咨询与建议

限定检索结果

文献类型

  • 660 篇 会议
  • 300 篇 期刊文献

馆藏范围

  • 960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 644 篇 工学
    • 498 篇 计算机科学与技术...
    • 394 篇 软件工程
    • 103 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 61 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 47 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 344 篇 理学
    • 172 篇 数学
    • 130 篇 物理学
    • 67 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 25 篇 化学
  • 146 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 semantics
  • 18 篇 machine learning
  • 18 篇 malware
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 634 篇 state key labora...
  • 39 篇 state key labora...
  • 18 篇 information engi...
  • 17 篇 state key lab of...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 41 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 934 篇 英文
  • 18 篇 中文
  • 8 篇 其他
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi"
960 条 记 录,以下是41-50 订阅
排序:
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions  25th
Towards Efficient and Privacy-Preserving Anomaly Detection ...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Song, Yuhan Zhu, Yuefei Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha... 详细信息
来源: 评论
Resolving Anonymous Nodes Based on "Watermelon Patterns" Towards Constructing Router-Level Topology in Mesh Network  29th
Resolving Anonymous Nodes Based on "Watermelon Patterns" Tow...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Li, Ruixiang Feng, Xinzhu Liu, Chong Yuan, Fuxiang Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China Sichuan University Chengdu China
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr... 详细信息
来源: 评论
Packet Modification and Utilization Technology of SOHO Router  2
Packet Modification and Utilization Technology of SOHO Route...
收藏 引用
2nd International Conference on advanced Manufacturing Technology and Manufacturing Systems, ICAMTMS 2023
作者: Gai, Xianzhe Cai, Ruijie Jia, Fan Chen, Hongwei Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing 62 Science Ave. Zhengzhou450001 China
As a gateway to handle all intranet terminal traffic, SOHO router plays an important role in the network. In this paper, we introduced the security threats faced by SOHO routers, and on this basis, we propose a packet... 详细信息
来源: 评论
A review of auxiliary hardware architectures supporting dynamic taint analysis
A review of auxiliary hardware architectures supporting dyna...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Yang, Anfeng Guang, Yan Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running... 详细信息
来源: 评论
PFCA: An Intelligent Method of Multidimensional User Profile Construction and Application  7
PFCA: An Intelligent Method of Multidimensional User Profile...
收藏 引用
7th International Conference on Big Data Analytics, ICBDA 2022
作者: Xia, Yi Zhou, Gang Luo, Junyong Lan, Mingjing Chen, Xiaohui Wang, Shiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome... 详细信息
来源: 评论
A PV-DM-based feature fusion method for binary malware clustering  4
A PV-DM-based feature fusion method for binary malware clust...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Gui, Hairen Zhang, Chunyan Huang, Yizhao Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Utilizing NLP methods in malware classification or clustering applications is a hotspot in malware analysis. Binary malware embedding has become an important direction and basis for malware analysis. Existing binary m... 详细信息
来源: 评论
A Malware Classification Method based on Attentive Bidirectional Model  7
A Malware Classification Method based on Attentive Bidirecti...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Gui, Hairen Liu, Fudong Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie... 详细信息
来源: 评论
A Review of Few-Shot Network Traffic Classification Based on Deep Learning
A Review of Few-Shot Network Traffic Classification Based on...
收藏 引用
2023 International Conference on Mechatronics and Intelligent Control, ICMIC 2023
作者: Yang, Kai Wang, Ruo Nan Meng, Qi Meng, Long Qi, Zan Li, Xue Fei, Jin Long State Key Laboratory of Mathematical Engineering And Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
At present, deep learning has achieved excellent performance in the field of network traffic classification. However, deep learning relies on massive data-driven classification models. When the data set is small, it i... 详细信息
来源: 评论
A Tree-based Structure Mutation Method for Network Protocol Fuzzing  6
A Tree-based Structure Mutation Method for Network Protocol ...
收藏 引用
2021 6th International Conference on Information Science, Computer Technology and Transportation, ISCTT 2021
作者: Yang, Rui Jing, Jing Qi, Xuyan Zheng, Hongbing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
It is difficult to fuzz the protocol because the format of network protocol is complex and often involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off between the validity of protocol m... 详细信息
来源: 评论
Multi-protocol comprehensive topology probe technology under non-cooperative conditions
Multi-protocol comprehensive topology probe technology under...
收藏 引用
2022 International Symposium on Computer Applications and Information Systems, ISCAIS 2022
作者: Lu, Xuanting Yang, Qichao Liu, Shengli Yang, Pengfei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ... 详细信息
来源: 评论