咨询与建议

限定检索结果

文献类型

  • 810 篇 会议
  • 783 篇 期刊文献

馆藏范围

  • 1,593 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,024 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 154 篇 信息与通信工程
    • 136 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 101 篇 控制科学与工程
    • 88 篇 化学工程与技术
    • 80 篇 生物工程
    • 77 篇 材料科学与工程(可...
    • 76 篇 网络空间安全
    • 70 篇 光学工程
    • 53 篇 机械工程
    • 49 篇 仪器科学与技术
    • 44 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 751 篇 理学
    • 424 篇 物理学
    • 251 篇 数学
    • 96 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 87 篇 化学
    • 74 篇 地球物理学
    • 40 篇 系统科学
  • 187 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 30 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 28 篇 cosmic rays
  • 28 篇 network security
  • 26 篇 security
  • 26 篇 training
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 632 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 79 篇 fang j.
  • 79 篇 feng c.f.
  • 79 篇 jiang k.
  • 78 篇 bastieri d.
  • 78 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 71 篇 guo y.q.
  • 70 篇 chen m.j.
  • 70 篇 bao y.w.
  • 69 篇 li cheng
  • 69 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 li xin
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 1,408 篇 英文
  • 151 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1593 条 记 录,以下是601-610 订阅
排序:
Network Topology Change Detection Based on Statistical Process Control  20
Network Topology Change Detection Based on Statistical Proce...
收藏 引用
4th High Performance computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020
作者: Liu, Yan Liu, Lian Yan, Yu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Investigation Technology Center PLCMC Beijing China First Affiliated Hospital of Chongqing Medical University Chongqing China
Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the tradition... 详细信息
来源: 评论
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Ling Chen Wenwen Liu Daofu Gong Yan Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论
Stability Analysis of a Rumor Propagation Model in Complex Networks with Holling II Type Functional Response
Stability Analysis of a Rumor Propagation Model in Complex N...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Ze Yu Gang Zhou Junyong Luo Mengli Zhang Ningbo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ... 详细信息
来源: 评论
A Software Upgrade Security Analysis Method on Network Traffic Classification using Deep Learning
A Software Upgrade Security Analysis Method on Network Traff...
收藏 引用
Urban engineering and Management Science (ICUEMS), International Conference on
作者: Bing Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论
Recommendation of cyber attack method based on knowledge graph
Recommendation of cyber attack method based on knowledge gra...
收藏 引用
Computer engineering and Intelligent Control (ICCEIC) International Conference on
作者: Yunjia Ou Tianyang Zhou Junhu Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ... 详细信息
来源: 评论
Recurrent Neural Network Based Binary Code Vulnerability Detection  19
Recurrent Neural Network Based Binary Code Vulnerability Det...
收藏 引用
Proceedings of the 2019 2nd International Conference on Algorithms, computing and Artificial Intelligence
作者: Jianyun Zheng Jianmin Pang Xiaochuan Zhang Xin Zhou MingLiang Li Jun Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network (RNN) ... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Xiangyang Chang Junhu Zhu Shibin Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论
Prediction Method of Attack Behavior Based on Stackelberg Security Game  5
Prediction Method of Attack Behavior Based on Stackelberg Se...
收藏 引用
5th IEEE International Conference on Computer and Communications, ICCC 2019
作者: Zhou, Tianyang Ge, Xiaoyue Zang, Yichao Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The essence of Network attack and Defense confrontation is the Game process between attacker and Defender. In the research of the existing network attack strategy, there is a priori hypothesis defect of equal status b... 详细信息
来源: 评论
A Survey on Neural Machine Translation Applied to Sign Language Generation
A Survey on Neural Machine Translation Applied to Sign Langu...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Yue Zhang Lihong Cao State Key Laboratory of Media Convergence and Communication Communication University of China Beijing China Neuroscience and Intelligent Media Institute Communication University of China Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
Sign languages are the primary medium of communication for the deaf and hearing-impaired community, and the number of human beings with hearing impairment is increasing at a rapid rate. There is a significant communic... 详细信息
来源: 评论
Unknown Traffic Identification Based on Deep Adaptation Networks
Unknown Traffic Identification Based on Deep Adaptation Netw...
收藏 引用
IEEE Conference on ALocal Computer Networks Workshops (LCN Workshops)
作者: Ziji Yang Wei Lin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Network traffic classification has become an important basis for computer networks. However, the emergence of new applications, which generate unknown traffic constantly, has brought new challenges. The most critical ... 详细信息
来源: 评论