咨询与建议

限定检索结果

文献类型

  • 1,084 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,254 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 169 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 552 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State key Laboratory of Mathematical Engineering and Advanced Computing"
1966 条 记 录,以下是281-290 订阅
排序:
nnTaint: An Optimized Dynamic Taint Analysis Method Based on Neural Network
nnTaint: An Optimized Dynamic Taint Analysis Method Based on...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Yuming Zhu Weiyu Dong Cyber Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction ... 详细信息
来源: 评论
CinfoFuzz: Fuzzing Method Based on Web Service Correlation Information of Embedded Devices
CinfoFuzz: Fuzzing Method Based on Web Service Correlation I...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Qi Feng Weiyu Dong Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop... 详细信息
来源: 评论
Rotation Transformation: A Method to Improve the Transferability of Adversarial Examples
Rotation Transformation: A Method to Improve the Transferabi...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Li, Zheming Zhang, Hengwei Ma, Junqiang Yang, Bo Li, Chenwei Li, Jingwen Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China PLA Army Staff Department Beijing China
Convolutional neural network models are fragile to adversarial examples. Adding disturbances that humans cannot observe in clean images can make the model classification error. Among the adversarial attack methods, wh... 详细信息
来源: 评论
A Formal Verification Method for Security Protocol Implementations Based on Model Learning and Tamarin  6
A Formal Verification Method for Security Protocol Implement...
收藏 引用
2021 6th International Symposium on Advances in Electrical, Electronics and Computer engineering, ISAEECE 2021
作者: Zhang, Xieli Zhu, Yuefei Gu, Chunxiang Miao, Xuyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan450002 China
The verification of security protocol implementations is notoriously difficult and important. In this paper, combining with the model learning using Tamarin, a formal verification tool of protocol specification, a for... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Ma, Zhaorui Zhang, Shicheng Chang, Yiheng Zhou, Qinglei Hu, Xinhao Li, Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450052 China Zhengzhou University of Light Industry Zhengzhou450002 China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
A review of cryptographic algorithm recognition technology for binary code
A review of cryptographic algorithm recognition technology f...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Zhao, Chenxia Kang, Fei Yang, Ju Shu, Hui Zhengzhou University Zhengzhou Henan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo... 详细信息
来源: 评论
Efficient Sparse Attention needs Adaptive Token Release
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Chaoran Zou, Lixin Luo, Dan Tang, Min Luo, Xiangyang Li, Zihao Li, Chenliang Wuhan University China Lehigh University United States Monash University Australia State Key Lab of Mathematical Engineering and Advanced Computing China
In recent years, Large Language Models (LLMs) have demonstrated remarkable capabilities across a wide array of text-centric tasks. However, their 'large' scale introduces significant computational and storage ... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback  2
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
2nd International Conference on Computer Communication and Network Security, CCNS 2021
作者: Yuwen, Shao Zheng, Zhang Bingzheng, Li Xinsheng, Ji State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering Technological RD Center Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
Tuning 2D magnetism in Fe3+XGeTe2 films by element doping
收藏 引用
National Science Review 2022年 第6期9卷 163-170页
作者: Shanshan Liu Zihan Li Ke Yang Enze Zhang Awadhesh Narayan Xiaoqian Zhang Jiayi Zhu Wenqing Liu Zhiming Liao Masaki Kudo Takaaki Toriyama Yunkun Yang Qiang Li Linfeng Ai Ce Huang Jiabao Sun Xiaojiao Guo Wenzhong Bao Qingsong Deng Yanhui Chen Lifeng Yin Jian Shen Xiaodong Han Syo Matsumura Jin Zou Yongbing Xu Xiaodong Xu Hua Wu Faxian Xiu State Key Laboratory of Surface Physics and Department of Physics Fudan University Institute for Nanoelectronic Devices and Quantum Computing Fudan University College of Science University of Shanghai for Science and Technology Laboratory for Computational Physical Sciences(MOE) Fudan University Solid State and Structural Chemistry Unit Indian Institute of Science School of Electronic Science and Engineering Nanjing University Department of Physics University of Washington Department of Electronic Engineering Royal Holloway University of London Materials Engineering The University of Queensland Beijing Key Laboratory of Microstructure and Property of Advanced Materials Institute of Microstructure and Property of Advanced Materials Beijing University of Technology The Ultramicroscopy Research Center Kyushu University State Key Laboratory of ASIC and System School of Microelectronics Fudan University Collaborative Innovation Center of Advanced Microstructures Department of Applied Quantum Physics and Nuclear Engineering Kyushu University Centre for Microscopy and Microanalysis The University of Queensland Shanghai Research Center for Quantum Sciences
Two-dimensional(2D) ferromagnetic materials have been discovered with tunable magnetism and orbital-driven nodal-line features. Controlling the 2D magnetism in exfoliated nanoflakes via electric/magnetic fields enab... 详细信息
来源: 评论
A Cross-Platform Instant Messaging User Association Method Based on Spatio-temporal Trajectory  8th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Li, Lingling Yang, Yang Liu, Fenlin School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Intelligent Engineering Zhengzhou University of Aeronautics Zhengzhou450000 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore
The current research on cross-platform instant messaging user association is mainly divided into two categories: based on user attributes and based on user behavior. Methods based on user attributes mainly identify us... 详细信息
来源: 评论