咨询与建议

限定检索结果

文献类型

  • 663 篇 会议
  • 306 篇 期刊文献

馆藏范围

  • 969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 652 篇 工学
    • 503 篇 计算机科学与技术...
    • 396 篇 软件工程
    • 105 篇 信息与通信工程
    • 70 篇 网络空间安全
    • 64 篇 控制科学与工程
    • 61 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 48 篇 电气工程
    • 28 篇 机械工程
    • 24 篇 光学工程
    • 22 篇 化学工程与技术
    • 19 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 13 篇 核科学与技术
    • 13 篇 生物医学工程(可授...
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 建筑学
  • 345 篇 理学
    • 172 篇 数学
    • 131 篇 物理学
    • 67 篇 生物学
    • 50 篇 统计学(可授理学、...
    • 32 篇 系统科学
    • 25 篇 化学
  • 146 篇 管理学
    • 88 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 27 篇 法学
    • 22 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 10 篇 医学
  • 8 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 24 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 software
  • 19 篇 cryptography
  • 18 篇 semantics
  • 18 篇 machine learning
  • 18 篇 malware
  • 15 篇 training
  • 13 篇 network topology
  • 13 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 algorithm design...
  • 11 篇 gravitational wa...
  • 11 篇 data mining
  • 11 篇 heuristic algori...
  • 10 篇 conferences
  • 10 篇 computer archite...

机构

  • 640 篇 state key labora...
  • 39 篇 state key labora...
  • 18 篇 information engi...
  • 17 篇 state key lab of...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 49 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 16 篇 zheng zhang
  • 15 篇 j. c. bayley

语言

  • 930 篇 英文
  • 21 篇 其他
  • 18 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi"
969 条 记 录,以下是71-80 订阅
排序:
Analysis of security capability of MVX based on probabilistic attack and defense models  3
Analysis of security capability of MVX based on probabilisti...
收藏 引用
3rd International Conference on Computer Science and Communication Technology, ICCSCT 2022
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition... 详细信息
来源: 评论
A Bidirectional Data Packet Tampering Method for Linux System
A Bidirectional Data Packet Tampering Method for Linux Syste...
收藏 引用
2022 International Conference on Network Communication and Information Security, ICNCIS 2022
作者: Lv, Siou Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method... 详细信息
来源: 评论
Research on key Techniques for Reverse engineering of Deep Learning Models for x86 Executable Files  24
Research on Key Techniques for Reverse Engineering of Deep L...
收藏 引用
2024 7th International Conference on Computer Information Science and Artificial Intelligence, CISAI 2024
作者: Shi, Meng Lin, Wei Deng, Wenbo College of Cyberspace Security Information Engineering University Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Department of Cyberspace Security Henan Zhengzhou China
In recent years, with the continuous development of machine learning and deep learning, their related applications have gradually appeared in our field of vision, showing explosive growth. A deep learning compiler opt... 详细信息
来源: 评论
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论
An Opposition-Based Learning Adaptive Chaotic Particle Swarm Optimization Algorithm
收藏 引用
Journal of Bionic engineering 2024年 第6期21卷 3076-3097页
作者: Chongyang Jiao Kunjie Yu Qinglei Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China Henan Information Engineering School Zhengzhou Vocational College of Industrial SafetyZhengzhou450000China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou450001China School of Computer and Artificial Intelligence Zhengzhou UniversityZhengzhou450001China
To solve the shortcomings of Particle Swarm Optimization(PSO)algorithm,local optimization and slow convergence,an Opposition-based Learning Adaptive Chaotic PSO(LCPSO)algorithm was *** chaotic elite opposition-based l... 详细信息
来源: 评论
Disentangling Ensemble Models on Adversarial Generalization in Image Classification  5
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
5th International Conference on Electronic engineering and Informatics, EEI 2023
作者: Li, Chenwei Pan, Mengyuan Yang, Bo Zhang, Hengwei Henan Key Laboratory of Information Security State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp... 详细信息
来源: 评论
An Improved Authenticated key Agreement Protocol for IoT and Cloud Server  5th
An Improved Authenticated Key Agreement Protocol for IoT an...
收藏 引用
5th International Conference on Security and Privacy in New computing Environments, SPNCE 2022
作者: Ma, Yongliu Ma, Yuqian Cheng, Qingfeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou450001 China
The internet of things (IoT) is a complex network system with applications in all walks of life. However, there are various risks in the process of information transmission between IoT devices and servers. Recently, r... 详细信息
来源: 评论
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer  21
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer
收藏 引用
5th International Conference on Computer Science and Application engineering, CSAE 2021
作者: Yu, Yingchao Qin, Xiaojun Gan, Shuitao State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In this paper, we propose a target-oriented hybrid directed binary fuzzer (HDBFuzzer) to solve the vulnerability confirmation problem based on binary code similarity comparison. HDBFuzzer combines macro function level... 详细信息
来源: 评论
Color Image Steganalysis Algorithm Based on Quaternion Convolutional Neural Network  30th
Color Image Steganalysis Algorithm Based on Quaternion Convo...
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Xu, Meng Wang, Jinwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China Department of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
Most of the images on the Internet are color images, and steganalysis of color images is a very critical issue in the field of steganalysis. The current proposed color image steganalysis features mainly rely on manual... 详细信息
来源: 评论
Grover algorithm circuit optimization and noise analysis on integer factorization  7
Grover algorithm circuit optimization and noise analysis on ...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Song, Hui-Chao Liu, Xiao-Nan Jiang, Duo An, Jiale University of Information Engineering State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The classical computer is restricted by Moore's law and other factors into the development bottleneck, quantum computer by virtue of its natural acceleration advantage into the field of vision. Quantum computing c... 详细信息
来源: 评论