咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 168 篇 电气工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,007 篇 理学
    • 550 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 117 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,861 篇 英文
  • 59 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1962 条 记 录,以下是341-350 订阅
排序:
Recommendation of cyber attack method based on knowledge graph
Recommendation of cyber attack method based on knowledge gra...
收藏 引用
2020 International Conference on Computer engineering and Intelligent Control, ICCEIC 2020
作者: Ou, Yunjia Zhou, Tianyang Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ... 详细信息
来源: 评论
Research on Cascading Failures of Power Grid
Research on Cascading Failures of Power Grid
收藏 引用
作者: Hongmin WANG Qiang WEI Yaobin XIE State Key Laboratory of Mathematical Engineering and Advanced Computing
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole *** are almost always caused by cascading *** paper first analyzes the global blackouts in the ... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum  6
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Chang, Xiangyang Zhu, Junhu Zhao, Shibin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论
The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection  20
The Analysis of HTTPS Privacy Protection Based on Malicious ...
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Liu, Zeyan Pen, Jianshan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th... 详细信息
来源: 评论
Steganalysis of Adaptive Steganography Under the Known Cover Image  1st
Steganalysis of Adaptive Steganography Under the Known Cover...
收藏 引用
1st International Conference on Security and Privacy in Digital Economy, SPDE 2020
作者: Li, Jialin Luo, Xiangyang Zhang, Yi Zhang, Pei Yang, Chunfang Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Digital image steganography is one of the important ways to achieve covert communication to protect users’ data privacy. Steganalysis technology is the key technology to check the security of steganography, and the e... 详细信息
来源: 评论
UEFI Trusted computing Vulnerability Analysis Based on state Transition Graph  6
UEFI Trusted Computing Vulnerability Analysis Based on State...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Gu, Yanyang Zhang, Ping Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI.... 详细信息
来源: 评论
Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture  2
Research on Performance Optimization for Sparse Matrix-Vecto...
收藏 引用
2nd International Conference on Information Technology and Computer Application, ITCA 2020
作者: Wang, Qihan Li, Mingliang Pang, Jianming Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing zhengzhou China
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu... 详细信息
来源: 评论
Malware analysis platform based on software gene for cyberspace security practice teaching  2
Malware analysis platform based on software gene for cybersp...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Liu, Fudong Zhang, Ping Hou, Yifan Wang, Lixin Shan, Zheng Wang, Junchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r... 详细信息
来源: 评论
Improving multi-view document clustering: leveraging multi-structure processor and hybrid ensemble clustering module  30
Improving multi-view document clustering: leveraging multi-s...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Bai, Ruina Bai, Qi Huang, Ruizhang Chen, Yanping Qin, Yongbin Text Computing & Cognitive Intelligence Engineering Research Center National Education Ministry College of Computer Science and Technology Guizhou University Guiyang550025 China State Key Laboratory of Public Big Data Guizhou University Guiyang550025 China School of Mathematical Sciences Zhejiang University Hangzhou310058 China
We introduce a multi-view document clustering model called DMsECN (Deep Multi-structure Ensemble Clustering Network), comprising a multi-structure processor and a hybrid ensemble clustering module. Unlike existing mod... 详细信息
来源: 评论
Memory Error Detection Based on Dynamic Binary Translation  20
Memory Error Detection Based on Dynamic Binary Translation
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Xu, Hang Ren, Wei Liu, Zimian Chen, Jiajun Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall... 详细信息
来源: 评论