咨询与建议

限定检索结果

文献类型

  • 660 篇 会议
  • 303 篇 期刊文献

馆藏范围

  • 963 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 648 篇 工学
    • 499 篇 计算机科学与技术...
    • 394 篇 软件工程
    • 104 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 62 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 50 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 20 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 12 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 346 篇 理学
    • 173 篇 数学
    • 130 篇 物理学
    • 67 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 25 篇 化学
  • 147 篇 管理学
    • 89 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 27 篇 法学
    • 21 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 semantics
  • 18 篇 machine learning
  • 18 篇 malware
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 637 篇 state key labora...
  • 39 篇 state key labora...
  • 18 篇 information engi...
  • 17 篇 state key lab of...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 42 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 937 篇 英文
  • 18 篇 中文
  • 8 篇 其他
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi"
963 条 记 录,以下是41-50 订阅
排序:
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 84-95页
作者: Yupeng JIANG Qun-Xiong ZHENG Dongdai LIN State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
Let Z/(p;) be the integer residue ring modulo pewith p an odd prime and e 2. We consider the suniform property of compressing sequences derived from primitive sequences over Z/(p;). We give necessary and sufficien... 详细信息
来源: 评论
Improvement in Diversify Active Defense for Web Application by Using Language and Database Heterogeneity  11
Improvement in Diversify Active Defense for Web Application ...
收藏 引用
2017 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification(ASID)
作者: Weichao Li Zheng Zhang Liqun Wang State Key Laboratory of Mathematical Engineering and Advanced Computing
According to OWASP selected web application Top 10 vulnerabilities in 2013 and 2017,structured query language(SQL)injection is consistently ranked the 1 ***,the protection of SQL injection,which is one of the most pre... 详细信息
来源: 评论
Image Classification for Malware Detection using Extremely Randomized Trees  11
Image Classification for Malware Detection using Extremely R...
收藏 引用
2017 11th IEEE International Conference on Anti-counterfeiting,Security,and Identification(ASID)
作者: Xin Zhou Jianmin Pang Guanghui Liang State Key Laboratory of Mathematical Engineering and Advanced Computing
With the development of machine learning and computer vision, we combined the image classification and malware detection in this work. Based on the technology of image classification, we achieved the detection of malw... 详细信息
来源: 评论
Research and Implementation of Reconfigurable Architecture of DES and ZUC  2
Research and Implementation of Reconfigurable Architecture o...
收藏 引用
2017 IEEE 第2届先进信息技术,电子与自动化控制国际会议(IAEAC 2017)
作者: Yuhan Chen Xuehui Du Wei Xiao Haiyang Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing
Reconfigurable cipher chip has become a research hotspot because of its flexibility, security and good resource utilization. At present, research of reconfigurable cipher chip usually focuses on the s
来源: 评论
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 694-707页
作者: Wangxin FENG Xiangyang LUO Tengyao LI Chunfang YANG State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Cyberspace Situation Awareness of Henan Province
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of net... 详细信息
来源: 评论
A Note on Determine the Greatest Common Subfamily of Two NFSRs by Grbner Basis
收藏 引用
Journal of Systems Science & Complexity 2015年 第5期28卷 1231-1242页
作者: WANG Zhongxiao QI Wenfeng TIAN Tian Luoyang University of Foreign Language State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute
For nonlinear feedback shift registers(NFSRs), their greatest common subfamily may be not unique. Given two NFSRs, the authors only consider the case that their greatest common subfamily exists and is unique. If the g... 详细信息
来源: 评论
IP2vec:an IP node representation model for IP geolocation
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 189-204页
作者: Fan ZHANG Meijuan YIN Fenlin LIU Xiangyang LUO Shuodi ZU State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou 450001China
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation ... 详细信息
来源: 评论
Fair Efficiency Comparisons of Decoy-state Quantum key Distribution Protocols
收藏 引用
Chinese Journal of Electronics 2018年 第2期27卷 241-249页
作者: LI Hongxin GAO Ming YAN Xueping YAN Bao HAN Yu SHAN Ling MA Zhi Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing College of Animal Science and Technology Henan University of Science and Technology
Taking the schemes based on different formulas of secure key rate as examples, we give a fair comparison between typical protocols under Universal composable(UC) security frame. Through analyzing the relationship of s... 详细信息
来源: 评论
IP-geolocater:a more reliable IP geolocation algorithm based on router error training
收藏 引用
Frontiers of Computer Science 2022年 第1期16卷 101-111页
作者: Shuodi ZU Xiangyang LUO Fan ZHANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Zhengzhou Science and Technology Institute Zhengzhou450001China
Location based services(LBS)are widely utilized,and determining the location of users’IP is the foundation for *** by unstable delay and insufficient landmarks,the existing geolocation algorithms have problems such a... 详细信息
来源: 评论
A Formalization Research on Web Server and Scheduling Strategy for Heterogeneity
A Formalization Research on Web Server and Scheduling Strate...
收藏 引用
2016 IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference(IMCEC 2016)
作者: Bolin Ma Zheng Zhang Yongsheng Zhu State key Laboratory of Mathematical Engineering And Advanced Computing MEAC
Most web service systems are built in a static configuration web server or re dundant same web ***,traditional web service system make it easy for a cyber adversary to plan and launch *** improve the cyber security,mi... 详细信息
来源: 评论