咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是251-260 订阅
排序:
MDFA: A Malware Detection Framework Based on Attention Mechanism with Bi-LSTM
MDFA: A Malware Detection Framework Based on Attention Mecha...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xuyan Qi Huanwei Wang Yonghe Tang Wei Liu Jiangtao Xie State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
As the existing malware intelligent detection methods have shortcomings and low accuracy of manual feature extraction and feature processing, a Malware Detection Framework with Attention mechanism based on Bi-directio... 详细信息
来源: 评论
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection
arXiv
收藏 引用
arXiv 2024年
作者: Song, Chengyu Ma, Linru Zheng, Jianming Liao, Jinzhi Kuang, Hongyu Yang, Lin Systems Engineering Institute Academy of Military Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China National University of Defense Technology National Key Laboratory of Information Systems Engineering Changsha China
Log-based insider threat detection (ITD) detects malicious user activities by auditing log entries. Recently, Large Language Models (LLMs) with strong common sense knowledge are emerging in the domain of ITD. Neverthe... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
Consumer Electronics and Computer engineering (ICCECE), 2021 IEEE International Conference on
作者: Jiang Lin Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address...
来源: 评论
SoK: A Survey on Redundant Execution Technology
SoK: A Survey on Redundant Execution Technology
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zijing Liu Zheng Zhang Ruicheng Xi Pengzhe Zhu Bolin Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the... 详细信息
来源: 评论
Disentangling Ensemble Models on Adversarial Generalization in Image Classification
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
International Conference on Electronic engineering and Informatics (EEI)
作者: Chenwei Li Mengyuan Pan Bo Yang Hengwei Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp...
来源: 评论
A Software/Hardware Co-design Local Irregular Sparsity Method for Accelerating CNNs on FPGA  22
A Software/Hardware Co-design Local Irregular Sparsity Metho...
收藏 引用
Workshop Proceedings of the 51st International Conference on Parallel Processing
作者: Jiangwei Shang Zhan Zhang Chuanyou Li Kun Zhang Lei Qian Hongwei Liu Harbin Institute of Technology China Southeast University China State Key Laboratory of Mathematical Engineering and Advanced Computing China
Convolutional neural networks (CNNs) have been widely used in different areas. The success of CNNs comes with a huge amount of parameters and computations, and nowaday CNNs still keep moving toward larger structures. ... 详细信息
来源: 评论
Performance Verification of state Feedback H∞ state Molecular Controller Via Chemical Reaction Networks  5
Performance Verification of State Feedback H∞ State Molecul...
收藏 引用
5th International Conference on Industrial Artificial Intelligence, IAI 2023
作者: Yao, Jingwang Wang, Xing'An Lv, Hui Li, Yang Zhang, Wujie Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Dalian University College of Environmental and Chemical Engineering Dalian116622 China Dalian Chivy Biotechnology Co. Ltd Dalian116023 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110004 China
An important goal in synthetic biology is in the design and implementation of control strategies embedded in biochemical reaction systems to enable control of the process at the molecular level. The problem of set-poi... 详细信息
来源: 评论
Pruned-F1DCN: A lightweight network model for traffic classification  22
Pruned-F1DCN: A lightweight network model for traffic classi...
收藏 引用
Proceedings of the 2022 International Conference on Cyber Security
作者: Ruo nan Wang Jin long Fei Rong kai Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China China
With the continuous development of deep learning, deep neural networks are gradually applied to traffic classification problems. However, the large network structure and parameter number of deep neural networks hinder... 详细信息
来源: 评论
A Neighbor Immunization Strategy to Block Virus Spreading on Networks  2
A Neighbor Immunization Strategy to Block Virus Spreading on...
收藏 引用
2nd Information Communication Technologies Conference, ICTC 2021
作者: Yaohui, Hao Yingze, Liu Baole, Zhao Qingxian, Wang Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
In order to achieve better effect on blocking virus propagation, a neighbor immunization strategy was proposed and verified in this paper. On email-EU real networks and on scale-free model network, the efficiencies of... 详细信息
来源: 评论
Boosting Performance and QoS for Concurrent GPU B+trees by Combining-Based Synchronization  23
Boosting Performance and QoS for Concurrent GPU B+trees by C...
收藏 引用
28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, PPoPP 2023
作者: Zhang, Weihua Zhao, Chuanlei Peng, Lu Lin, Yuzhe Zhang, Fengzhe Lu, Yunping School of Computer Science Fudan University China Institute of Big Data Fudan University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Parallel Processing Institute Fudan University China Department of Computer Science Tulane University United States
Concurrent B+trees have been widely used in many systems. With the scale of data requests increasing exponentially, the systems are facing tremendous performance pressure. GPU has shown its potential to accelerate con... 详细信息
来源: 评论