咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 384 篇 期刊文献

馆藏范围

  • 1,056 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 521 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 23 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 29 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,020 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1056 条 记 录,以下是631-640 订阅
排序:
DPA-2: a large atomic model as a multi-task learner
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Duo Liu, Xinzijian Zhang, Xiangyu Zhang, Chengqian Cai, Chun Bi, Hangrui Du, Yiming Qin, Xuejian Peng, Anyang Huang, Jiameng Li, Bowen Shan, Yifan Zeng, Jinzhe Zhang, Yuzhi Liu, Siyuan Li, Yifan Chang, Junhan Wang, Xinyan Zhou, Shuo Liu, Jianchuan Luo, Xiaoshan Wang, Zhenyu Jiang, Wanrun Wu, Jing Yang, Yudi Yang, Jiyuan Yang, Manyi Gong, Fu-Qiang Zhang, Linshuang Shi, Mengchao Dai, Fu-Zhi York, Darrin M. Liu, Shi Zhu, Tong Zhong, Zhicheng Lv, Jian Cheng, Jun Jia, Weile Chen, Mohan Ke, Guolin Weinan, E. Zhang, Linfeng Wang, Han AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences Beijing100871 China University of Chinese Academy of Sciences Beijing100871 China HEDPS CAPT College of Engineering Peking University Beijing100871 China Ningbo Institute of Materials Technology and Engineering Chinese Academy of Sciences Ningbo315201 China CAS Key Laboratory of Magnetic Materials and Devices Zhejiang Province Key Laboratory of Magnetic Materials and Application Technology Chinese Academy of Sciences Ningbo315201 China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Shanghai Engineering Research Center of Molecular Therapeutics & New Drug Development School of Chemistry and Molecular Engineering East China Normal University Shanghai200062 China Laboratory for Biomolecular Simulation Research Institute for Quantitative Biomedicine Department of Chemistry and Chemical Biology Rutgers University PiscatawayNJ08854 United States Department of Chemistry Princeton University PrincetonNJ08540 United States College of Chemistry and Molecular Engineering Peking University Beijing100871 China Yuanpei College Peking University Beijing100871 China School of Electrical Engineering and Electronic Information Xihua University Chengdu610039 China State Key Laboratory of Superhard Materials College of Physics Jilin University Changchun130012 China Key Laboratory of Material Simulation Methods & Software of Ministry of Education College of Physics Jilin University Changchun130012 China International Center of Future Science Jilin University Changchun130012 China Key Laboratory for Quantum Materials of Zhejiang Province Department of Physics School of Science Westlake University Zhejiang Hangzhou310030 China Atomistic Simulations Italia
The rapid advancements in artificial intelligence (AI) are catalyzing transformative changes in atomic modeling, simulation, and design. AI-driven potential energy models have demonstrated the capability to conduct la... 详细信息
来源: 评论
A Non-Stop Double Buffering Mechanism for Dataflow Architecture
收藏 引用
Journal of Computer Science & Technology 2018年 第1期33卷 145-157页
作者: Xu Tan Xiao-Wei Shen Xiao-Chun Ye Da Wang Dong-Rui Fan Lunkai Zhang Wen-Ming Li Zhi-Min Zhang Zhi-Min Tang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China Department of Computer Science The University of Chicago Chicago IL 60637 U.S.A.
Double buffering is an effective mechanism to hide the latency of data transfers between on-chip and off-chip memory. However, in dataflow architecture, the swapping of two buffers during the execution of many tiles d... 详细信息
来源: 评论
Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling  5th
Mobile APP User Attribute Prediction by Heterogeneous Inform...
收藏 引用
5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2019
作者: Zhang, Hekai Gong, Jibing Teng, Zhiyong Wang, Dan Wang, Hongfei Du, Linfeng Bhuiyan, Zakirul Alam School of Information Science and Engineering Yanshan University Qinhuangdao066004 China The Key Lab for Computer Virtual Technology and System Integration Yanshan University Qinhuangdao066004 China School of Computer Science and Engineering Beihang University Beijing100191 China Shenyuan Honors College Beihang University Beijing100191 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214000 China Department of Computer and Information Sciences Fordham University New York United States
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv... 详细信息
来源: 评论
REDT: Remote exploitation detection technology for network infrastructure
收藏 引用
IOP Conference Series: Materials Science and engineering 2020年 第1期715卷
作者: Xiaokang Yin Shengli Liu Fangfang Jia Da Xiao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou CO 450000 China
An attacker exploits a remote vulnerability to execute arbitrary code on network infrastructure. It seriously threatens the security of network infrastructure. To detect the exploitation attack in a timely and effecti...
