咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是631-640 订阅
排序:
Upper security bounds for coherent-one-way quantum key distribution
arXiv
收藏 引用
arXiv 2020年
作者: González-Payo, Javier Trényi, Róbert Wang, Weilong Curty, Marcos Escuela de Ingeniería de Telecomunicación Department of Signal Theory and Communications University of Vigo VigoE-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology ZhengzhouHenan450001 China
The performance of quantum key distribution (QKD) is severely limited by multi-photon pulses emitted by laser sources due to the photon-number splitting attack. Coherent-one-way (COW) QKD has been introduced as a prom... 详细信息
来源: 评论
Demonstration of broadband topological slow light
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Fujia Xue, Haoran Pan, Yuang Wang, Maoren Hu, Yuanhang Zhang, Li Chen, Qiaolu Han, Song Liu, Gui-Geng Gao, Zhen Zhou, Peiheng Yin, Wenyan Chen, Hongsheng Zhang, Baile Yang, Yihao Interdisciplinary Center for Quantum Information State Key Lab. of Modern Optical Instrumentation College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Science and Technology Innovation Center Key Lab. of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang ZJU-UIUC Institute Zhejiang University Hangzhou310027 China Jinhua Institute of Zhejiang University Zhejiang University Jinhua321099 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link Singapore637371 Singapore Centre for Disruptive Photonic Technologies The Photonics Institute Nanyang Technological University 50 Nanyang Avenue Singapore639798 Singapore National Engineering Research Center of Electromagnetic Radiation Control Materials State Key Laboratory of Electronic Thin Film and Integrated Devices University of Electronic Science and Technology of China Chengdu610054 China Department of Electrical and Electronic Engineering Southern University of Science and Technology Shenzhen518055 China
Slow-light devices are able to significantly enhance light-matter interaction due to the reduced group velocity of light, but a very low group velocity is usually achieved in a narrow bandwidth, accompanied by extreme... 详细信息
来源: 评论
DPA-2: a large atomic model as a multi-task learner
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Duo Liu, Xinzijian Zhang, Xiangyu Zhang, Chengqian Cai, Chun Bi, Hangrui Du, Yiming Qin, Xuejian Peng, Anyang Huang, Jiameng Li, Bowen Shan, Yifan Zeng, Jinzhe Zhang, Yuzhi Liu, Siyuan Li, Yifan Chang, Junhan Wang, Xinyan Zhou, Shuo Liu, Jianchuan Luo, Xiaoshan Wang, Zhenyu Jiang, Wanrun Wu, Jing Yang, Yudi Yang, Jiyuan Yang, Manyi Gong, Fu-Qiang Zhang, Linshuang Shi, Mengchao Dai, Fu-Zhi York, Darrin M. Liu, Shi Zhu, Tong Zhong, Zhicheng Lv, Jian Cheng, Jun Jia, Weile Chen, Mohan Ke, Guolin Weinan, E. Zhang, Linfeng Wang, Han AI for Science Institute Beijing100080 China DP Technology Beijing100080 China Academy for Advanced Interdisciplinary Studies Peking University Beijing100871 China State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences Beijing100871 China University of Chinese Academy of Sciences Beijing100871 China HEDPS CAPT College of Engineering Peking University Beijing100871 China Ningbo Institute of Materials Technology and Engineering Chinese Academy of Sciences Ningbo315201 China CAS Key Laboratory of Magnetic Materials and Devices Zhejiang Province Key Laboratory of Magnetic Materials and Application Technology Chinese Academy of Sciences Ningbo315201 China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Shanghai Engineering Research Center of Molecular Therapeutics & New Drug Development School of Chemistry and Molecular Engineering East China Normal University Shanghai200062 China Laboratory for Biomolecular Simulation Research Institute for Quantitative Biomedicine Department of Chemistry and Chemical Biology Rutgers University PiscatawayNJ08854 United States Department of Chemistry Princeton University PrincetonNJ08540 United States College of Chemistry and Molecular Engineering Peking University Beijing100871 China Yuanpei College Peking University Beijing100871 China School of Electrical Engineering and Electronic Information Xihua University Chengdu610039 China State Key Laboratory of Superhard Materials College of Physics Jilin University Changchun130012 China Key Laboratory of Material Simulation Methods & Software of Ministry of Education College of Physics Jilin University Changchun130012 China International Center of Future Science Jilin University Changchun130012 China Key Laboratory for Quantum Materials of Zhejiang Province Department of Physics School of Science Westlake University Zhejiang Hangzhou310030 China Atomistic Simulations Italia
The rapid advancements in artificial intelligence (AI) are catalyzing transformative changes in atomic modeling, simulation, and design. AI-driven potential energy models have demonstrated the capability to conduct la... 详细信息
来源: 评论
A Non-Stop Double Buffering Mechanism for Dataflow Architecture
收藏 引用
Journal of Computer Science & Technology 2018年 第1期33卷 145-157页
作者: Xu Tan Xiao-Wei Shen Xiao-Chun Ye Da Wang Dong-Rui Fan Lunkai Zhang Wen-Ming Li Zhi-Min Zhang Zhi-Min Tang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125 China Department of Computer Science The University of Chicago Chicago IL 60637 U.S.A.
