咨询与建议

限定检索结果

文献类型

  • 1,085 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,257 篇 工学
    • 703 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 175 篇 信息与通信工程
    • 171 篇 电气工程
    • 122 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 83 篇 网络空间安全
    • 70 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 549 篇 物理学
    • 385 篇 数学
    • 124 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 法学
    • 31 篇 社会学
  • 38 篇 医学
    • 32 篇 临床医学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 15 篇 topology
  • 14 篇 network topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 615 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 65 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1966 条 记 录,以下是261-270 订阅
排序:
A Note on Rotation Symmetric S-boxes
收藏 引用
Journal of Systems Science & Complexity 2019年 第5期32卷 1460-1472页
作者: GAO Guangpu LIN Dongdai LIU Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China Guangxi Key Laboratory of Cryptogpraphy and Information Security Guilin University of Electronic TechnologyGuilin 541004China
This paper is twofold. The first is devoted to study a class of quadratic rotation symmetric S-boxes(RSSBs) which was presented by Gao G, et al., Constructions of quadratic and cubic rotation symmetric bent functions,... 详细信息
来源: 评论
Traceability Method of Network Attack Based on Evolutionary Game
Traceability Method of Network Attack Based on Evolutionary ...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Zhang, Xiaoning Sun, Pengyu Liu, Xiaohu Ma, Junqiang Zhang, Yuchen State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz... 详细信息
来源: 评论
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
收藏 引用
China Communications 2021年 第8期18卷 85-95页
作者: Bingzheng Li Zheng Zhang Xiaomei Wang Sheng Qu Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and... 详细信息
来源: 评论
Solve the False-Positive Problem of the Mimic System Based on the Best Mimic Component Set
收藏 引用
China Communications 2022年 第5期19卷 253-266页
作者: Yuwen Shao Zheng Zhang Xiaomei Wang Chuanxing Pan Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot... 详细信息
来源: 评论
DEAM: Decoupled, Expressive, Area-Efficient Metadata Cache
收藏 引用
Journal of Computer Science & Technology 2014年 第4期29卷 679-691页
作者: 刘鹏 方磊 黄巍 CCF IEEE Department of Information Science and Electronic Engineering Zhejiang University State Key Laboratory of Mathematical Engineering and Advanced Computing ACM Department of Electrical and Computer Engineering University of Rochester NY 14627-0231 U.S.A.
Chip multiprocessor presents brand new opportunities for holistic on-chip data and coherence management solutions. An intelligent protocol should be adaptive to the fine-grain accessing behavior. And in terms of stora... 详细信息
来源: 评论
Code Level Context Sensitivity Exploration Algorithm
Code Level Context Sensitivity Exploration Algorithm
收藏 引用
2015 4th International Conference on Computer, Mechatronics, Control and Electronic engineering (ICCMCEE 2015)
作者: Yan Lijing Shan Zheng Xu Xiaoyan Xue Fei The State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University
The context sensitivity is an important property in program analysis which can improve the analysis accuracy of the function call context of the source codes and helps to improve the abilities of the compiler optimiza... 详细信息
来源: 评论
Forgeability of Wang-Zhu-Feng-Yau’s Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of Computer Science & Technology 2013年 第4期28卷 743-748页
作者: 葛爱军 黄欣沂 陈成 马传贵 张锐 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Fujian Provincial Key Laboratory of Network Security and Cryptology School of Mathematics and Computer ScienceFujian Normal University Institute of Software Chinese Academy of Sciences
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma... 详细信息
来源: 评论
Homogeneous and Heterogeneous Graph Learning for Hybrid Beamforming in mmWave Systems
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Li, Yuhang Lu, Yang Zhang, Guangyang Ai, Bo Niyato, Dusit Cui, Shuguang State Key Laboratory of Advanced Rail Autonomous Operation China Beijing Jiaotong University School of Computer Science and Technology Beijing100044 China Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Shenzhen518066 China
Hybrid analog and digital beamforming (HBF) is a cost-efficient technique to achieve high data rates in millimeterwave (mmWave) communication systems. This paper applies the emerging graph neural networks (GNNs) to HB... 详细信息
来源: 评论
Analysis of cryptosystem recognition scheme based on Euclidean distance feature extraction in three machine learning classifiers  3
Analysis of cryptosystem recognition scheme based on Euclide...
收藏 引用
2019 3rd International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2019
作者: Zhao, Yaqun Fan, Sijie State Key Laboratory of Mathematical Engineering and Advanced Computing 450001 China State Key Laboratory of Cryptography and Science 450001 China
In reality, many cryptographic analysis techniques are based on a specific cryptographic system or a large number of encrypted ciphertext. The identification and detection of cryptographic system is of great significa... 详细信息
来源: 评论
Programming Logic Modeling and Cross-Program Defect Detection Method for Object-Oriented Code
收藏 引用
Computers, Materials & Continua 2020年 第7期64卷 273-295页
作者: Yan Liu Wenyuan Fang Qiang Wei Yuan Zhao Liang Wang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China The School of Computing Newcastle UniversityNewcastle upon TyneNE45TGUK
Code defects can lead to software vulnerability and even produce vulnerability *** research shows that the code detection technology with text analysis can judge whether object-oriented code files are defective to som... 详细信息
来源: 评论