来源: 评论
The Propagation Strategy Model of Taint Analysis
收藏 引用
Journal of Physics: Conference Series 2020年 第4期1486卷
作者: Yuzhu Ren Jiangtao Zhao Cao Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
来源: 评论
A new network intrusion detection system based on blockchain
收藏 引用
International Journal of Performability engineering 2019年 第12期15卷 3187-3195页
作者: Fu, Jinhua Xu, Mixue Huang, Yongzhong Tao, Hongwei State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou450002 China
With the increasing application of computers and networks, several network security problems have emerged, and thus network intrusion detection systems have become the focus of network security research. In order to a... 详细信息
来源: 评论
Spiral Field Generation in Smith-Purcell Radiation by Helical Metagratings
收藏 引用
Research 2019年 第1期2019卷 1115-1122页
作者: Liqiao Jing Zuojia Wang Xiao Lin Bin Zheng Su Xu Lian Shen Yihao Yang Fei Gao Min Chen Hongsheng Chen Key Lab.of Advanced Micro/Nano Electronic Devices&Smart Systems of Zhejiang College of Information Science and Electronic EngineeringZhejiang UniversityHangzhou 310027China Department of Physics Massachusetts Institute of TechnologyCambridgeMA 02139USA School of Information Science and Engineering Shandong UniversityQingdao 266237China Division of Physics and Applied Physics School of Physical and Mathematical SciencesNanyang Technological UniversitySingapore State Key Laboratory of Integrated Optoelectronics College of Electronic Science and EngineeringJilin UniversityChangchun 130012China
Moving electrons interacting with media can give rise to electromagnetic radiations and has been emerged as a promising platform for particle detection,spectroscopies,and free-electron *** this letter,we investigate t... 详细信息
来源: 评论
Measurement-Device-Independent Quantum key Distribution with Leaky Sources
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Weilong Tamaki, Kiyoshi Curty, Marcos EI Telecomunicación Department of Signal Theory and Communications University of Vigo VigoE-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology ZhengzhouHenan450001 China Faculty of engineering University of Toyama Gofuku 3190 Toyama930-8555 Japan
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the source... 详细信息
来源: 评论
DeePMD-kit v3: A Multiple-Backend Framework for Machine Learning Potentials
arXiv
收藏 引用
arXiv 2025年
作者: Zeng, Jinzhe Zhang, Duo Peng, Anyang Zhang, Xiangyu He, Sensen Wang, Yan Liu, Xinzijian Bi, Hangrui Li, Yifan Cai, Chun Zhang, Chengqian Du, Yiming Zhu, Jia-Xin Mo, Pinghui Huang, Zhengtao Zeng, Qiyu Shi, Shaochen Qin, Xuejian Yu, Zhaoxi Luo, Chenxing Ding, Ye Liu, Yun-Pei Shi, Ruosong Wang, Zhenyu Bore, Sigbjørn Løland Chang, Junhan Deng, Zhe Ding, Zhaohan Han, Siyuan Jiang, Wanrun Ke, Guolin Liu, Zhaoqing Lu, Denghui Muraoka, Koki Oliaei, Hananeh Singh, Anurag Kumar Que, Haohui Xu, Weihong Xu, Zhangmancang Zhuang, Yong-Bin Dai, Jiayu Giese, Timothy J. Jia, Weile Xu, Ben York, Darrin M. Zhang, Linfeng Wang, Han School of Artificial Intelligence and Data Science Unversity of Science and Technology of China Hefei China AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences Beijing100871 China University of Chinese Academy of Sciences Beijing China Baidu Inc. Beijing China Department of Computer Science University of Toronto TorontoON Canada Department of Chemistry Princeton University PrincetonNJ08540 United States University of Chinese Academy of Sciences Beijing100871 China State Key Laboratory of Physical Chemistry of Solid Surfaces iChEM College of Chemistry and Chemical Engineering Xiamen University Xiamen361005 China College of Integrated Circuits Hunan University Changsha410082 China State Key Laboratory of Advanced Technology for Materials Synthesis and Processing Center for Smart Materials and Device Integration School of Material Science and Engineering Wuhan University of Technology Wuhan430070 China College of Science National University of Defense Technology Changsha410073 China Hunan Key Laboratory of Extreme Matter and Applications National University of Defense Technology Changsha410073 China ByteDance Research Beijing100098 China Ningbo Institute of Materials Technology and Engineering Chinese Academy of Sciences Ningbo315201 China College of Materials Science and Opto-Electronic Technology University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Theoretical and Computational Photochemistry of Ministry of Education College of Chemistry Beijing Normal University Beijing100875 China Department of Geosciences Princeton University PrincetonNJ08544 United States Department of Applied Physics and Applied Mathematics Columbia University New YorkNY10027 United States IKKEM Fujian Xiamen361005 China Graduate
In recent years, machine learning potentials (MLPs) have become indispensable tools in physics, chemistry, and materials science, driving the development of software packages for molecular dynamics (MD) simulations an... 详细信息
来源: 评论
Automatic Mining of Security-Sensitive Functions from Source Code
收藏 引用
Computers, Materials & Continua 2018年 第8期56卷 199-210页
作者: Lin Chen Chunfang Yang Fenlin Liu Daofu Gong Shichang Ding Zhengzhou Science and Technology Institute Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China University of Göttingen Goldschmidtstr.737077 GöttingenGermany
When dealing with the large-scale program,many automatic vulnerability mining techniques encounter such problems as path explosion,state explosion,and low *** of large-scale programs based on safety-sensitive function... 详细信息
来源: 评论