Double buffering is an effective mechanism to hide the latency of data transfers between on-chip and off-chip memory. However, in dataflow architecture, the swapping of two buffers during the execution of many tiles d... 详细信息
来源: 评论
Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling  5th
Mobile APP User Attribute Prediction by Heterogeneous Inform...
收藏 引用
5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2019
作者: Zhang, Hekai Gong, Jibing Teng, Zhiyong Wang, Dan Wang, Hongfei Du, Linfeng Bhuiyan, Zakirul Alam School of Information Science and Engineering Yanshan University Qinhuangdao066004 China The Key Lab for Computer Virtual Technology and System Integration Yanshan University Qinhuangdao066004 China School of Computer Science and Engineering Beihang University Beijing100191 China Shenyuan Honors College Beihang University Beijing100191 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214000 China Department of Computer and Information Sciences Fordham University New York United States
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv... 详细信息
来源: 评论
REDT: Remote exploitation detection technology for network infrastructure
收藏 引用
IOP Conference Series: Materials Science and engineering 2020年 第1期715卷
作者: Xiaokang Yin Shengli Liu Fangfang Jia Da Xiao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou CO 450000 China
An attacker exploits a remote vulnerability to execute arbitrary code on network infrastructure. It seriously threatens the security of network infrastructure. To detect the exploitation attack in a timely and effecti...
来源: 评论
The Propagation Strategy Model of Taint Analysis
收藏 引用
Journal of Physics: Conference Series 2020年 第4期1486卷
作者: Yuzhu Ren Jiangtao Zhao Cao Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
来源: 评论
A new network intrusion detection system based on blockchain
收藏 引用
International Journal of Performability engineering 2019年 第12期15卷 3187-3195页
作者: Fu, Jinhua Xu, Mixue Huang, Yongzhong Tao, Hongwei State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou450002 China
With the increasing application of computers and networks, several network security problems have emerged, and thus network intrusion detection systems have become the focus of network security research. In order to a... 详细信息
来源: 评论
Spiral Field Generation in Smith-Purcell Radiation by Helical Metagratings
收藏 引用
Research 2019年 第1期2019卷 1115-1122页
作者: Liqiao Jing Zuojia Wang Xiao Lin Bin Zheng Su Xu Lian Shen Yihao Yang Fei Gao Min Chen Hongsheng Chen Key Lab.of Advanced Micro/Nano Electronic Devices&Smart Systems of Zhejiang College of Information Science and Electronic EngineeringZhejiang UniversityHangzhou 310027China Department of Physics Massachusetts Institute of TechnologyCambridgeMA 02139USA School of Information Science and Engineering Shandong UniversityQingdao 266237China Division of Physics and Applied Physics School of Physical and Mathematical SciencesNanyang Technological UniversitySingapore State Key Laboratory of Integrated Optoelectronics College of Electronic Science and EngineeringJilin UniversityChangchun 130012China
Moving electrons interacting with media can give rise to electromagnetic radiations and has been emerged as a promising platform for particle detection,spectroscopies,and free-electron *** this letter,we investigate t... 详细信息
来源: 评论
Measurement-Device-Independent Quantum key Distribution with Leaky Sources
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Weilong Tamaki, Kiyoshi Curty, Marcos EI Telecomunicación Department of Signal Theory and Communications University of Vigo VigoE-36310 Spain State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China Henan Key Laboratory of Network Cryptography Technology ZhengzhouHenan450001 China Faculty of engineering University of Toyama Gofuku 3190 Toyama930-8555 Japan
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the source... 详细信息
来源: 评论