咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是201-210 订阅
排序:
Research on IoT malware based on the ATT&CK model  11
Research on IoT malware based on the ATT&CK model
收藏 引用
2021 11th International Workshop on Computer Science and engineering, WCSE 2021
作者: Hao, Bo Kang, Fei Yang, Ju Xiong, Xiaobing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
The security of the IoT has become a hot research area in cyberspace security, among which the malware is a major threat. Based on the ATT&CK model, this paper studies the composition and behavior of IoT malware, ... 详细信息
来源: 评论
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware
Fw-fuzz: A code coverage-guided fuzzing framework for networ...
收藏 引用
作者: Gao, Zicong Dong, Weiyu Chang, Rui Wang, Yisen Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Fuzzing is an effective approach to detect software vulnerabilities utilizing changeable generated inputs. However, fuzzing the network protocol on the firmware of IoT devices is limited by inefficiency of test case g... 详细信息
来源: 评论
FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images
收藏 引用
Journal on Internet of Things 2022年 第1期4卷 1-20页
作者: Yingchao Yu Shuitao Gan Xiaojun Qin State Key Laboratory of Mathematical Engineering and Advanced Computing WuxiJiangsu214083China
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine... 详细信息
来源: 评论
Survey on the Improvement and Application of HHL Algorithm
Survey on the Improvement and Application of HHL Algorithm
收藏 引用
2022 International Conference on Computer Modelling and Big Data Analytics, CMBDA 2022
作者: Liu, Xiaonan Xie, Haoshan Liu, Zhengyu Zhao, Chenyan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University ZhengZhou450000 China School of Computer and Artificial Intelligence ZhengZhou University ZhengZhou450000 China
Quantum computing is a new computing mode that follows the laws of quantum mechanics to control quantum information units for computation. In terms of computational efficiency, due to the existence of quantum mechanic... 详细信息
来源: 评论
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
收藏 引用
China Communications 2021年 第8期18卷 85-95页
作者: Bingzheng Li Zheng Zhang Xiaomei Wang Sheng Qu Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and... 详细信息
来源: 评论
Heterostructured Mn_(3)O_(4)-MnS Multi-Shelled Hollow Spheres for Enhanced Polysulfide Regulation in Lithium-Sulfur Batteries
收藏 引用
Energy & Environmental Materials 2023年 第6期6卷 436-444页
作者: Bin Qin Qun Wang Weiqi Yao Yifei Cai Yuhan Chen Pengcheng Wang Yongchun Zou Xiaohang Zheng Jian Cao Junlei Qi Wei Cai State Key Laboratory of Advanced Welding and Joining Harbin Institute of TechnologyHarbin 150001China College of Chemistry and Chemical Engineering Taiyuan University of TechnologyTaiyuan 030024China State Key Laboratory of Chemical Engineering East China University of Science and TechnologyShanghai 200237China Department of Mechanical Engineering City University of Hong KongHong KongChina Center of Analysis Measurement and Computing Harbin Institute of TechnologyHarbin 150001China School of Materials Science and Engineering Harbin Institute of Technology Harbin 150001China
Constructing heterojunctions and hollow multi-shelled structures can render materials with fascinating physicochemical properties,and have been regarded as two promising strategies to overcome the severe shuttling and... 详细信息
来源: 评论
One-step implementation of a nonadiabatic geometric fSim gate in superconducting circuits
收藏 引用
Physical Review A 2024年 第2期110卷 022608-022608页
作者: M.-R. Yun Zheng Shan L.-L. Sun L.-L. Yan Y. Jia Shi-Lei Su Gang Chen School of Physics and Laboratory of Zhongyuan Light Key Laboratory of Materials Physics of Ministry of Education State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 Henan China College of Physics Institute of Quantum Materials and Physics Key Laboratory for Special Functional Materials of Ministry of Education and School of Materials and Engineering
Due to their significant application in reducing algorithm depth, fSim gates have attracted a lot of attention. However, during the implementation of quantum gates, fluctuations in control parameters and decoherence c... 详细信息
来源: 评论
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Bo Zhang, Hengwei Wang, Jindong Yang, Yulong Lin, Chenhao Shen, Chao Zhao, Zhengyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China
Transferable adversarial examples cause practical security risks since they can mislead a target model without knowing its internal knowledge. A conventional recipe for maximizing transferability is to keep only the o...
来源: 评论
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Shun-Hang Li Gang Zhou Zhi-Bo Li Ji-Cang Lu Ning-Bo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod...
来源: 评论
LENSER: A Channel state Information Based Indoor Localization Scheme for Malicious Devices
LENSER: A Channel State Information Based Indoor Localizatio...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Yongqiang Ma Xiangyang Luo Ruixiang Li Shaoyong Du Wenyan Liu Key Laboratory of Cyberspace Situation Awareness of Henan Province State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to e...
来源: 评论