咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 754 篇 期刊文献

馆藏范围

  • 1,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,000 篇 工学
    • 620 篇 计算机科学与技术...
    • 501 篇 软件工程
    • 147 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 97 篇 控制科学与工程
    • 83 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 73 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 50 篇 机械工程
    • 48 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
    • 25 篇 冶金工程
    • 24 篇 力学(可授工学、理...
  • 737 篇 理学
    • 419 篇 物理学
    • 250 篇 数学
    • 94 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 83 篇 化学
    • 72 篇 地球物理学
    • 39 篇 系统科学
  • 184 篇 管理学
    • 119 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 31 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 27 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 620 篇 state key labora...
  • 103 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 85 篇 department of ph...
  • 85 篇 key laboratory f...
  • 82 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 79 篇 institute of fro...
  • 79 篇 school of physic...
  • 79 篇 school of physic...
  • 79 篇 moscow institute...
  • 79 篇 school of astron...
  • 78 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 76 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 bao y.w.
  • 67 篇 hu h.b.
  • 67 篇 liu b.
  • 64 篇 li xin
  • 62 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,489 篇 英文
  • 37 篇 中文
  • 36 篇 其他
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1559 条 记 录,以下是51-60 订阅
排序:
Multi-protocol comprehensive topology probe technology under non-cooperative conditions
Multi-protocol comprehensive topology probe technology under...
收藏 引用
2022 International Symposium on Computer Applications and Information Systems, ISCAIS 2022
作者: Lu, Xuanting Yang, Qichao Liu, Shengli Yang, Pengfei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ... 详细信息
来源: 评论
SWPy: Python Numerical computing Library Optimization for Domestic Many-core Processors  10
SWPy: Python Numerical Computing Library Optimization for Do...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Wang, Qihan Pang, Jianming Yue, Feng Yang, Shudan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The NumPy computational library, the most typical scientific computing library in Python, is generally limited to a single-node or multi-threaded CPU-only execution model. With the increasing size of datasets, the inc... 详细信息
来源: 评论
A Survey of Available Information Recovery of Binary Programs Based on Machine Learning  5
A Survey of Available Information Recovery of Binary Program...
收藏 引用
5th IEEE International Conference on Artificial Intelligence and Big Data, ICAIBD 2022
作者: Shao, Wenqiang Yang, Qichao Guo, Xixi Cai, Ruijie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
A binary program is an executable file obtained by compiling the source code. In order to reduce the size of software or prevent reverse engineering, software publishers usually only release executable files that have... 详细信息
来源: 评论
RSM-PA:Research on Route Selection Method of Inter-domain Routing System Based on Path Availability  23
RSM-PA:Research on Route Selection Method of Inter-domain Ro...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhu, Huihu Qiu, Han Zhu, Junhu Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The inter-domain routing system is the key infrastructure of the Internet. However, BGP does not consider the link state in the routing selection process. As a result, when the inter-domain routing system faces securi... 详细信息
来源: 评论
LOM: A Website Fingerprinting Defense Method based on Local Optimal Mutation  10
LOM: A Website Fingerprinting Defense Method based on Local ...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Wang, Jue Zhu, Yuefei Lin, Wei Li, Ding Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Website Fingerprinting (WF) is a traffic analysis attack. The potential local adversary can infer the user's web activity by extracting implicit pattern information from traffic traces. Leveraging the latest advan... 详细信息
来源: 评论
MDFA: A Malware Detection Framework Based on Attention Mechanism with Bi-LSTM  4
MDFA: A Malware Detection Framework Based on Attention Mecha...
收藏 引用
4th International Conference on Applied Machine Learning, ICAML 2022
作者: Qi, Xuyan Wang, Huanwei Tang, Yonghe Liu, Wei Xie, Jiangtao State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
As the existing malware intelligent detection methods have shortcomings and low accuracy of manual feature extraction and feature processing, a Malware Detection Framework with Attention mechanism based on Bi-directio... 详细信息
来源: 评论
Research on Memory Attacks and Defenses for Programmable Logic Controllers  4
Research on Memory Attacks and Defenses for Programmable Log...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Geng, Yangyang Liu, Ke Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Programmable logic controllers (PLCs) are the core of industrial control systems (ICS), which play an essential role in critical infrastructure. In recent years, significant real-world attacks against PLCs have emerge... 详细信息
来源: 评论
A Research and Verification of MFC Framework-aware Virus Infection Technology  3
A Research and Verification of MFC Framework-aware Virus Inf...
收藏 引用
3rd International Conference on Computer Vision, Image and Deep Learning and International Conference on Computer engineering and Applications, CVIDL and ICCEA 2022
作者: Guo, Wang Li, Yang Sha, Zihan Bu, Wenjuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Portable Executable (PE) virus technology is an important threat factor in the field of network security. With continuous upgrading of malware detection technology, virus infection technology will also gradually evolv... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code  6
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
6th International Conference on Communications, Information System and Computer engineering, CISCE 2024
作者: Xiong, Zhe Dong, Weiyu School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
An Abnormal Domain Name Generation Method Based on a Character-Level Model  4
An Abnormal Domain Name Generation Method Based on a Charact...
收藏 引用
4th International Conference on Robotics, Intelligent Control and Artificial Intelligence, RICAI 2022
作者: Wu, Chunbing Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli... 详细信息
来源: 评论