咨询与建议

限定检索结果

文献类型

  • 1,099 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,985 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,267 篇 工学
    • 704 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 170 篇 电气工程
    • 122 篇 控制科学与工程
    • 122 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 92 篇 光学工程
    • 79 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,011 篇 理学
    • 551 篇 物理学
    • 384 篇 数学
    • 122 篇 统计学(可授理学、...
    • 119 篇 化学
    • 115 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 deep neural netw...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 85 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1985 条 记 录,以下是21-30 订阅
排序:
Feature-based identification method of MCU firmware IO interface  6
Feature-based identification method of MCU firmware IO inter...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Sun, Yuanbo Dong, Weiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ... 详细信息
来源: 评论
Research on Cross-site Scripting Attack Detection Technology Based on Few-shot Learning  6
Research on Cross-site Scripting Attack Detection Technology...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Lu, Dongzhe Liu, Long State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the intensification of informatization and mobility, various web security threats are emerging. Cross-site scripting (XSS) attack is the most common type of web attack. Most traditional detection methods have bee... 详细信息
来源: 评论
Research on Intrusion Tolerance System Based on Behavioral Baseline and Defense-in-Depth Architecture
Research on Intrusion Tolerance System Based on Behavioral B...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Meng, Qi Wang, Xuemeng Yang, Kai Meng, Long Wang, Jiancheng Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
Tolerance technology is the third-generation network security technology commonly used in the world. It is derived from the category of information survival and endogenous security technology. A scholar from Carnegie ... 详细信息
来源: 评论
IPDF: Directed Fuzzer for Input Parsing Program
IPDF: Directed Fuzzer for Input Parsing Program
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: He, Yubo Liu, Long State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Directed greybox fuzzing aims to test specific code and has made many advances in several areas. However, most vulnerabilities of input parsing programs are triggered in the particular state of the program, so existin... 详细信息
来源: 评论
A Survey of Security Analysis on Industrial Control Devices via Rehosting  3
A Survey of Security Analysis on Industrial Control Devices ...
收藏 引用
3rd IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Liu, Houzhi Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
At present, the network security of embedded devices has received more and more attention. However, the existing dynamic analysis tools can't performance in embedded devices as common softwares. The main reason is... 详细信息
来源: 评论
On the complete weight distributions of quantum error-correcting codes
收藏 引用
Chinese Physics B 2023年 第5期32卷 272-287页
作者: 杜超 马智 熊茂胜 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenghzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhenghzhou 450001China Department of Mathematics Hong Kong University of Science and TechnologyHong KongChina
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... 详细信息
来源: 评论
IP-geolocater:a more reliable IP geolocation algorithm based on router error training
收藏 引用
Frontiers of Computer Science 2022年 第1期16卷 101-111页
作者: Shuodi ZU Xiangyang LUO Fan ZHANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Zhengzhou Science and Technology Institute Zhengzhou450001China
Location based services(LBS)are widely utilized,and determining the location of users’IP is the foundation for *** by unstable delay and insufficient landmarks,the existing geolocation algorithms have problems such a... 详细信息
来源: 评论
A Network Deception Defense Mechanism Based on Virtual Topology Generation
A Network Deception Defense Mechanism Based on Virtual Topol...
收藏 引用
2023 International Conference on Intelligent Systems, Communications, and Computer Networks, ISCCN 2023
作者: Wang, Binghui Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
To address the problem that traditional network defense techniques are difficult to cope with scanning attacks launched by internal attackers, this paper proposes a Virtual Network Topology Deception Defense mechanism... 详细信息
来源: 评论
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
收藏 引用
Frontiers of Computer Science 2024年 第3期18卷 183-197页
作者: Xingxing CHEN Qingfeng CHENG Weidong YANG Xiangyang LUO State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China Henan Key Laboratory of Grain Photoelectric Detection and Control Henan University of TechnologyZhengzhou 450001China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of ***,i... 详细信息
来源: 评论
Social Media User Geolocation Based on Large Language Models  2nd
Social Media User Geolocation Based on Large Language Model...
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Zhang, Meng Luo, Xiangyang Huang, Ningbo Key Laboratory of Cyberspace Situation Awareness of Henan Province Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
In the digital age, social media platforms have amassed a wealth of user-generated content, which contains valuable geographic information. However, the irregularities and noise in user-generated text, have led to sub... 详细信息
来源: 评论