咨询与建议

限定检索结果

文献类型

  • 663 篇 会议
  • 309 篇 期刊文献

馆藏范围

  • 972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 649 篇 工学
    • 501 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 107 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 63 篇 控制科学与工程
    • 61 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 48 篇 电气工程
    • 27 篇 机械工程
    • 22 篇 化学工程与技术
    • 20 篇 光学工程
    • 19 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 346 篇 理学
    • 174 篇 数学
    • 131 篇 物理学
    • 67 篇 生物学
    • 52 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 25 篇 化学
  • 147 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 27 篇 法学
    • 22 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 semantics
  • 18 篇 machine learning
  • 18 篇 malware
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 643 篇 state key labora...
  • 39 篇 state key labora...
  • 18 篇 information engi...
  • 17 篇 state key lab of...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 49 篇 luo xiangyang
  • 31 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 917 篇 英文
  • 38 篇 其他
  • 18 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi"
972 条 记 录,以下是91-100 订阅
排序:
Social User Geolocation Method Based on POI Location Feature Enhancement in Context  1
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Liu, Yu Qiao, Yaqiong Liu, Yimin Du, Shaoyong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China School of Information Engineering North China University of Water Resources and Electric Power Zhengzhou China
The geolocation information in social media user generated text is one of the important bases for inferring users' location. The existing methods often rely on the mentioned Point of Interest (POI) and location In... 详细信息
来源: 评论
Path test data generation using adaptive simulated annealing particle swarm optimization
收藏 引用
Soft computing 2024年 第17-18期28卷 9587-9607页
作者: Jiao, Chongyang Zhou, Qinglei State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Henan Information Engineering School Zhengzhou Vocational College of Industrial Safety Zhengzhou450000 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi... 详细信息
来源: 评论
A Vulnerability Automation Exploitation Method Based on Symbolic Execution
A Vulnerability Automation Exploitation Method Based on Symb...
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information service room Unit 32738 China
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln... 详细信息
来源: 评论
A Survey of Automatic Exploitation of Binary Vulnerabilities
A Survey of Automatic Exploitation of Binary Vulnerabilities
收藏 引用
2023 International Conference on Computer Network Security and Software engineering, CNSSE 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini... 详细信息
来源: 评论
Automated Quantum Volume Test  2
Automated Quantum Volume Test
收藏 引用
2022 2nd International Conference on Electronics, Circuits and Information engineering, ECIE 2022
作者: Liu, Xiaonan He, Ming Wang, Junchao Xie, Haoshan Zhao, Chenyan Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As a benchmark for the overall performance of quantum computers, quantum volume has the advantage of being able to reflect the depth of running quantum circuits. But, the quantum volume test code provided by IBM needs... 详细信息
来源: 评论
Research on Web application injection vulnerabilities detection method based on pattern matching
Research on Web application injection vulnerabilities detect...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Ma, Qican Wu, Zehui Wang, Xinlei Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin... 详细信息
来源: 评论
IoT Device Multi-Classification Using Traffic Behavior Analysis  3
IoT Device Multi-Classification Using Traffic Behavior Analy...
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Shi, Jiaqi Liu, Tieming Zhang, Yuanyuan Ren, Huajuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The management of Internet of Things (IoT) devices is becoming increasingly complex. One of the reasons is that IoT device manufacturers are different, and there are different degrees of heterogeneity in service, tech... 详细信息
来源: 评论
Meta Transductive Linear Probing for Few-Shot Node Classification
Meta Transductive Linear Probing for Few-Shot Node Classific...
收藏 引用
Pattern Recognition and Machine Learning (PRML), IEEE International Conference on
作者: Mingjing Lan Ningbo Huang Gang Zhou Yi Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Graph few-shot learning aims to predict well by training with very few labeled data. Meta learning has been the most popular solution for few-shot learning problem. However, transductive linear probing shows that fine... 详细信息
来源: 评论
Dual-axial self-attention network for text classification
收藏 引用
Science China(Information Sciences) 2021年 第12期64卷 80-90页
作者: Xiaochuan ZHANG Xipeng QIU Jianmin PANG Fudong LIU Xingwei LI State Key Laboratory of Mathematical Engineering and Advanced Computing Shanghai Key Laboratory of Intelligent Information Processing Fudan University School of Computer Science Fudan University
Text classification is an important task in natural language processing and numerous studies aim to improve the accuracy and efficiency of text classification models. In this study, we propose an effective and efficie... 详细信息
来源: 评论
A GAN-based Method for Generating SQL Injection Attack Samples  10
A GAN-based Method for Generating SQL Injection Attack Sampl...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Lu, Dongzhe Fei, Jinlong Liu, Long Li, Zecun Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the simplicity of implementation and high threat level, SQL injection attacks are one of the oldest, most prevalent, and most destructive types of security attacks on Web-based information systems. With the con... 详细信息
来源: 评论