咨询与建议

限定检索结果

文献类型

  • 1,105 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,291 篇 工学
    • 700 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 185 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 174 篇 电气工程
    • 123 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 117 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 85 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,019 篇 理学
    • 554 篇 物理学
    • 388 篇 数学
    • 126 篇 统计学(可授理学、...
    • 121 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 university of ch...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 99 篇 state key labora...
  • 96 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 86 篇 school of physic...
  • 83 篇 center for astro...
  • 82 篇 college of physi...
  • 81 篇 school of physic...
  • 80 篇 institute of fro...
  • 80 篇 moscow institute...
  • 79 篇 school of physic...
  • 79 篇 national space s...
  • 77 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.
  • 62 篇 mao j.r.

语言

  • 1,798 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1991 条 记 录,以下是161-170 订阅
排序:
KVM PT Based Coverage Feedback Fuzzing for Network key Devices  2
KVM PT Based Coverage Feedback Fuzzing for Network Key Devic...
收藏 引用
2nd International Conference on Computer engineering and Application, ICCEA 2021
作者: Zhiqiang, Lin Jianshan, Peng Yechuan, Bi Xiaowei, Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the advent of the network era, network security has attracted more and more attention. As the key node in the network, network key devices play an important role in protecting the internal network and ensuring th... 详细信息
来源: 评论
Parent-based Powershell Script Fusion Technology
Parent-based Powershell Script Fusion Technology
收藏 引用
2021 International Symposium on Computer Technology and Information Science, ISCTIS 2021
作者: Cheng, Sipeng Sha, Zihan Yu, Pu Bu, Wenjuan Huo, Guovu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses... 详细信息
来源: 评论
Semantic Understanding of Source and Binary Code based on Natural Language Processing  4
Semantic Understanding of Source and Binary Code based on Na...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Zhang, Zhongtang Liu, Shengli Yang, Qichao Guo, Shichen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op... 详细信息
来源: 评论
Advancing Quantization Steps Estimation: A Two-Stream Network Approach for Enhancing Robustness  24
Advancing Quantization Steps Estimation: A Two-Stream Networ...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Cheng, Xin Wang, Hao Wang, Jinwei Luo, Xiangyang Ma, Bin Nanjing University of Information Science and Technology Nanjing China Huaiyin Institute of Technology Huai'an China Nankai University Tianjin China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Qilu University of Technology Jinan China
In Joint Photographic Experts Group (JPEG) image steganalysis and forensics, the quantization step can reveal the history of image operations. Several methods for estimating the quantization step have been proposed by... 详细信息
来源: 评论
Dynamic Instrumentation Framework Based on Entity Equipment  6
Dynamic Instrumentation Framework Based on Entity Equipment
收藏 引用
6th IEEE International Conference on Computer and Communication Systems, ICCCS 2021
作者: Jiangtao, Zhao Dong, Weiyu Zhang, Haotian Lin, Jian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic binary analysis is an important way of program analysis. Most of the existing dynamic analysis tools are based on dynamic binary instrumentation platforms. The existing gdb tool, which is often used for debugg... 详细信息
来源: 评论
Integrating KNN and Gradient Boosting Decision Tree for Recommendation  5
Integrating KNN and Gradient Boosting Decision Tree for Reco...
收藏 引用
5th IEEE advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Du, Qiming Li, Nan Yang, Shudan Sun, Daozhu Liu, Wenfu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an efficient information filtering tool, the recommendation system can help users obtain valuable information quickly and efficiently while effectively alleviating the information load problem. However, the classic... 详细信息
来源: 评论
Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier  2021
Inter-domain Link Inference with Confidence Using Naïve Bay...
收藏 引用
2021 13th International Conference on Machine Learning and computing, ICMLC 2021
作者: Zhao, Yi Liu, Yan Guo, XiaoYu Sui, ZhongHang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Inter-domain link inference is not only important for network security and fault diagnosis, but also helps to conduct research on inter-domain congestion detection and network resilience assessment. Current researches... 详细信息
来源: 评论
An Ensemble Approach with Clustering-Based Under-sampling for Imbalanced Classification  2
An Ensemble Approach with Clustering-Based Under-sampling fo...
收藏 引用
2nd International Conference on Artificial Intelligence and Education, ICAIE 2021
作者: Ren, Huajuan Ren, Shuai Yan, Lin Wang, Ruimin Jing, Jing Shi, Jiaqi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Class imbalance widely occurs in many real-world applications, which affects the recognition of important class to a certain extent. Ensemble methods that combined resampling are effective to alleviate the class imbal... 详细信息
来源: 评论
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of Embedded Devices  4
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of E...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Zheng, Yan Dong, Weiyu Cheng, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of embedded devices, security issues continue to occur. The existing automated security testing methods for embedded devices are mainly carried out from two aspects: the Web interface of the de... 详细信息
来源: 评论
Research on security assessment based on big data and multi-entity profile  5
Research on security assessment based on big data and multi-...
收藏 引用
5th IEEE advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Liu, Wenfu Pang, Jianmin Yang, Shudan Li, Nan Du, Qiming Sun, Daozhu Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties"(entities in this paper) have interna... 详细信息
来源: 评论