咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 697 篇 计算机科学与技术...
    • 568 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 175 篇 电气工程
    • 171 篇 信息与通信工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 115 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 84 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 53 篇 力学(可授工学、理...
    • 49 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
  • 1,010 篇 理学
    • 548 篇 物理学
    • 389 篇 数学
    • 128 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 法学
    • 31 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 15 篇 topology
  • 14 篇 network topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 hebei normal uni...
  • 94 篇 state key labora...
  • 94 篇 university of ch...
  • 91 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 81 篇 school of physic...
  • 78 篇 center for astro...
  • 77 篇 college of physi...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 75 篇 school of physic...
  • 75 篇 moscow institute...
  • 74 篇 national space s...
  • 71 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 71 篇 danzengluobu
  • 68 篇 kuleshov d.
  • 67 篇 liu d.
  • 66 篇 chen m.j.
  • 66 篇 liu s.m.
  • 66 篇 huang d.h.
  • 65 篇 dai h.l.
  • 65 篇 guo y.q.
  • 65 篇 liu b.
  • 64 篇 bao y.w.
  • 63 篇 li cheng
  • 63 篇 li xin
  • 63 篇 hu h.b.
  • 61 篇 liu h.d.
  • 61 篇 mao j.r.

语言

  • 1,860 篇 英文
  • 57 篇 其他
  • 44 篇 中文
检索条件"机构=The State Key Laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是161-170 订阅
排序:
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
An anti-side-channel virtual CPU scheduling algorithm based on leakage evaluation for virtual machine security  7
An anti-side-channel virtual CPU scheduling algorithm based ...
收藏 引用
2017 7th International Workshop on Computer Science and engineering, WCSE 2017
作者: Du, Yuanzhi Du, Xuehui Yang, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but... 详细信息
来源: 评论
A review of auxiliary hardware architectures supporting dynamic taint analysis
A review of auxiliary hardware architectures supporting dyna...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Yang, Anfeng Guang, Yan Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running... 详细信息
来源: 评论
Embedding Attribute and Relation Information for Person Entity Alignment  6
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Wang, Can Liu, Xiaonan Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
Topology-Aware Software Assignment in Networked Systems  2
Topology-Aware Software Assignment in Networked Systems
收藏 引用
2019 2nd International Conference on advanced Algorithms and Control engineering, ICAACE 2019
作者: Wang, Junchao Liu, Hao Liu, Zhenwu Zhang, Zheng Pang, Jianmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Cyberspace mimic defense has been proven to be a revolutionary defense technology that "changes the rules of the game" to ensure the security of cyberspace. However, the software diversity inherent in mimic ... 详细信息
来源: 评论
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of Embedded Devices  4
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of E...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Zheng, Yan Dong, Weiyu Cheng, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of embedded devices, security issues continue to occur. The existing automated security testing methods for embedded devices are mainly carried out from two aspects: the Web interface of the de... 详细信息
来源: 评论
ALEmu: A Framework for Application-layer Programs Emulation of Embedded Devices  4
ALEmu: A Framework for Application-layer Programs Emulation ...
收藏 引用
4th International Conference on Computer engineering and Application, ICCEA 2023
作者: He, Heng Xiong, Xiaobing Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ... 详细信息
来源: 评论
Vulnerability Model and Evaluation of the UEFI Platform Firmware Based on Improved Attack Graphs  9
Vulnerability Model and Evaluation of the UEFI Platform Firm...
收藏 引用
9th IEEE International Conference on Software engineering and Service Science, ICSESS 2018
作者: Cao, Fei Li, Qingbao Chen, Zhifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of... 详细信息
来源: 评论
Yara rule enhancement using Bert-based strings language model  5
Yara rule enhancement using Bert-based strings language mode...
收藏 引用
5th International Conference on advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Xu, Lianqiu Qiao, Meng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, with the development and popularity of information technology, how to protect information systems from malicious code is now a hot issue. Malicious code will cause irreversible damage through a series... 详细信息
来源: 评论
Feature-based identification method of MCU firmware IO interface  6
Feature-based identification method of MCU firmware IO inter...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Sun, Yuanbo Dong, Weiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ... 详细信息
来源: 评论