咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 755 篇 期刊文献

馆藏范围

  • 1,560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,000 篇 工学
    • 620 篇 计算机科学与技术...
    • 501 篇 软件工程
    • 147 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 98 篇 控制科学与工程
    • 83 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 73 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 51 篇 机械工程
    • 48 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
    • 25 篇 冶金工程
    • 24 篇 力学(可授工学、理...
  • 738 篇 理学
    • 420 篇 物理学
    • 250 篇 数学
    • 94 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 83 篇 化学
    • 72 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 31 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 27 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 620 篇 state key labora...
  • 103 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 85 篇 department of ph...
  • 85 篇 key laboratory f...
  • 82 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 79 篇 institute of fro...
  • 79 篇 school of physic...
  • 79 篇 school of physic...
  • 79 篇 moscow institute...
  • 79 篇 school of astron...
  • 78 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 76 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 bao y.w.
  • 67 篇 hu h.b.
  • 67 篇 liu b.
  • 64 篇 li xin
  • 62 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,489 篇 英文
  • 38 篇 中文
  • 36 篇 其他
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1560 条 记 录,以下是211-220 订阅
排序:
A software upgrade security analysis method based on program analysis
A software upgrade security analysis method based on program...
收藏 引用
2021 IEEE International Conference on Computer Science, Electronic Information engineering and Intelligent Control Technology, CEI 2021
作者: Lv, Xiaoshao Shu, Hui Kang, Fei Huang, Yuyao State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi... 详细信息
来源: 评论
A survey of offensive security research on PLCs
A survey of offensive security research on PLCs
收藏 引用
2021 International Conference on Computer, Communication, Control, Automation and Robotics, CCCAR 2021
作者: Ma, Rongkuan Wei, Qiang Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS... 详细信息
来源: 评论
FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images
收藏 引用
Journal on Internet of Things 2022年 第1期4卷 1-20页
作者: Yingchao Yu Shuitao Gan Xiaojun Qin State Key Laboratory of Mathematical Engineering and Advanced Computing WuxiJiangsu214083China
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine... 详细信息
来源: 评论
Research on IoT malware based on the ATT&CK model  11
Research on IoT malware based on the ATT&CK model
收藏 引用
2021 11th International Workshop on Computer Science and engineering, WCSE 2021
作者: Hao, Bo Kang, Fei Yang, Ju Xiong, Xiaobing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
The security of the IoT has become a hot research area in cyberspace security, among which the malware is a major threat. Based on the ATT&CK model, this paper studies the composition and behavior of IoT malware, ... 详细信息
来源: 评论
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware
Fw-fuzz: A code coverage-guided fuzzing framework for networ...
收藏 引用
作者: Gao, Zicong Dong, Weiyu Chang, Rui Wang, Yisen Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Fuzzing is an effective approach to detect software vulnerabilities utilizing changeable generated inputs. However, fuzzing the network protocol on the firmware of IoT devices is limited by inefficiency of test case g... 详细信息
来源: 评论
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Bo Zhang, Hengwei Wang, Jindong Yang, Yulong Lin, Chenhao Shen, Chao Zhao, Zhengyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China
Transferable adversarial examples cause practical security risks since they can mislead a target model without knowing its internal knowledge. A conventional recipe for maximizing transferability is to keep only the o...
来源: 评论
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Shun-Hang Li Gang Zhou Zhi-Bo Li Ji-Cang Lu Ning-Bo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod...
来源: 评论
A Selection Strategy for Network Security Defense Based on a Time Game Model
A Selection Strategy for Network Security Defense Based on a...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Sun, Pengyu Zhang, Hengwei Ma, Junqiang Li, Chenwei Mi, Yan Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net... 详细信息
来源: 评论
Effect of thickness variations of lithium niobate on insulator waveguide on the frequency spectrum of spontaneous parametric down-conversion
收藏 引用
Chinese Physics B 2021年 第11期30卷 268-273页
作者: Guang-Tai Xue Xiao-Hui Tian Chi Zhang Zhenda Xie Ping Xu Yan-Xiao Gong Shi-Ning Zhu National Laboratory of Solid State Microstructures School of PhysicsSchool of Electronic Science and EngineeringCollege of Engineering and Applied Sciencesand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210093China Institute for Quantum Information and State Key Laboratory of High Performance Computing College of ComputingNational University of Defense TechnologyChangsha 410073China
We study the effect of waveguide thickness variations on the frequency spectrum of spontaneous parametric downconversion in the periodically-poled lithium niobate on insulator(LNOI)*** analyze several variation models... 详细信息
来源: 评论
Feature Rotation Invariance Learning for Point Cloud Analysis  10
Feature Rotation Invariance Learning for Point Cloud Analysi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Shi, Lu Cao, Qi Zhang, Guoqing Yi, Jin Huang, Yansen Cen, Yigang Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer Science and Technology Visual Intellgence +X International Cooperation Joint Laboratory of Moe Beijing100044 China University of Glasgow The School of Computing Science 567739 Singapore Beijing Jiaotong University With the Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education The State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer and Information Technology Beijing100044 China Guizhou University Guizhou Lianjian Civil Engineering Quality Testing Monitoring Center Co. Ltd The College of Civil Engineering Guizhou550025 China
While deep learning has significantly advanced point cloud analysis, extracting effective features from their disordered structure remains challenging. Existing approaches often rely on complex network architectures o... 详细信息
来源: 评论