咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=The State Key Laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是11-20 订阅
RLGBG: A Reachable Landmark Grouping Based IP Geolocation Method for Unreachable Target  29th
RLGBG: A Reachable Landmark Grouping Based IP Geolocation Me...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Zu, Shuodi Liu, Chong Zhang, Fan Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
IP geolocation technology can estimate or determine the geographical location of terminal device through IP address, which is an important basis for location-based network services. The existing IP geolocation methods... 详细信息
来源: 评论
Quantum computing control system configuration optimizer with adaptive genetic algorithm  9
Quantum computing control system configuration optimizer wit...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and Computer engineering, ISAEECE 2024
作者: Huang, Shucheng Wang, Junchao Pang, Jianmin Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
As quantum computing continues to advance, the complexity of control systems for superconducting qubits also increases. This paper presents a genetic algorithm (GA) approach for optimizing the control systems in quant... 详细信息
来源: 评论
TS-GGNN: Combining Graph and Sequence Features for Vulnerability Detection in Source Code  5
TS-GGNN: Combining Graph and Sequence Features for Vulnerabi...
收藏 引用
5th International Conference on Communications, Information System and Computer engineering, CISCE 2023
作者: Zhou, Xin Pang, Jianmin Zhang, Chunyan Yue, Feng Wang, Junchao Liu, Guangming State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability... 详细信息
来源: 评论
Research on Unpredetermined Behavior Recognition Techniques Based on Network Attacks  5
Research on Unpredetermined Behavior Recognition Techniques ...
收藏 引用
5th International Conference on Internet of Things, Automation and Artificial Intelligence, IoTAAI 2023
作者: Xiao, Yuxuan Fei, Jinlong Wang, Junyi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o... 详细信息
来源: 评论
Critical Variable Guided Mutation for Directed Greybox Fuzzing
Critical Variable Guided Mutation for Directed Greybox Fuzzi...
收藏 引用
2023 IEEE International Conference on Control, Electronics and Computer Technology, ICCECT 2023
作者: He, Yubo Liu, Long The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Directed greybox fuzzing directs fuzzers to specified code areas and has gained great achievements in 1-day vulnerability detection. However, existing directed graybox fuzzers fail to generate the crash sample even if... 详细信息
来源: 评论
An Improved key Mismatch Attack on Kyber  7
An Improved Key Mismatch Attack on Kyber
收藏 引用
7th International Conference on Cryptography, Security and Privacy, CSP 2023
作者: Wang, Yaru Jiang, Haodong Ma, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem... 详细信息
来源: 评论
Dynamic Resampling Based Boosting Random Forest for Network Anomaly Traffic Detection  36th
Dynamic Resampling Based Boosting Random Forest for Network...
收藏 引用
36th International Conference on Industrial, engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2023
作者: Ren, Huajuan Wang, Ruimin Dong, Weiyu Li, Junhao Tang, Yonghe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Network anomaly traffic detection is an important technique for detecting intrusion activities and maintaining cyberspace security. Random forest is widely used in network anomalous traffic detection due to its good d... 详细信息
来源: 评论
A Malware Analysis Method Based on Behavioral Knowledge Graph
A Malware Analysis Method Based on Behavioral Knowledge Grap...
收藏 引用
2022 International Conference on Electronic Information engineering and Computer Science, EIECS 2022
作者: Xu, Lianqiu Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in... 详细信息
来源: 评论
An Intrusion Detection Feature Selection Method Based on Improved Mutual Information  6
An Intrusion Detection Feature Selection Method Based on Imp...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Qi, Zan Fei, Jinlong Wang, Jue Li, Xue State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u... 详细信息
来源: 评论
ALEmu: A Framework for Application-layer Programs Emulation of Embedded Devices  4
ALEmu: A Framework for Application-layer Programs Emulation ...
收藏 引用
4th International Conference on Computer engineering and Application, ICCEA 2023
作者: He, Heng Xiong, Xiaobing Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ... 详细信息
来源: 评论