咨询与建议

限定检索结果

文献类型

  • 663 篇 会议
  • 306 篇 期刊文献

馆藏范围

  • 969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 652 篇 工学
    • 503 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 105 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 64 篇 控制科学与工程
    • 61 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 48 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 345 篇 理学
    • 172 篇 数学
    • 131 篇 物理学
    • 67 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 25 篇 化学
  • 146 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 27 篇 法学
    • 22 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 semantics
  • 18 篇 machine learning
  • 18 篇 malware
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 640 篇 state key labora...
  • 39 篇 state key labora...
  • 18 篇 information engi...
  • 17 篇 state key lab of...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 49 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 930 篇 英文
  • 21 篇 其他
  • 18 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi"
969 条 记 录,以下是61-70 订阅
排序:
UEFI Security Threats Introduced by S3 and Mitigation Measure  7
UEFI Security Threats Introduced by S3 and Mitigation Measur...
收藏 引用
7th International Conference on Signal and Image Processing, ICSIP 2022
作者: Jiao, Weihua Li, Qingbao Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
UEFI is widely used as the new generation BIOS, except for some new features, it also brings some security issues. The threat brought by S3 sleep jeopardizes the security of computer platforms seriously. An attacker c... 详细信息
来源: 评论
Research on Fuzzing Technology for JavaScript Engines  21
Research on Fuzzing Technology for JavaScript Engines
收藏 引用
5th International Conference on Computer Science and Application engineering, CSAE 2021
作者: Tian, Ye Qin, Xiaojun Gan, Shuitao State Key Laboratory of Mathematical Engineering and Advanced Computing Zheng zhou Wuxi China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
JavaScript engine is the core component of web browsers, whose security issues are one of the critical aspects of the overall Web Eco-Security. Fuzzing technology, as an efficient software testing approach, has been w... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code  6
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
6th International Conference on Communications, Information System and Computer engineering, CISCE 2024
作者: Xiong, Zhe Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm  4
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
4th International Conference on Consumer Electronics and Computer engineering, ICCECE 2024
作者: Lin, Jiang Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address... 详细信息
来源: 评论
HM-QCNN: Hybrid Multi-branches Quantum-Classical Neural Network for Image Classification  9th
HM-QCNN: Hybrid Multi-branches Quantum-Classical Neural Netw...
收藏 引用
19th International Conference on advanced Data Mining and Applications, ADMA 2023
作者: Liu, Haowen Gao, Yufei Shi, Lei Wei, Lin Shan, Zheng Zhao, Bo School of Cyber Science and Engineering Songshan Laboratory Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Quantum machine learning has been developing in recent years, demonstrating great potential in various research domains and promising applications for pattern recognition. However, due to the constraints of quantum ha... 详细信息
来源: 评论
Honeypot Detection Method Based on Anomalous Requests Response Differences  23
Honeypot Detection Method Based on Anomalous Requests Respon...
收藏 引用
6th International Conference on Electronics, Communications and Control engineering, ICECC 2023
作者: Chen, Xingyu Lu, Bin Sun, Rongbo Jiang, Mi State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University China Cyber Security College Information Engineering University China
Honeypot detection is a popular technology in the current cyber security, which can be used to check the disguise and protection level of deployed honeypots. To address the problem of low detection accuracy of existin... 详细信息
来源: 评论
Research on Cascading Failures of Power Grid
Research on Cascading Failures of Power Grid
收藏 引用
2021 International Conference on Applied Mathematics, Modeling and Computer Simulation, AMMCS 2021
作者: Wang, Hongmin Wei, Qiang Xie, Yaobin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole country. Blackouts are almost always caused by cascading failures. This paper first analyzes th... 详细信息
来源: 评论
A survey of proactive defense in industrial control system
A survey of proactive defense in industrial control system
收藏 引用
2022 International Conference on Electronic Information Technology, EIT 2022
作者: Liu, Ke Wu, Qianqiong Geng, Yangyang Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de... 详细信息
来源: 评论
Recommender system based on adaptive threshold filtering GCN
Recommender system based on adaptive threshold filtering GCN
收藏 引用
2022 International Conference on Neural Networks, Information, and Communication engineering, NNICE 2022
作者: Qiao, Meng Gui, Hairen Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio... 详细信息
来源: 评论
Binary vulnerability mining technology based on neural network feature fusion  5
Binary vulnerability mining technology based on neural netwo...
收藏 引用
5th International Conference on advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Han, Wenjie Pang, Jianmin Zhou, Xin Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien... 详细信息
来源: 评论