咨询与建议

限定检索结果

文献类型

  • 718 篇 会议
  • 380 篇 期刊文献

馆藏范围

  • 1,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 516 篇 计算机科学与技术...
    • 417 篇 软件工程
    • 108 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 70 篇 电子科学与技术(可...
    • 63 篇 控制科学与工程
    • 62 篇 生物工程
    • 54 篇 电气工程
    • 39 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 31 篇 机械工程
    • 29 篇 光学工程
    • 22 篇 航空宇航科学与技...
    • 19 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 核科学与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 材料科学与工程(可...
  • 452 篇 理学
    • 212 篇 物理学
    • 181 篇 数学
    • 72 篇 生物学
    • 69 篇 地球物理学
    • 56 篇 统计学(可授理学、...
    • 39 篇 化学
    • 31 篇 系统科学
  • 151 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 27 篇 法学
    • 20 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
  • 10 篇 医学
  • 7 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 31 篇 feature extracti...
  • 28 篇 network security
  • 26 篇 cosmic rays
  • 26 篇 security
  • 25 篇 semantics
  • 23 篇 deep learning
  • 21 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 machine learning
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 algorithm design...
  • 13 篇 optimization
  • 13 篇 data mining
  • 13 篇 data models
  • 12 篇 network topology
  • 12 篇 computational mo...
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 635 篇 state key labora...
  • 97 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 95 篇 yunnan observato...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 school of physic...
  • 93 篇 university of ch...
  • 90 篇 center for astro...
  • 89 篇 institute of fro...
  • 89 篇 college of physi...
  • 89 篇 school of physic...
  • 89 篇 moscow institute...
  • 89 篇 school of astron...
  • 88 篇 national space s...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 85 篇 department of ph...
  • 78 篇 department of en...
  • 75 篇 national astrono...

作者

  • 91 篇 danzengluobu
  • 90 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 liu d.
  • 76 篇 bastieri d.
  • 76 篇 jiang k.
  • 76 篇 kuleshov d.
  • 75 篇 liu s.m.
  • 75 篇 huang d.h.
  • 75 篇 dai h.l.
  • 74 篇 chen m.j.
  • 73 篇 liu b.
  • 72 篇 guo y.q.
  • 72 篇 bao y.w.
  • 72 篇 hu h.b.
  • 70 篇 li xin
  • 70 篇 chen y.
  • 69 篇 li cheng
  • 68 篇 min z.

语言

  • 1,057 篇 英文
  • 22 篇 中文
  • 19 篇 其他
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou"
1098 条 记 录,以下是91-100 订阅
排序:
Software library functions implementation of a customized High-Level Synthesis environment
Software library functions implementation of a customized Hi...
收藏 引用
2013 2nd International Conference on Frontiers of Energy and Environment engineering, ICFEEE 2013
作者: Dang, Lin-Yu Pang, Jian-Min Yu, Jin-Tao Yang, Jin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Compared with traditional Hardware Design Languages (HDL) programming, High-Level Synthesis (HLS) can reduce the design difficulty of reconfigurable system. Most HLS tools target for systems on programmable chips, and... 详细信息
来源: 评论
An Intrusion Detection Feature Selection Method Based on Improved Mutual Information  6
An Intrusion Detection Feature Selection Method Based on Imp...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Qi, Zan Fei, Jinlong Wang, Jue Li, Xue State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u... 详细信息
来源: 评论
Moving Target Defense Decision-Making Method: A Dynamic Markov Differential Game Model  7
Moving Target Defense Decision-Making Method: A Dynamic Mark...
收藏 引用
7th ACM Workshop on Moving Target Defense, MTD 2020
作者: Zhang, Hengwei Tan, Jinglei Liu, Xiaohu Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ... 详细信息
来源: 评论
Semantic Understanding of Source and Binary Code based on Natural Language Processing  4
Semantic Understanding of Source and Binary Code based on Na...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Zhang, Zhongtang Liu, Shengli Yang, Qichao Guo, Shichen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op... 详细信息
来源: 评论
Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier  2021
Inter-domain Link Inference with Confidence Using Naïve Bay...
收藏 引用
2021 13th International Conference on Machine Learning and computing, ICMLC 2021
作者: Zhao, Yi Liu, Yan Guo, XiaoYu Sui, ZhongHang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Inter-domain link inference is not only important for network security and fault diagnosis, but also helps to conduct research on inter-domain congestion detection and network resilience assessment. Current researches... 详细信息
来源: 评论
RSM-PA:Research on Route Selection Method of Inter-domain Routing System Based on Path Availability  23
RSM-PA:Research on Route Selection Method of Inter-domain Ro...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhu, Huihu Qiu, Han Zhu, Junhu Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The inter-domain routing system is the key infrastructure of the Internet. However, BGP does not consider the link state in the routing selection process. As a result, when the inter-domain routing system faces securi... 详细信息
来源: 评论
Memory Error Detection Based on Dynamic Binary Translation  20
Memory Error Detection Based on Dynamic Binary Translation
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Xu, Hang Ren, Wei Liu, Zimian Chen, Jiajun Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall... 详细信息
来源: 评论
Stability Analysis of a Rumor Propagation Model in Complex Networks with Holling II Type Functional Response  6
Stability Analysis of a Rumor Propagation Model in Complex N...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Yu, Ze Zhou, Gang Luo, Junyong Zhang, Mengli Huang, Ningbo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ... 详细信息
来源: 评论
ALEmu: A Framework for Application-layer Programs Emulation of Embedded Devices  4
ALEmu: A Framework for Application-layer Programs Emulation ...
收藏 引用
4th International Conference on Computer engineering and Application, ICCEA 2023
作者: He, Heng Xiong, Xiaobing Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ... 详细信息
来源: 评论
Vulnerability Model and Evaluation of the UEFI Platform Firmware Based on Improved Attack Graphs  9
Vulnerability Model and Evaluation of the UEFI Platform Firm...
收藏 引用
9th IEEE International Conference on Software engineering and Service Science, ICSESS 2018
作者: Cao, Fei Li, Qingbao Chen, Zhifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of... 详细信息
来源: 评论