咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 878 篇 会议
  • 3 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 691 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 174 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 核科学与技术
    • 34 篇 冶金工程
  • 1,003 篇 理学
    • 548 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 118 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 616 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 93 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 64 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 51 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是261-270 订阅
排序:
Code Level Context Sensitivity Exploration Algorithm
Code Level Context Sensitivity Exploration Algorithm
收藏 引用
2015 4th International Conference on Computer, Mechatronics, Control and Electronic engineering (ICCMCEE 2015)
作者: Yan Lijing Shan Zheng Xu Xiaoyan Xue Fei The State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University
The context sensitivity is an important property in program analysis which can improve the analysis accuracy of the function call context of the source codes and helps to improve the abilities of the compiler optimiza... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
Analysis of cryptosystem recognition scheme based on Euclidean distance feature extraction in three machine learning classifiers  3
Analysis of cryptosystem recognition scheme based on Euclide...
收藏 引用
2019 3rd International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2019
作者: Zhao, Yaqun Fan, Sijie State Key Laboratory of Mathematical Engineering and Advanced Computing 450001 China State Key Laboratory of Cryptography and Science 450001 China
In reality, many cryptographic analysis techniques are based on a specific cryptographic system or a large number of encrypted ciphertext. The identification and detection of cryptographic system is of great significa... 详细信息
来源: 评论
Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 273-295页
作者: Yan Liu Wenyuan Fang Qiang Wei Yuan Zhao Liang Wang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China The School of Computing Newcastle UniversityNewcastle upon TyneNE45TGUK
Code defects can lead to software vulnerability and even produce vulnerability *** research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to som... 详细信息
来源: 评论
Adaptive Wavelet Filters as Practical Texture Feature Amplifiers for Parkinson’s Disease Screening in OCT
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Xiaoqing Shi, Hanfeng Li, Xiangyu Ye, Haili Xu, Tao Li, Na Hu, Yan Lv, Fan Chen, Jiangfan Liu, Jiang Center for High Performance Computing and Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Research Institute of Trustworthy Autonomous Systems Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China State Key Laboratory of Ophthalmology Optometry and Vision Science Wenzhou Medical University Wenzhou China Centre for Computational Science and Mathematical Modelling Coventry University Coventry United Kingdom School of Computer Science University of Nottingham Ningbo China Ningbo315100 China School of Ophthalmology and Optometry Wenzhou Medical University Wenzhou325035 China Department of Electronic and Information Engineering Changchun University Changchun130022 China
Parkinson’s disease (PD) is a prevalent neurodegenerative disorder globally. The eye’s retina is an extension of the brain and has great potential in PD screening. Recent studies have suggested that texture features... 详细信息
来源: 评论
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning  16th
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Lear...
收藏 引用
16th International Conference on Information Security and Cryptology, Inscrypt 2020
作者: Su, Heng-Chuan Zhu, Xuan-Yong Ming, Duan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
In CRYPTO 2019, Gohr uses the residual network technology of artificial intelligence to build a differential distinguisher, and attacks the reduced-round Speck32/64. We tried this method to recover the keys for ten-ro... 详细信息
来源: 评论
Network traffic classification based on multi-head attention and deep metric learning  8
Network traffic classification based on multi-head attention...
收藏 引用
8th International Conference on Electronic Technology and Information Science, ICETIS 2023
作者: Lv, Zhuo Lu, Bin Li, Xue Qi, Zan State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China
Network traffic classification plays an important role in network resource management and security. The application of encryption techniques and the rapid increase in the size of network traffic have placed higher dem... 详细信息
来源: 评论
Automated Quantum Volume Test  2
Automated Quantum Volume Test
收藏 引用
2022 2nd International Conference on Electronics, Circuits and Information engineering, ECIE 2022
作者: Liu, Xiaonan He, Ming Wang, Junchao Xie, Haoshan Zhao, Chenyan Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As a benchmark for the overall performance of quantum computers, quantum volume has the advantage of being able to reflect the depth of running quantum circuits. But, the quantum volume test code provided by IBM needs... 详细信息
来源: 评论
Research on Web application injection vulnerabilities detection method based on pattern matching
Research on Web application injection vulnerabilities detect...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Ma, Qican Wu, Zehui Wang, Xinlei Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin... 详细信息
来源: 评论
Reducing DRAM refreshing in an error correction manner
收藏 引用
Science China Chemistry 2015年 第12期58卷 186-199页
作者: ZHU DanFeng WANG Rui WEI YanJiang QIAN DePei School of Computer Science and Engineering Beihang University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dynamic random access memory(DRAM) is facing the challenge of technology scaling. The decreasing feature size makes it harder to make DRAM cells which can keep the current data-holding time. When DRAM cells cannot hol... 详细信息
来源: 评论