咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,018 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 103 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 77 篇 网络空间安全
    • 76 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 53 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,487 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1584 条 记 录,以下是101-110 订阅
排序:
A Vulnerability Automation Exploitation Method Based on Symbolic Execution
A Vulnerability Automation Exploitation Method Based on Symb...
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information service room Unit 32738 China
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln... 详细信息
来源: 评论
A Survey of Automatic Exploitation of Binary Vulnerabilities
A Survey of Automatic Exploitation of Binary Vulnerabilities
收藏 引用
2023 International Conference on Computer Network Security and Software engineering, CNSSE 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini... 详细信息
来源: 评论
IoT Device Multi-Classification Using Traffic Behavior Analysis  3
IoT Device Multi-Classification Using Traffic Behavior Analy...
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Shi, Jiaqi Liu, Tieming Zhang, Yuanyuan Ren, Huajuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The management of Internet of Things (IoT) devices is becoming increasingly complex. One of the reasons is that IoT device manufacturers are different, and there are different degrees of heterogeneity in service, tech... 详细信息
来源: 评论
Triangle Matters! TopDyG: Topology-aware Transformer for Link Prediction on Dynamic Graphs  25
Triangle Matters! TopDyG: Topology-aware Transformer for Lin...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Zhang, Xin Cai, Fei Zheng, Jianming Pan, Zhiqiang Chen, Wanyu Chen, Honghui Chen, Chonghao National Key Laboratory of Information Systems Engineering National University of Defense Technology Changsha China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China College of Electronic Countermeasures National University of Defense Technology Hefei China
Dynamic graph link prediction is widely utilized in the complex web of the real world, such as social networks, citation networks, recommendation systems, etc. Recent Transformer-based link prediction methods on dynam... 详细信息
来源: 评论
Meta Transductive Linear Probing for Few-Shot Node Classification
Meta Transductive Linear Probing for Few-Shot Node Classific...
收藏 引用
Pattern Recognition and Machine Learning (PRML), IEEE International Conference on
作者: Mingjing Lan Ningbo Huang Gang Zhou Yi Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Graph few-shot learning aims to predict well by training with very few labeled data. Meta learning has been the most popular solution for few-shot learning problem. However, transductive linear probing shows that fine... 详细信息
来源: 评论
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 657-671页
作者: Hao WANG Jinwei WANG Xuelong HU Bingtao HU Qilin YIN Xiangyang LUO Bin MA Jinsheng SUN Department of Automation Nanjing University of Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Department of Computer and Software Nanjing University of Information Science and Technology School of Management Nanjing University of Posts and Telecommunications Department of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University State Key Laboratory of Mathematical Engineering and Advanced Computing Qilu University of Technology
Detection of color images that have undergone double compression is a critical aspect of digital image *** the existence of various methods capable of detecting double Joint Photographic Experts Group(JPEG) compressio... 详细信息
来源: 评论
A GAN-based Method for Generating SQL Injection Attack Samples  10
A GAN-based Method for Generating SQL Injection Attack Sampl...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Lu, Dongzhe Fei, Jinlong Liu, Long Li, Zecun Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Due to the simplicity of implementation and high threat level, SQL injection attacks are one of the oldest, most prevalent, and most destructive types of security attacks on Web-based information systems. With the con... 详细信息
来源: 评论
An algorithm/hardware co-optimized method to accelerate CNNs with compressed convolutional weights on FPGA
An algorithm/hardware co-optimized method to accelerate CNNs...
收藏 引用
作者: Shang, Jiangwei Zhang, Zhan Zhang, Kun Li, Chuanyou Qian, Lei Liu, Hongwei School of Computer Science and Technology Harbin Institute of Technology Harbin China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China School of Computer Science and Engineering Southeast University Nanjing China
Convolutional neural networks (CNNs) have shown remarkable advantages in a wide range of domains at the expense of huge parameters and computations. Modern CNNs still tend to be more complex and larger to achieve bett... 详细信息
来源: 评论
IBM Small-Scale Superconducting Quantum Computer Not Gate Error Test
IBM Small-Scale Superconducting Quantum Computer Not Gate Er...
收藏 引用
2021 International Conference on Electronic Communication, Computer Science and Technology, ECCST 2021
作者: He, Ming Liu, Xiaonan Wang, Junchao An, Jiale State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Henan Zhengzhou450001 China
Quantum NOT gates play an important role in the process of quantum information conversion. However, when the X-gate operation is executed on a real quantum computer, there is a large deviation between the actual opera... 详细信息
来源: 评论
Interest Points Analysis for Internet Forum Based on Long-Short Windows Similarity
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3247-3267页
作者: Xinghai Ju Jicang Lu Xiangyang Luo Gang Zhou Shiyu Wang Shunhang Li Yang Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China School of Computing and Information Systems Singapore Management University188065Singapore College of Computer Science and Big Data Fuzhou UniversityFuzhou350116China
For Internet forum Points of Interest(PoI),existing analysis methods are usually lack of usability analysis under different conditions and ignore the long-term variation,which lead to blindness in method *** address t... 详细信息
来源: 评论