this paper, we introduce a class of cubic rotation symmetric (RotS) functions and prove that it can yield bent and semi-bent functions. To the best of our knowledge, this is the second primary construction of an in... 详细信息
来源: 评论
DDoS defense mechanism analysis based on signaling game model
DDoS defense mechanism analysis based on signaling game mode...
收藏 引用
2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics, IHMSC 2013
作者: Gao, Xiang Zhu, Yue-Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou City China
DDoS attack and defense is regarded as a multistage signaling game with observable actions. Its extensive form is given out, and its perfect bayesian nash equilibrium is solved. The current problems encountered by DDo... 详细信息
来源: 评论
Design of TPM chip based on signal integrity analysis
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2014年 25卷 44-52页
作者: Li, Yan-Bing Ye, Jian Zhu, Zhen-Min PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
It is important for personalized social services to calculate the relationship strength between users in a social network. Meanwhile, the psychological studies has shown that the personality traits is one of the key f... 详细信息
来源: 评论
A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS
收藏 引用
Journal of Electronics(China) 2013年 第2期30卷 198-203页
作者: Jiao Luyao Li Yifa Qiao Shuaiting Department of Information Science Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme. Based on the original scheme, our ne... 详细信息
来源: 评论
Identification of global histogram equalization by modeling gray-level cumulative distribution
Identification of global histogram equalization by modeling ...
收藏 引用
2013 IEEE China Summit and International Conference on Signal and Information Processing, ChinaSIP 2013
作者: Yuan, Hai-Dong Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing China
Previous studies have shown how to 'fingerprint' certain image processing operation. In this paper, we model the gray-level cumulative distribution of histogram-equalized image as discrete identity function, w... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
Information Transfer Model of Virtual Machine Based on Storage Covert Channel
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第5期18卷 377-384页
作者: WANG Xiaorui WANG Qingxian GUO Yudong LU Jianping Fourth Department PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Department of Communication Command Chongqing Communication Institute
Aiming at the problem that virtual machine information cannot be extracted incompletely, we extend the typical information extraction model of virtual machine and propose a perception mechanism in virtualization syste... 详细信息
来源: 评论
Constructing Non-binary Asymmetric Quantum Codes via Graphs
收藏 引用
China Communications 2013年 第2期10卷 33-41页
作者: 马智 冷日光 魏正超 钟淑琴 State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ... 详细信息
来源: 评论
An out-of-the-box dynamic binary analysis tool for ARM-based linux
An out-of-the-box dynamic binary analysis tool for ARM-based...
收藏 引用
5th International Symposium on Cyberspace Safety and Security, CSS 2013
作者: Wang, Zhenyu Ye, Yanqiu Wang, Ruimin Zhengzhou Institute of Information Science and Technology Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic binary analysis has demonstrated its strength in solving a wide-spectrum of computer security problems. However, existing DBA tools don't support ARM-based OS. The latest version of Valgrind can support AR... 详细信息
来源: 评论
Research on aggregated multicast based on wide-sense circuit tree
收藏 引用
2013 3rd International Symposium on Chemical engineering and Material Properties, ISCEMP 2013
作者: Zhang, Xiao Bo Lan, Ju Long Chen, Yue Li, Chao Ling State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450000 China China National Digital Switching System Engineering and Technological Research Center Zhengzhou 450000 China
To achieve the scalability and Quality of Service (QoS) of multicast service, a Wide-Sense Circuit Tree (WSCT) based on Aggregated Multicast Tree is proposed. By aggregating multicast traffics of the same class, WSCT ... 详细信息
来源: 评论