咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 878 篇 会议
  • 3 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 691 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 174 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 核科学与技术
    • 34 篇 冶金工程
  • 1,003 篇 理学
    • 548 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 118 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 616 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 93 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 64 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 51 篇 其他
  • 45 篇 中文
检索条件"机构=The State Key Laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是241-250 订阅
排序:
Defense strategy selection method for Stackelberg security game based on incomplete information  2019
Defense strategy selection method for Stackelberg security g...
收藏 引用
2019 International Conference on Artificial Intelligence and Computer Science, AICS 2019
作者: Ge, Xiaoyue Zhou, Tianyang Zang, Yichao State Key Laboratory of Mathematical Engineering and Advanced Computing Information and Engineering University Zhengzhou China
Network attack and defense confrontation is essentially a game process between unequal subjects on both sides of attack and defense. There are some defects in the prior hypothesis that the subject status of both sides... 详细信息
来源: 评论
Exploration and research of blended learning in the "principles of computer organization"  2
Exploration and research of blended learning in the "princip...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Hou, Yifan Wang, Wei Liu, Fudong Shan, Zheng Wang, Junchao Wang, Lixin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
The'Principles of Computer Organization' is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the 'Principles of Computer Organizati... 详细信息
来源: 评论
NOMANet: A Graph Neural Network Enabled Power Allocation Scheme for NOMA
arXiv
收藏 引用
arXiv 2025年
作者: Hou, Yipu Lu, Yang Chen, Wei Ai, Bo Niyato, Dusit Ding, Zhiguo State Key Laboratory of Advanced Rail Autonomous Operation China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China College of Computing and Data Science Nanyang Technological University 639798 Singapore Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates
This paper proposes a graph neural network (GNN) enabled power allocation scheme for non-orthogonal multiple access (NOMA) networks. In particular, a downlink scenario with one base station serving multiple users over... 详细信息
来源: 评论
A Network Deception Defense Mechanism Based on Virtual Topology Generation
A Network Deception Defense Mechanism Based on Virtual Topol...
收藏 引用
2023 International Conference on Intelligent Systems, Communications, and Computer Networks, ISCCN 2023
作者: Wang, Binghui Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
To address the problem that traditional network defense techniques are difficult to cope with scanning attacks launched by internal attackers, this paper proposes a Virtual Network Topology Deception Defense mechanism... 详细信息
来源: 评论
The Propagation Strategy Model of Taint Analysis  4
The Propagation Strategy Model of Taint Analysis
收藏 引用
2019 4th International Seminar on Computer Technology, Mechanical and Electrical engineering, ISCME 2019
作者: Ren, Yuzhu Zhao, Jiangtao Zhang, Cao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450000 China
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
来源: 评论
A Regional Network Topology Construction Algorithm Based on Sampling Measurement  5
A Regional Network Topology Construction Algorithm Based on ...
收藏 引用
2021 5th International Workshop on advanced Algorithms and Control engineering, IWAACE 2021
作者: Tao, Zhiyuan Liu, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ... 详细信息
来源: 评论
DRTaint: A Dynamic Taint Analysis Framework Supporting Correlation Analysis between Data Regions
DRTaint: A Dynamic Taint Analysis Framework Supporting Corre...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Yang, Pan Kang, Fei Zhao, Yuntian Shu, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Taint analysis is a common technology for software analysis, which is widely used in the region of information security. Aiming at the problem that the existing binary program dynamic taint analysis framework does not... 详细信息
来源: 评论
A survey of offensive security research on PLCs
A survey of offensive security research on PLCs
收藏 引用
2021 International Conference on Computer, Communication, Control, Automation and Robotics, CCCAR 2021
作者: Ma, Rongkuan Wei, Qiang Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS... 详细信息
来源: 评论
A software upgrade security analysis method based on program analysis
A software upgrade security analysis method based on program...
收藏 引用
2021 IEEE International Conference on Computer Science, Electronic Information engineering and Intelligent Control Technology, CEI 2021
作者: Lv, Xiaoshao Shu, Hui Kang, Fei Huang, Yuyao State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi... 详细信息
来源: 评论
Optimization of integrity measurement algorithm based on multi-thread pipeline paralleling  5
Optimization of integrity measurement algorithm based on mul...
收藏 引用
5th International Conference on Computer engineering and Networks, CENet 2015
作者: Wang, Yinhao Shan, Zheng Fan, Chao Xue, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450002 China
With the continuous development of trusted computing, the integrity measurement has gradually been practical;but the popularization and application of the existing measurement tools are still restricted by their own m... 详细信息
来源: 评论