咨询与建议

限定检索结果

文献类型

  • 2,058 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,203 篇 工学
    • 1,189 篇 计算机科学与技术...
    • 980 篇 软件工程
    • 321 篇 信息与通信工程
    • 297 篇 电子科学与技术(可...
    • 296 篇 电气工程
    • 257 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 187 篇 材料科学与工程(可...
    • 166 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 74 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,741 篇 理学
    • 843 篇 物理学
    • 769 篇 数学
    • 243 篇 生物学
    • 235 篇 统计学(可授理学、...
    • 222 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 387 篇 管理学
    • 240 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 619 篇 state key labora...
  • 174 篇 school of comput...
  • 128 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 school of physic...
  • 74 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,916 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3352 条 记 录,以下是371-380 订阅
排序:
A Formal Verification Method for Security Protocol Implementations Based on Model Learning and Tamarin  6
A Formal Verification Method for Security Protocol Implement...
收藏 引用
2021 6th International Symposium on Advances in Electrical, Electronics and Computer engineering, ISAEECE 2021
作者: Zhang, Xieli Zhu, Yuefei Gu, Chunxiang Miao, Xuyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan450002 China
The verification of security protocol implementations is notoriously difficult and important. In this paper, combining with the model learning using Tamarin, a formal verification tool of protocol specification, a for... 详细信息
来源: 评论
Versatility of π-d Conjugated Coordination Nickel Metal-Organic Frameworks as Electrode Materials of Metal-Ion Batteries
收藏 引用
Energy Material Advances 2024年 第1期5卷 120-132页
作者: Zaohong Zhang Kaihui Xu Jing Yang Zhuoyu Ji Yunchen Ge Zhicong Shi Yongwei Zhang Kai Zhang Chuan Wu Jia Hong Pan State Key Laboratory of Featured Metal Materials and Life-Cycle Safety for Composite Structures School of ResourcesEnvironments and MaterialsGuangxi UniversityNanning 530004China Low Carbon Energy Process Intensification Research Institute and MOE Key Laboratory of Resources and Environmental Systems Optimization North China Electric Power UniversityBeijing 102206China Institute of High Performance Computing Agency for ScienceTechnology and Research(A*STAR)Singapore 138632Singapore Guangxi Key Laboratory of Manufacturing Systems and Advanced Manufacturing Technology Guilin University of Electronic TechnologyGuilin 541004China School of Materials Science and Engineering Beijing Institute of TechnologyBeijing 100081China Beijing Key Laboratory of Environmental Science and Engineering School of Materials Science and EngineeringBeijing Institute of TechnologyBeijing 100081China Yangtze Delta Region Academy of Beijing Institute of Technology Jiaxing 314019China
Metal-organic frameworks have emerged as promising electrode materials for metal-ion batteries due to their superior structural ***,they face challenges such as poor reversibility and easy degradation during electroch... 详细信息
来源: 评论
Medical image registration and its application in retinal images:a review
收藏 引用
Visual computing for Industry,Biomedicine,and Art 2024年 第1期7卷 142-164页
作者: Qiushi Nie Xiaoqing Zhang Yan Hu Mingdao Gong Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Center for High Performance Computing and Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Singapore Eye Research Institute Singapore 169856Singapore State Key Laboratory of Ophthalmology Optometry and Visual ScienceEye HospitalWenzhou Medical UniversityWenzhou 325027China
Medical image registration is vital for disease diagnosis and treatment with its ability to merge diverse informa-tion of images,which may be captured under different times,angles,or *** several surveys have reviewed ... 详细信息
来源: 评论
nnTaint: An Optimized Dynamic Taint Analysis Method Based on Neural Network
nnTaint: An Optimized Dynamic Taint Analysis Method Based on...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Yuming Zhu Weiyu Dong Cyber Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction ... 详细信息
来源: 评论
A Survey on Event Tracking in Social Media Data Streams
收藏 引用
Big Data Mining and Analytics 2024年 第1期7卷 217-243页
作者: Zixuan Han Leilei Shi Lu Liu Liang Jiang Jiawei Fang Fanyuan Lin Jinjuan Zhang John Panneerselvam Nick Antonopoulos School of Computer Science and Communication Engineering and Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu UniversityZhenjiang 212013China School of Computing and Mathematical Sciences University of LeicesterLeicesterLE17RHUK Ocean College Jiangsu University of Science and TechnologyZhenjiang 212100China University Executive Office Edinburgh Napier UniversityEdinburghEH114BNUK
Social networks are inevitable parts of our daily life,where an unprecedented amount of complex data corresponding to a diverse range of applications are *** such,it is imperative to conduct research on social events ... 详细信息
来源: 评论
Distributed Truss Computation in Dynamic Graphs
收藏 引用
Tsinghua Science and Technology 2023年 第5期28卷 873-887页
作者: Ziwei Mo Qi Luo Dongxiao Yu Hao Sheng Jiguo Yu Xiuzhen Cheng School of Computer Science and Technology Shandong UniversityQingdao 266200China State Key Laboratory of Software Development Environment School of Computer Science and Engineering and the Beijing Advanced Innovation Center for Big Data and Brain ComputingBeihang UniversityBeijing 100191China Big Data Institute Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China
Large-scale graphs usually exhibit global sparsity with local cohesiveness,and mining the representative cohesive subgraphs is a fundamental problem in graph *** k-truss is one of the most commonly studied cohesive su... 详细信息
来源: 评论
CinfoFuzz: Fuzzing Method Based on Web Service Correlation Information of Embedded Devices
CinfoFuzz: Fuzzing Method Based on Web Service Correlation I...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Qi Feng Weiyu Dong Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop... 详细信息
来源: 评论
Thermally Evaporated ZnSe for Efficient and Stable Regular/Inverted Perovskite Solar Cells by Enhanced Electron Extraction
收藏 引用
Energy & Environmental Materials 2023年 第5期6卷 440-448页
作者: Xin Li Guibin Shen Xin Ren Ng Zhiyong Liu Yun Meng Yongwei Zhang Cheng Mu Zhi Gen Yu Fen Lin Solar Energy Research Institute of Singapore(SERIS) National University of SingaporeSingapore 117574Singapore Key Laboratory of Advanced Light Conversion Materials and Biophotonics Department of ChemistryRenmin University of ChinaBeijing 100872China State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Materials Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore Shandong Provincial Engineering and Technical Center of Light Manipulation and Shandong Provincial Key Laboratory of Optics and Photonic Devices School of Physics and ElectronicsShandong Normal UniversityJinan 250014China Institute of High Performance Computing A^(*)STARSingapore 138632Singapore
Electron transport layers(ETLs)are crucial for achieving efficient and stable planar perovskite solar cells(PSCs).Reports on versatile inorganic ETLs using a simple film fabrication method and applicability for both l... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Ma, Zhaorui Zhang, Shicheng Chang, Yiheng Zhou, Qinglei Hu, Xinhao Li, Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450052 China Zhengzhou University of Light Industry Zhengzhou450002 China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
A review of cryptographic algorithm recognition technology for binary code
A review of cryptographic algorithm recognition technology f...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Zhao, Chenxia Kang, Fei Yang, Ju Shu, Hui Zhengzhou University Zhengzhou Henan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo... 详细信息
来源: 评论