咨询与建议

限定检索结果

文献类型

  • 718 篇 会议
  • 380 篇 期刊文献

馆藏范围

  • 1,098 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 708 篇 工学
    • 516 篇 计算机科学与技术...
    • 417 篇 软件工程
    • 108 篇 信息与通信工程
    • 71 篇 网络空间安全
    • 70 篇 电子科学与技术(可...
    • 63 篇 控制科学与工程
    • 62 篇 生物工程
    • 54 篇 电气工程
    • 39 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 31 篇 机械工程
    • 29 篇 光学工程
    • 22 篇 航空宇航科学与技...
    • 19 篇 安全科学与工程
    • 17 篇 动力工程及工程热...
    • 17 篇 核科学与技术
    • 16 篇 生物医学工程(可授...
    • 15 篇 材料科学与工程(可...
  • 452 篇 理学
    • 212 篇 物理学
    • 181 篇 数学
    • 72 篇 生物学
    • 69 篇 地球物理学
    • 56 篇 统计学(可授理学、...
    • 39 篇 化学
    • 31 篇 系统科学
  • 151 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 64 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 27 篇 法学
    • 20 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 10 篇 经济学
  • 10 篇 医学
  • 7 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 31 篇 feature extracti...
  • 28 篇 network security
  • 26 篇 cosmic rays
  • 26 篇 security
  • 25 篇 semantics
  • 23 篇 deep learning
  • 21 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 machine learning
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 algorithm design...
  • 13 篇 optimization
  • 13 篇 data mining
  • 13 篇 data models
  • 12 篇 network topology
  • 12 篇 computational mo...
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 635 篇 state key labora...
  • 97 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 95 篇 yunnan observato...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 school of physic...
  • 93 篇 university of ch...
  • 90 篇 center for astro...
  • 89 篇 institute of fro...
  • 89 篇 college of physi...
  • 89 篇 school of physic...
  • 89 篇 moscow institute...
  • 89 篇 school of astron...
  • 88 篇 national space s...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 85 篇 department of ph...
  • 78 篇 department of en...
  • 75 篇 national astrono...

作者

  • 91 篇 danzengluobu
  • 90 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 liu d.
  • 76 篇 bastieri d.
  • 76 篇 jiang k.
  • 76 篇 kuleshov d.
  • 75 篇 liu s.m.
  • 75 篇 huang d.h.
  • 75 篇 dai h.l.
  • 74 篇 chen m.j.
  • 73 篇 liu b.
  • 72 篇 guo y.q.
  • 72 篇 bao y.w.
  • 72 篇 hu h.b.
  • 70 篇 li xin
  • 70 篇 chen y.
  • 69 篇 li cheng
  • 68 篇 min z.

语言

  • 1,057 篇 英文
  • 22 篇 中文
  • 19 篇 其他
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou"
1098 条 记 录,以下是51-60 订阅
排序:
An Improved key Mismatch Attack on Kyber  7
An Improved Key Mismatch Attack on Kyber
收藏 引用
7th International Conference on Cryptography, Security and Privacy, CSP 2023
作者: Wang, Yaru Jiang, Haodong Ma, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem... 详细信息
来源: 评论
A Tree-based Structure Mutation Method for Network Protocol Fuzzing  6
A Tree-based Structure Mutation Method for Network Protocol ...
收藏 引用
2021 6th International Conference on Information Science, Computer Technology and Transportation, ISCTT 2021
作者: Yang, Rui Jing, Jing Qi, Xuyan Zheng, Hongbing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
It is difficult to fuzz the protocol because the format of network protocol is complex and often involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off between the validity of protocol m... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum  6
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Chang, Xiangyang Zhu, Junhu Zhao, Shibin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论
SoK: A Survey on Redundant Execution Technology
SoK: A Survey on Redundant Execution Technology
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe Ma, Bolin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the... 详细信息
来源: 评论
Embedding Attribute and Relation Information for Person Entity Alignment  6
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Wang, Can Liu, Xiaonan Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
A short text spectrum clustering method based on frequent itemsets  4
A short text spectrum clustering method based on frequent it...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Luo, Nan Zhang, Ping Li, Qingbao Chen, Zhifeng Feng, Peijun Xue, Tianxiao Engineering and Advanced Computing State Key Laboratory of Mathematical Zhengzhou China
Short text datum, which contains a lot of useful information, could be easily found on a wide variety of self-media platform and social communication tools. on It is significant to use datum mining technology to autom... 详细信息
来源: 评论
Steganalysis of Adaptive Steganography Under the Known Cover Image  1st
Steganalysis of Adaptive Steganography Under the Known Cover...
收藏 引用
1st International Conference on Security and Privacy in Digital Economy, SPDE 2020
作者: Li, Jialin Luo, Xiangyang Zhang, Yi Zhang, Pei Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. Steganalysis technology is the key technology to check the security of steganography, and the e... 详细信息
来源: 评论
PFCA: An Intelligent Method of Multidimensional User Profile Construction and Application  7
PFCA: An Intelligent Method of Multidimensional User Profile...
收藏 引用
7th International Conference on Big Data Analytics, ICBDA 2022
作者: Xia, Yi Zhou, Gang Luo, Junyong Lan, Mingjing Chen, Xiaohui Wang, Shiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome... 详细信息
来源: 评论
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of Embedded Devices  4
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of E...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Zheng, Yan Dong, Weiyu Cheng, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of embedded devices, security issues continue to occur. The existing automated security testing methods for embedded devices are mainly carried out from two aspects: the Web interface of the de... 详细信息
来源: 评论
A PV-DM-based feature fusion method for binary malware clustering  4
A PV-DM-based feature fusion method for binary malware clust...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Gui, Hairen Zhang, Chunyan Huang, Yizhao Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Utilizing NLP methods in malware classification or clustering applications is a hotspot in malware analysis. Binary malware embedding has become an important direction and basis for malware analysis. Existing binary m... 详细信息
来源: 评论