咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 878 篇 会议
  • 3 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 691 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 174 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 核科学与技术
    • 34 篇 冶金工程
  • 1,003 篇 理学
    • 548 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 118 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 616 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 93 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 64 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 51 篇 其他
  • 45 篇 中文
检索条件"机构=The State Key Laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是251-260 订阅
排序:
Deity: Finding Deep Rooted Bugs in JavaScript Engines  19
Deity: Finding Deep Rooted Bugs in JavaScript Engines
收藏 引用
19th IEEE International Conference on Communication Technology, ICCT 2019
作者: Lin, Hongyang Zhu, Junhu Peng, Jianshan Zhu, DIxia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450002 China
Fuzzing [1] is a well-known technique which was employed to provide unexpected or random data as input to JavaScript engines in hopes of finding a security vulnerability. For effective fuzzing, the input must be both ... 详细信息
来源: 评论
Research on IoT malware based on the ATT&CK model  11
Research on IoT malware based on the ATT&CK model
收藏 引用
2021 11th International Workshop on Computer Science and engineering, WCSE 2021
作者: Hao, Bo Kang, Fei Yang, Ju Xiong, Xiaobing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
The security of the IoT has become a hot research area in cyberspace security, among which the malware is a major threat. Based on the ATT&CK model, this paper studies the composition and behavior of IoT malware, ... 详细信息
来源: 评论
MalCommunity: A graph-based evaluation model for malware family clustering  4th
MalCommunity: A graph-based evaluation model for malware fam...
收藏 引用
4th International Conference of Pioneer Computer Scientists, Engineers and Educators, ICPCSEE 2018
作者: Chen, Yihang Liu, Fudong Shan, Zheng Liang, Guanghui State Key of Laboratory of Mathematical Engineering and Advanced Computing ZhengzhouHenan450001 China
Malware clustering analysis plays an important role in large-scale malware homology analysis. However, the generation approach of the ground truth data is usually ignored. The Labels from Anti-virus(AV) engines are mo... 详细信息
来源: 评论
Rotation Model Enhancement for Adversarial Attack
Rotation Model Enhancement for Adversarial Attack
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Li, Zheming Liu, Hao Yang, Bo Li, Chenwei Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  6
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Li, Chenwei Li, Zheming Yang, Bo Zhang, Hengwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论
A Note on Rotation Symmetric S-boxes
收藏 引用
Journal of Systems Science & Complexity 2019年 第5期32卷 1460-1472页
作者: GAO Guangpu LIN Dongdai LIU Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China Guangxi Key Laboratory of Cryptogpraphy and Information Security Guilin University of Electronic TechnologyGuilin 541004China
This paper is twofold. The first is devoted to study a class of quadratic rotation symmetric S-boxes(RSSBs) which was presented by Gao G, et al., Constructions of quadratic and cubic rotation symmetric bent functions,... 详细信息
来源: 评论
Traceability Method of Network Attack Based on Evolutionary Game
Traceability Method of Network Attack Based on Evolutionary ...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Zhang, Xiaoning Sun, Pengyu Liu, Xiaohu Ma, Junqiang Zhang, Yuchen State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz... 详细信息
来源: 评论
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
收藏 引用
China Communications 2021年 第8期18卷 85-95页
作者: Bingzheng Li Zheng Zhang Xiaomei Wang Sheng Qu Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and... 详细信息
来源: 评论
Solve the False-Positive Problem of the Mimic System Based on the Best Mimic Component Set
收藏 引用
China Communications 2022年 第5期19卷 253-266页
作者: Yuwen Shao Zheng Zhang Xiaomei Wang Chuanxing Pan Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot... 详细信息
来源: 评论
DEAM: Decoupled, Expressive, Area-Efficient Metadata Cache
收藏 引用
Journal of Computer Science & Technology 2014年 第4期29卷 679-691页
作者: 刘鹏 方磊 黄巍 CCF IEEE Department of Information Science and Electronic Engineering Zhejiang University State Key Laboratory of Mathematical Engineering and Advanced Computing ACM Department of Electrical and Computer Engineering University of Rochester NY 14627-0231 U.S.A.
Chip multiprocessor presents brand new opportunities for holistic on-chip data and coherence management solutions. An intelligent protocol should be adaptive to the fine-grain accessing behavior. And in terms of stora... 详细信息
来源: 评论