咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key of Laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是111-120 订阅
A PV-DM-based feature fusion method for binary malware clustering  4
A PV-DM-based feature fusion method for binary malware clust...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Gui, Hairen Zhang, Chunyan Huang, Yizhao Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Utilizing NLP methods in malware classification or clustering applications is a hotspot in malware analysis. Binary malware embedding has become an important direction and basis for malware analysis. Existing binary m... 详细信息
来源: 评论
One wide-sense circuit tree per traffic class based inter-domain multicast
One wide-sense circuit tree per traffic class based inter-do...
收藏 引用
2013 IEEE 8th International Conference on Networking, Architecture and Storage, NAS 2013
作者: Yue, Chen Chaoling, Li Kaixiang, Huang Xiaobo, Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Traditional multicast protocol forms multicast trees rooted at different sources to forward packets. If the multicast sources and receivers are in different domains, these trees will produce a great number of multicas... 详细信息
来源: 评论
Topology-Aware Software Assignment in Networked Systems  2
Topology-Aware Software Assignment in Networked Systems
收藏 引用
2019 2nd International Conference on advanced Algorithms and Control engineering, ICAACE 2019
作者: Wang, Junchao Liu, Hao Liu, Zhenwu Zhang, Zheng Pang, Jianmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Cyberspace mimic defense has been proven to be a revolutionary defense technology that "changes the rules of the game" to ensure the security of cyberspace. However, the software diversity inherent in mimic ... 详细信息
来源: 评论
An Improved key Mismatch Attack on Kyber  7
An Improved Key Mismatch Attack on Kyber
收藏 引用
7th International Conference on Cryptography, Security and Privacy, CSP 2023
作者: Wang, Yaru Jiang, Haodong Ma, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem... 详细信息
来源: 评论
Practical Control Flow Integrity using Multi-Variant execution  20
Practical Control Flow Integrity using Multi-Variant executi...
收藏 引用
2020 International Conference on Internet computing for Science and engineering, ICICSE 2020 and the 13th International Conference on advanced Computer Theory and engineering, ICACTE 2020
作者: Yao, Dong Zhang, Zheng Zhang, Gaofei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The popularity of computers and networks brings many conveniences to our daily life but also brings a variety of security threats. The proliferation of attacks and the rapid spread of viruses make security researchers... 详细信息
来源: 评论
Pdf Exploitable malware analysis based on exploit genes  12
Pdf Exploitable malware analysis based on exploit genes
收藏 引用
12th IEEE International Conference on Anti-Counterfeiting, Security, and Identification, ASID 2018
作者: Zhou, Xin Pang, Jianmin Liu, Fudong Wang, Jun Yue, Feng Liu, Xiaonan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of social networks, as a low-cost, high-efficiency entail attack method, most of the attack vectors were embedded in email attachments, and exploited vulnerability on Adobe and Office software.... 详细信息
来源: 评论
SRS: A Split-Range Shared Memory Consistency Model for Thousand-Core Processors
SRS: A Split-Range Shared Memory Consistency Model for Thous...
收藏 引用
10th Annual Conference of advanced Computer Architecture, ACA 2014
作者: Lyu, Hui Zheng, Fang Xie, Xianghui State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
A novel memory consistency model for thousand-core processors is presented. The model simplifies cache coherence for the full chip, and reduces cache design complexity. In addition, the model has the ability to descri... 详细信息
来源: 评论
Recommendation of cyber attack method based on knowledge graph
Recommendation of cyber attack method based on knowledge gra...
收藏 引用
2020 International Conference on Computer engineering and Intelligent Control, ICCEIC 2020
作者: Ou, Yunjia Zhou, Tianyang Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ... 详细信息
来源: 评论
mathematical modeling of lunar soft landing - Take chang'e-3 as an example  4
Mathematical modeling of lunar soft landing - Take chang'e-3...
收藏 引用
4th IEEE International Conference on Automation, Electronics and Electrical engineering, AUTEEE 2021
作者: Yang, Benchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, the three-dimensional sphere dynamic model of lunar precise soft landing of the probe is discussed. Taking the National College Students' mathematical modeling competition as the background and Chan... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum  6
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Chang, Xiangyang Zhu, Junhu Zhao, Shibin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论