咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 756 篇 期刊文献

馆藏范围

  • 1,561 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,001 篇 工学
    • 621 篇 计算机科学与技术...
    • 501 篇 软件工程
    • 148 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 98 篇 控制科学与工程
    • 83 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 73 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 51 篇 机械工程
    • 48 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
    • 25 篇 冶金工程
    • 24 篇 力学(可授工学、理...
  • 739 篇 理学
    • 420 篇 物理学
    • 251 篇 数学
    • 94 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 83 篇 化学
    • 72 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 31 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 27 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 620 篇 state key labora...
  • 103 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 85 篇 department of ph...
  • 85 篇 key laboratory f...
  • 82 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 79 篇 institute of fro...
  • 79 篇 school of physic...
  • 79 篇 school of physic...
  • 79 篇 moscow institute...
  • 79 篇 school of astron...
  • 78 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 76 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 bao y.w.
  • 67 篇 hu h.b.
  • 67 篇 liu b.
  • 64 篇 li xin
  • 62 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,490 篇 英文
  • 38 篇 中文
  • 36 篇 其他
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1561 条 记 录,以下是91-100 订阅
排序:
A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning  4th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
4th International Conference on Big Data and Security, ICBDS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Shi, Wenqi Guo, Jiashan School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
To solve the multi-platform user association problem of complex trajectory matching process and high time cost in cross-platform association positioning of instant messaging users, and at the same time make full use o... 详细信息
来源: 评论
Solve the False-Positive Problem of the Mimic System Based on the Best Mimic Component Set
收藏 引用
China Communications 2022年 第5期19卷 253-266页
作者: Yuwen Shao Zheng Zhang Xiaomei Wang Chuanxing Pan Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot... 详细信息
来源: 评论
Path test data generation using adaptive simulated annealing particle swarm optimization
收藏 引用
Soft computing 2024年 第17-18期28卷 9587-9607页
作者: Jiao, Chongyang Zhou, Qinglei State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Henan Information Engineering School Zhengzhou Vocational College of Industrial Safety Zhengzhou450000 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi... 详细信息
来源: 评论
Research on Unpredetermined Behavior Recognition Techniques Based on Network Attacks  23
Research on Unpredetermined Behavior Recognition Techniques ...
收藏 引用
Proceedings of the 2023 5th International Conference on Internet of Things, Automation and Artificial Intelligence
作者: Yuxuan Xiao Jinlong Fei Junyi Wang State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o...
来源: 评论
High-performance optimization of SM4-GCM based on FPGA
High-performance optimization of SM4-GCM based on FPGA
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Lv, Shun Sen Li, Bin Chen, Xiaojie Zhou, Qinglei School of Information Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathmatical Engineering and Advanced Computing Zhengzhou China
SM4-GCM is an encryption algorithm with authentication function. The algorithm achieves the purpose of data security and information integrity. The SM4-GCM algorithm, implemented using traditional software methods, ha... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Research on Web application injection vulnerabilities detection method based on pattern matching
Research on Web application injection vulnerabilities detect...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Ma, Qican Wu, Zehui Wang, Xinlei Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin... 详细信息
来源: 评论
Automated Quantum Volume Test  2
Automated Quantum Volume Test
收藏 引用
2022 2nd International Conference on Electronics, Circuits and Information engineering, ECIE 2022
作者: Liu, Xiaonan He, Ming Wang, Junchao Xie, Haoshan Zhao, Chenyan Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As a benchmark for the overall performance of quantum computers, quantum volume has the advantage of being able to reflect the depth of running quantum circuits. But, the quantum volume test code provided by IBM needs... 详细信息
来源: 评论
A Vulnerability Automation Exploitation Method Based on Symbolic Execution
A Vulnerability Automation Exploitation Method Based on Symb...
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information service room Unit 32738 China
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln... 详细信息
来源: 评论
A Survey of Automatic Exploitation of Binary Vulnerabilities
A Survey of Automatic Exploitation of Binary Vulnerabilities
收藏 引用
2023 International Conference on Computer Network Security and Software engineering, CNSSE 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini... 详细信息
来源: 评论