咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 878 篇 会议
  • 3 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 691 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 174 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 核科学与技术
    • 34 篇 冶金工程
  • 1,003 篇 理学
    • 548 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 118 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 616 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 93 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 64 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 51 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是221-230 订阅
排序:
The attack surface shifting in the mimic defense system  4
The attack surface shifting in the mimic defense system
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Wang, Liqun Zhang, Zheng Li, Weichao Liu, Hao MEAC State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The notion of attack surface shifting is introduced to describe the situation of shifting the attack surface in the moving target defense system. However, the situation of shifting the attack surface in the mimic defe... 详细信息
来源: 评论
Analysis of security capability of MVX based on probabilistic attack and defense models  3
Analysis of security capability of MVX based on probabilisti...
收藏 引用
3rd International Conference on Computer Science and Communication Technology, ICCSCT 2022
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition... 详细信息
来源: 评论
A compact construction for non-monotonic online/offline CP-ABE scheme  10th
A compact construction for non-monotonic online/offline CP-A...
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Zhang, Junqi Cheng, Qingfeng Wei, Fushan Zhang, Xinglong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Nowadays the mobile devices are becoming the necessities in our life, while they are generally resource-constrained, CP-ABE schemes designed for mobile devices should have the property of low computational complexity,... 详细信息
来源: 评论
keyword search over encrypted data in cloud computing from lattices in the standard model  2nd
Keyword search over encrypted data in cloud computing from l...
收藏 引用
2nd International Conference on Cloud computing and Big Data, CloudCom-Asia 2015
作者: Gu, Chunxiang Zheng, Yonghui Kang, Fei Xin, Dan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As cloud computing becomes popular, more and more sensitive information are being centralized into the cloud. Hence, we need some mechanism to support operations on encrypted data in many applications in cloud. Public... 详细信息
来源: 评论
Building smart classroom of combinatorial mathematics based on PBL teaching model  10
Building smart classroom of combinatorial mathematics based ...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Yang, Benchao Zeng, Guang Yu, Gang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
With the prevalence of artificial intelligence and the continuous development of information-based teaching, the emergence of smart classrooms has provided a new teaching environment for classroom teaching. As a new a... 详细信息
来源: 评论
Scalable QoS multicast provisioning in wide-sense circuit tree
Scalable QoS multicast provisioning in wide-sense circuit tr...
收藏 引用
International Conference on Control engineering and Information System, ICCEIS 2014
作者: Huang, K.X. Chen, Y. Li, C.L. Zhang, X.B. State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
It is still a hot topic that how to provide dynamic reconfigurable QoS multicast service in the network. The MPLS network combined with the DiffServ can provide end-to-end QoS guarantee for differentiated services, an... 详细信息
来源: 评论
A Bidirectional Data Packet Tampering Method for Linux System
A Bidirectional Data Packet Tampering Method for Linux Syste...
收藏 引用
2022 International Conference on Network Communication and Information Security, ICNCIS 2022
作者: Lv, Siou Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method... 详细信息
来源: 评论
A formal android permission model based on the B method  10th
A formal android permission model based on the B method
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Ren, Lu Chang, Rui Yin, Qing Man, Yujia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The rapid development of Android devices brings the increase of security requirements, especially for access control. Recently, many enhancements have been put forward towards the Android permission mechanism. However... 详细信息
来源: 评论
Measurement-Based Non-Stationary Markov Tapped Delay Line Channel Model for 5G-Railways
收藏 引用
IEEE Antennas and Wireless Propagation Letters 2025年
作者: Zhang, Xuejian He, Ruisi Yang, Mi Ding, Jianwen Chen, Ruifeng Gao, Shuaiqi Qi, Ziyi Zhang, Zhengyu Ai, Bo Zhong, Zhangdui Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation The School of Electronics and Information Engineering The Frontiers Science Center for Smart High-speed Railway System Beijing100044 China Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China Henan High Speed Railway Operation and Maintenance Engineering Research Center Zhengzhou451460 China China Academy of Railway Sciences Corporation Ltd. Institute of Computing Technology Beijing100081 China
5 G for Railways (5G-R) is globally recognized as a promising next-generation railway communication system designed to meet increasing demands. Channel modeling serves as foundation for communication system design, wi... 详细信息
来源: 评论
Continual Reinforcement Learning for Digital Twin Synchronization Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Tong, Haonan Chen, Mingzhe Zhao, Jun Hu, Ye Yang, Zhaohui Liu, Yuchen Yin, Changchuan The Beijing Key Laboratory of Network System Architecture and Convergence The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing China Singapore The Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States The Department of Industrial and Systems Engineering University of Miami Coral GablesFL33146 United States The College of Information Science and Electronic Engineering Zhejiang University Zhejiang Hangzhou310027 China The Department of Computer Science North Carolina State University RaleighNC27695 United States The Beijing Key Laboratory of Network System Architecture and Convergence China The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing100876 China
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously collects f... 详细信息
来源: 评论