咨询与建议

限定检索结果

文献类型

  • 1,084 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,254 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 169 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 552 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1966 条 记 录,以下是1891-1900 订阅
排序:
Steganalysis of F5-like steganography based on selection of joint distribution features  13
Steganalysis of F5-like steganography based on selection of ...
收藏 引用
5th International Conference on Internet Multimedia computing and Service, ICIMCS 2013
作者: Liu, Yuan Luo, Xiangyang Lu, Jicang Gong, Daofu Zhengzhou Information Science and Technology Institute Zhengzhou 450001 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Zhengzhou Information Science and Technology Institute State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
For steganalysis of F5-like steganography with two types of widely used joint distribution statistical features: co-occurrence matrix and Markov transition probability matrix, a feature selection and fusion method bas... 详细信息
来源: 评论
Steganographic codes by applying syndrome-trellis codes to dynamic distortion model in pixel chain
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2014年 第8期51卷 1739-1747页
作者: Bao, Zhenkun Zhang, Weiming Cheng, Sen Zhao, Xianfeng The Fourth Institute Information Engineering University Zhengzhou450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450002 China School of Information Science and Technology University of Science and Technology of China Hefei230026 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Information Security Instituteof Information Engineering Chinese Academy of Sciences Beijing100093 China
Double-layered STC (syndrome trellis code) is the most popular method for minimizing the distortion of ± 1 steganography. However, it is a probabilistic algorithm which may fail in the embedding process on some g... 详细信息
来源: 评论
The process analysis of encryption and decryption based on process dependency graphs
The process analysis of encryption and decryption based on p...
收藏 引用
2013 International Conference on Sport Science and Computer Science (CCCS 2013)
作者: Rui Chang Liehui Jiang Hongqi He Yun Zeng State Key Laboratory of Mathematic Engineering and Advanced Computing
At present,the research on reverse analysis of encrypting and decrypting process pays more attention to cryptographic algorithms *** is no mature theory or tools for the entire process analysis of encryption and *** o... 详细信息
来源: 评论
Design of a high-performance full-system instrumentation
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2014年 35卷 129-134页
作者: Min, Qing-Hao Zhang, Zheng Wang, Hao-Jun Zhang, Wei-Hua Software School Fudan University Shanghai201203 China Shanghai Key Laboratory of Data Science Fudan University Shanghai201203 China Parallel Processing Institute Fudan University Shanghai201203 China State Key Laboratory of Mathematic Engineering and Advanced Computing PLA Information Engineering University Zhengzhou450001 China
Instrumentation is an important mechanism to collect run-time information of applications for further analysis like bottleneck analysis, hotspot analysis and even bug detection and revision. Currently there are lots o... 详细信息
来源: 评论
Research of function disable energy-saving hardware trojan detection technology
收藏 引用
Energy Education Science and Technology Part A: Energy Science and Research 2013年 第2期31卷 1035-1040页
作者: Xiao, Da Zhu, Yuefei Liu, Shengli Li, Qinbao National Digital Switching System Engineering and Technological Research Center Zhengzhou 450002 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
Aiming at the function disable Energy-saving hardware Trojan detection application requirements, has resarech the Energy-saving hardware Trojan generation principle and the trigger mechanism deeply, gives the function... 详细信息
来源: 评论
Fixing the sender-equivocable encryption scheme in eurocrypt 2010
Fixing the sender-equivocable encryption scheme in eurocrypt...
收藏 引用
5th IEEE International Conference on Intelligent Networking and Collaborative Systems, INCoS 2013
作者: Huang, Zhengan Liu, Shengli Qin, Baodong Chen, Kefei Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China College of Computer Science and Technology Southwest University of Science and Technology Mianyang China School of Science Hangzhou Normal University Hangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The secon... 详细信息
来源: 评论
Data recovery of user-defined procedures in binary translation
Data recovery of user-defined procedures in binary translati...
收藏 引用
International Conference on BioMedical engineering and Informatics (BMEI)
作者: Xiaonan Liu Rongcai Zhao Jianmin Pang Meijuan Yin Zhenfang Wei State Key Laboratory or Mathematics Engineering and Advanced Computing Zhengzhou China
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on sh... 详细信息
来源: 评论
Operand stack dependence based Java static software birthmark
Operand stack dependence based Java static software birthmar...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Yong Wang Fenlin Liu Zheng Zhao Bin Lu Xin Xie Zhengzhou Institute of Information Science and Technology Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack d... 详细信息
来源: 评论
The Research on Cryptographic Algorithms Recognition Technology
The Research on Cryptographic Algorithms Recognition Technol...
收藏 引用
International Conference on Intelligent System Design and engineering Application (ISDEA)
作者: Rui Chang Liehui Jiang Hui Shu Yaobin Xie State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou Henan China
At present, the research on security of computer system and searching for malicious codes pays more attention to cryptographic algorithms recognition technology. However, the existing theories or tools in the field of... 详细信息
来源: 评论
A New Algorithm to Exploit Superword Level Parallelism
A New Algorithm to Exploit Superword Level Parallelism
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Peng Liu Rong-cai Zhao Wei Gao Shuai Wei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering & Technology Research Center Zhengzhou China
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some appli... 详细信息
来源: 评论