咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1989 条 记 录,以下是461-470 订阅
排序:
Timing Strategy for Active Detection of APT Attack Based on FlipIt Model and Q-learning Method
Timing Strategy for Active Detection of APT Attack Based on ...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Zhilin Liu Hengwei Zhang Pengyu Sun Yan Mi Xiaoning Zhang Jindong Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr... 详细信息
来源: 评论
A Robust Watermarking Scheme based on Delaunay Image Reconstruction Robust to Affine Transformation  6
A Robust Watermarking Scheme based on Delaunay Image Reconst...
收藏 引用
2021 6th International Symposium on Advances in Electrical, Electronics and Computer engineering, ISAEECE 2021
作者: Feng, Liu Gong, Daofu Wang, Wenbing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Science and Technology Institute Zhengzhou City Henan Province450000 China College of Software Engineering Zhengzhou University of Light Industry Zhengzhou City Henan Province450000 China
This paper proposes a sub-channel image reconstruction algorithm based on Delaunay triangle. First, according to the different sensitivity of the human eye to the three color channels, different channels are used to a... 详细信息
来源: 评论
Network Attack Intention Recognition Based on Signaling Game Model and Netlogo Simulation
Network Attack Intention Recognition Based on Signaling Game...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Xiaoning Zhang Hengwei Zhang Chenwei Li Pengyu Sun Zhilin Liu Jindong Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes... 详细信息
来源: 评论
Multi-objective Firefly Algorithm for Test Data Generation with Surrogate Model
Multi-objective Firefly Algorithm for Test Data Generation w...
收藏 引用
2021国际计算机前沿大会
作者: Wenning Zhang Qinglei Zhou Chongyang Jiao Ting Xu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhongyuan University of Technology Zhengzhou University
To solve the emerging complex optimization problems,multi objective optimization algorithms are *** introducing the surrogate model for approximate fitness calculation,the multi objective firefly algorithm with surrog...
来源: 评论
A Firmware Vulnerability Detection Method Based on Feature Filtering
A Firmware Vulnerability Detection Method Based on Feature F...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Bing Xia Chongjun Tang Wenbo Liu Shihao Chu Yu Dong dept Key Laboratory of Mathematical Engineering and Advanced Computing ZhongYuan University of Technology Zhengzhou China dept Henan Key Laboratory on Public Opinion Intelligent Analysis ZhongYuan University of Technology Zhengzhou China dept ZhongYuan University of Technology Zhengzhou China
Open source code reuse and code cross-platform deployment accelerate the spread of software vulnerabilities, and pose challenges for accurate detection of cross-platform vulnerabilities. The binary vulnerability simil...
来源: 评论
Performance Verification of Smith Predictor Control Using IMC Scheme via Chemical Reaction Networks and DNA Strand Displacement Reaction
Performance Verification of Smith Predictor Control Using IM...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Jingwang Yao Hui Lv Yijun Xiao Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang China
Biochemical process control is often achieved through feedback control strategies for theoretical analysis and optimization of biochemical reaction processes. Here, the design improves the robustness of the biochemica...
来源: 评论
Magnetoresistance Oscillations in Vertical Junctions of 2D Antiferromagnetic Semiconductor CrPS4
收藏 引用
Physical Review X 2024年 第4期14卷 041065-041065页
作者: Pengyuan Shi Xiaoyu Wang Lihao Zhang Wenqin Song Kunlin Yang Shuxi Wang Ruisheng Zhang Liangliang Zhang Takashi Taniguchi MOE Key Laboratory for Nonequilibrium Synthesis and Modulation of Condensed Matter Shaanxi Province Key Laboratory of Advanced Materials and Mesoscopic Physics School of Physics Xi’an Jiaotong University Xi’an 710049 China State Key Laboratory of Surface Physics and Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai 200433 China State Key Laboratory for Manufacturing Systems Engineering Xi’an Jiaotong University Xi’an 710049 China Research Center for Materials Nanoarchitectonics National Institute for Materials Science 1-1 Namiki Tsukuba 305-0044 Japan
Magnetoresistance (MR) oscillations serve as a hallmark of intrinsic quantum behavior, traditionally observed only in conducting systems. Here we report the discovery of MR oscillations in an insulating system, the ve... 详细信息
来源: 评论
PPIRB:Achieving an privacy-preserving image retrieval scheme Based on Blockchain  5
PPIRB:Achieving an privacy-preserving image retrieval scheme...
收藏 引用
5th International Conference on Data Science and Information Technology, DSIT 2022
作者: Yuan, Bo Peng, Jiahui Li, Chunpei Qiu, Wangjie School of Computer Science and Engineering State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Guangxi Key Lab of Multi-source Information Mining Security Guangxi Normal University GuiLin China State Key Laboratory of Software Development Environment Beihang University Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing100191 China
With the proliferation of cloud services, the work of large-scale image retrieval is carried out on remote cloud become a trend in order to get rid of the storage burden and computation. However, traditional retrieval... 详细信息
来源: 评论
Web Service Active Defense Mechanism Based on Automated Software Diversity
Web Service Active Defense Mechanism Based on Automated Soft...
收藏 引用
2020 International Conference on Computer engineering and Application, ICCEA 2020
作者: Liu, Zhenwu Zhang, Zheng Liu, Hao Ma, Bolin PLA Strategic Support Force Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Aiming at the problems of limited number and diversity in existing web server software, an active defense mechanism for web services based on automated software diversity is proposed, and the system framework and impl... 详细信息
来源: 评论
Bi-population Genetic Algorithm-Based Attack Path Discovery Research in Large-scale Networks
Bi-population Genetic Algorithm-Based Attack Path Discovery ...
收藏 引用
World Congress on computing and Communication Technologies (WCCCT)
作者: Hu Tairan Gao Wenlong Zhou Tianyang Zang Yichao National Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the growth of network scale, present researches on the attack path discovery often encounter the problem of search space explosion that results in fails. To tackle the problem of attack path discovery for large-s... 详细信息
来源: 评论