咨询与建议

限定检索结果

文献类型

  • 1,105 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,291 篇 工学
    • 700 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 185 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 174 篇 电气工程
    • 123 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 117 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 85 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,019 篇 理学
    • 554 篇 物理学
    • 388 篇 数学
    • 126 篇 统计学(可授理学、...
    • 121 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 university of ch...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 99 篇 state key labora...
  • 96 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 86 篇 school of physic...
  • 83 篇 center for astro...
  • 82 篇 college of physi...
  • 81 篇 school of physic...
  • 80 篇 institute of fro...
  • 80 篇 moscow institute...
  • 79 篇 school of physic...
  • 79 篇 national space s...
  • 77 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.
  • 62 篇 mao j.r.

语言

  • 1,798 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1991 条 记 录,以下是51-60 订阅
排序:
SWPy: Python Numerical computing Library Optimization for Domestic Many-core Processors  10
SWPy: Python Numerical Computing Library Optimization for Do...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Wang, Qihan Pang, Jianming Yue, Feng Yang, Shudan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The NumPy computational library, the most typical scientific computing library in Python, is generally limited to a single-node or multi-threaded CPU-only execution model. With the increasing size of datasets, the inc... 详细信息
来源: 评论
Research on Memory Attacks and Defenses for Programmable Logic Controllers  4
Research on Memory Attacks and Defenses for Programmable Log...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Geng, Yangyang Liu, Ke Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Programmable logic controllers (PLCs) are the core of industrial control systems (ICS), which play an essential role in critical infrastructure. In recent years, significant real-world attacks against PLCs have emerge... 详细信息
来源: 评论
LOM: A Website Fingerprinting Defense Method based on Local Optimal Mutation  10
LOM: A Website Fingerprinting Defense Method based on Local ...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Wang, Jue Zhu, Yuefei Lin, Wei Li, Ding Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Website Fingerprinting (WF) is a traffic analysis attack. The potential local adversary can infer the user's web activity by extracting implicit pattern information from traffic traces. Leveraging the latest advan... 详细信息
来源: 评论
A review of auxiliary hardware architectures supporting dynamic taint analysis
A review of auxiliary hardware architectures supporting dyna...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Yang, Anfeng Guang, Yan Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running... 详细信息
来源: 评论
Yara rule enhancement using Bert-based strings language model  5
Yara rule enhancement using Bert-based strings language mode...
收藏 引用
5th International Conference on advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Xu, Lianqiu Qiao, Meng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, with the development and popularity of information technology, how to protect information systems from malicious code is now a hot issue. Malicious code will cause irreversible damage through a series... 详细信息
来源: 评论
UEFI Security Threats Introduced by S3 and Mitigation Measure  7
UEFI Security Threats Introduced by S3 and Mitigation Measur...
收藏 引用
7th International Conference on Signal and Image Processing, ICSIP 2022
作者: Jiao, Weihua Li, Qingbao Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
UEFI is widely used as the new generation BIOS, except for some new features, it also brings some security issues. The threat brought by S3 sleep jeopardizes the security of computer platforms seriously. An attacker c... 详细信息
来源: 评论
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Pi, Qiankun Lu, Jicang Sun, Yepeng Fan, Qinlong Zhou, Xukun Shang, Shouxin State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
RSM-PA:Research on Route Selection Method of Inter-domain Routing System Based on Path Availability  23
RSM-PA:Research on Route Selection Method of Inter-domain Ro...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhu, Huihu Qiu, Han Zhu, Junhu Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The inter-domain routing system is the key infrastructure of the Internet. However, BGP does not consider the link state in the routing selection process. As a result, when the inter-domain routing system faces securi... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm  4
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
4th International Conference on Consumer Electronics and Computer engineering, ICCECE 2024
作者: Lin, Jiang Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code  6
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
6th International Conference on Communications, Information System and Computer engineering, CISCE 2024
作者: Xiong, Zhe Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论