咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 697 篇 计算机科学与技术...
    • 568 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 175 篇 电气工程
    • 171 篇 信息与通信工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 115 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 84 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 53 篇 力学(可授工学、理...
    • 49 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
  • 1,010 篇 理学
    • 548 篇 物理学
    • 389 篇 数学
    • 128 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 法学
    • 31 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 15 篇 topology
  • 14 篇 network topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 hebei normal uni...
  • 94 篇 state key labora...
  • 94 篇 university of ch...
  • 91 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 81 篇 school of physic...
  • 78 篇 center for astro...
  • 77 篇 college of physi...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 75 篇 school of physic...
  • 75 篇 moscow institute...
  • 74 篇 national space s...
  • 71 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 71 篇 danzengluobu
  • 68 篇 kuleshov d.
  • 67 篇 liu d.
  • 66 篇 chen m.j.
  • 66 篇 liu s.m.
  • 66 篇 huang d.h.
  • 65 篇 dai h.l.
  • 65 篇 guo y.q.
  • 65 篇 liu b.
  • 64 篇 bao y.w.
  • 63 篇 li cheng
  • 63 篇 li xin
  • 63 篇 hu h.b.
  • 61 篇 liu h.d.
  • 61 篇 mao j.r.

语言

  • 1,860 篇 英文
  • 57 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是131-140 订阅
排序:
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Cla...
收藏 引用
2021 IEEE International Conference on Communications, computing, Cybersecurity and Informatics, CCCI 2021
作者: Hu, Xinyi Gu, Chunxiang Chen, Yihang Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The Internet is about to enter the era of full encryption. Traditional traffic classification methods only work well in non-encrypted environments. How to identify the specific types of network encrypted traffic in an... 详细信息
来源: 评论
Research and Practice of Blending Teaching of Database System Integrating Ideological and Political Theories  3
Research and Practice of Blending Teaching of Database Syste...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Yao, Jinyang Liu, Fudong Wang, Junchao Zhao, Bo Shan, Zheng Xu, Peng Engineering and Advanced Computing State Key Laboratory of Mathematical Zhengzhou China
For the problem of the monotonous teaching form of the database system course, we integrate ideology and politics theories into the teaching design of the database system, combined with the 'Ideological and Politi... 详细信息
来源: 评论
Carrying multicast traffic across domain by per-access-network based Wide-Sense Circuit Tree
Carrying multicast traffic across domain by per-access-netwo...
收藏 引用
2013 IEEE International Conference of IEEE Region 10, IEEE TENCON 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
IP multicast suffers from scalability and QoS provisioning problems when supporting large scale group communication cross domain. To solve the problems, we propose WSCT-PAN, a per-access-network based wide-sense circu... 详细信息
来源: 评论
Register one-to-one mapping strategy in dynamic binary translation
Register one-to-one mapping strategy in dynamic binary trans...
收藏 引用
International Conference on Network Security and Communication engineering, NSCE 2014
作者: Cui, Y.N. Pang, J.M. Shan, Z. Yue, F. State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic Binary Translation (DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of Alpha. However, there exist some factors that impede its performance: high ... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum  6
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Chang, Xiangyang Zhu, Junhu Zhao, Shibin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论
Parent-based Powershell Script Fusion Technology
Parent-based Powershell Script Fusion Technology
收藏 引用
2021 International Symposium on Computer Technology and Information Science, ISCTIS 2021
作者: Cheng, Sipeng Sha, Zihan Yu, Pu Bu, Wenjuan Huo, Guovu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses... 详细信息
来源: 评论
Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture  2
Research on Performance Optimization for Sparse Matrix-Vecto...
收藏 引用
2nd International Conference on Information Technology and Computer Application, ITCA 2020
作者: Wang, Qihan Li, Mingliang Pang, Jianming Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing zhengzhou China
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu... 详细信息
来源: 评论
Semantic Understanding of Source and Binary Code based on Natural Language Processing  4
Semantic Understanding of Source and Binary Code based on Na...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Zhang, Zhongtang Liu, Shengli Yang, Qichao Guo, Shichen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op... 详细信息
来源: 评论
Software supply chain analysis based on function similarity  4
Software supply chain analysis based on function similarity
收藏 引用
2020 4th International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2020
作者: Sun, Wenjie Shan, Zheng Liu, Fudong Li, Xingwei Qiao, Meng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen... 详细信息
来源: 评论
Multi-protocol comprehensive topology probe technology under non-cooperative conditions
Multi-protocol comprehensive topology probe technology under...
收藏 引用
2022 International Symposium on Computer Applications and Information Systems, ISCAIS 2022
作者: Lu, Xuanting Yang, Qichao Liu, Shengli Yang, Pengfei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ... 详细信息
来源: 评论