咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 385 篇 期刊文献

馆藏范围

  • 1,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 security
  • 22 篇 deep learning
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 630 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,021 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1057 条 记 录,以下是691-700 订阅
排序:
PS-HOMO: A Protection Scheme for iOS SMS
收藏 引用
Journal of Physics: Conference Series 2020年 第2期1486卷
作者: Guomiao Zhou Qianqiong Wu Ming Duan Qi Xi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China Institute of Electrical Engineering and Automation Luoyang Institute of Science and Technology Luoyang Henan 471000 China
iOS Short Message Service (SMS) transmits messages in plaintext, which would lead to potential security threats of data. It is meaningful to design a safe and effective SMS. In this paper, all iOS Security Guides are ...
来源: 评论
Improved Impossible Polytopic Attacks on Round-reduced DES
收藏 引用
Journal of Physics: Conference Series 2020年 第3期1486卷
作者: Jing Wang Qianqiong Wu Chaohui Fu Guomiao Zhou Ming Duan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China College of electrical engineering and automation Luoyang Institute of Science and Technology Luoyang Henan 471000 China
In Eurocrypt 2016, Tyge Tiessen introduced the d-difference which considering the differences between multiple plaintexts, and proposed the impossible polytopic attack on block cipher which effectively reducing the da...
来源: 评论
Integrating a weighted-average method into the random walk framework to generate individual friend recommendations
收藏 引用
Science China(Information Sciences) 2017年 第11期60卷 43-64页
作者: Jibing GONG Xiaoxia GAO Hong CHENG Jihui LIU Yanqing SONG Mantang ZHANG Yi ZHAO School of Information Science and Engineering Yanshan University The Key Lab for Computer Virtual Technology and System Integration Yanshan University State Key Lab of Mathematical Engineering and Advanced Computing Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong
Friend recommendation is a fundamental service in both social networks and practical applications,and is influenced by user behaviors such as interactions, interests, and activities. In this study, we first conduct in... 详细信息
来源: 评论
Universally composable anonymous password authenticated key exchange
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 153-168页
作者: Xuexian HU Jiang ZHANG Zhenfeng ZHANG Jing XU Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Science and Technology on Information Assurance Laboratory State Key Laboratory of Cryptology
Anonymous password authenticated key exchange(APAKE) is an important cryptographic primitive, through which a client holding a password can establish a session key with a server both authentically and anonymously. Alt... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1437卷
作者: Shoupu Lu Qingbao Li Xinbing Zhu State Key laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Province 450001 China Henan University of Economics and Law Zhengzhou Henan Province 450000 China
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac...
来源: 评论
Binary neural networks: A survey
arXiv
收藏 引用
arXiv 2020年
作者: Qin, Haotong Gong, Ruihao Liu, Xianglong Bai, Xiao Song, Jingkuan Sebe, Nicu State Key Lab of Software Development Environment Beihang University Beijing China Beijing Advanced Innovation Center for Big Data-Based Precision Medicine Beihang University Beijing China Center for Future Media School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Department of Information Engineering and Computer Science University of Trento Trento Italy School of Computer Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Jiangxi Research Institute Beihang University Beijing China
The binary neural network, largely saving the storage and computation, serves as a promising technique for deploying deep models on resource-limited devices. However, the binarization inevitably causes severe informat... 详细信息
来源: 评论
A loop unrolling method based on machine learning  32
A loop unrolling method based on machine learning
收藏 引用
32nd International Conference on Vibroengineering
作者: Liu, Hui Guo, Zhanjie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Computer and Information Engineering Henan Normal University Xinxiang453007 China Department of Electrical and Electronic Engineering Zhengzhou Technical College Zhengzhou450121 China
In order to improve the accuracy of loop unrolling factor in the compiler, we propose a loop unrolling method based on improved random decision forest. First, we improve the traditional random decision forest through ... 详细信息
来源: 评论
Higher-order nodal points in two dimensions
arXiv
收藏 引用
arXiv 2021年
作者: Wu, Weikang Liu, Ying Yu, Zhi-Ming Zhao, Y.X. Gao, Weibo Yang, Shengyuan A. Research Laboratory for Quantum Materials Singapore University of Technology and Design Singapore487372 Singapore Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University Singapore637371 Singapore School of Materials Science and Engineering Hebei University of Technology Tianjin300130 China Beijing Key Lab of Nanophotonics & Ultrafine Optoelectronic Systems School of Physics Beijing Institute of Technology Beijing100081 China National Laboratory of Solid State Microstructures Department of Physics Nanjing University Nanjing210093 China Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing210093 China
A two-dimensional (2D) topological semimetal is characterized by the nodal points in its low-energy band structure. While the linear nodal points have been extensively studied, especially in the context of graphene, t... 详细信息
来源: 评论
Discovery of a maximally charged Weyl point
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Qiaolu Chen, Fujia Yan, Qinghui Zhang, Li Gao, Zhen Yang, Shengyuan A. Yu, Zhi-Ming Chen, Hongsheng Zhang, Baile Yang, Yihao Interdisciplinary Center for Quantum Information State Key Laboratory of Modern Optical Instrumentation ZJU-Hangzhou Global Scientific and Technological Innovation Center Zhejiang University Hangzhou310027 China International Joint Innovation Center Key Lab. of Advanced Micro Nano Electronic Devices & Smart Systems of Zhejiang The Electromagnetics Academy Zhejiang University Zhejiang University Haining314400 China Jinhua Institute of Zhejiang University Zhejiang University Jinhua321099 China Department of Electrical and Electronic Engineering Southern University of Science and Technology Shenzhen518055 China Research Laboratory for Quantum Materials Singapore University of Technology and Design 487372 Singapore School of Physics Beijing Institute of Technology Beijing100081 China Beijing Key Laboratory of Nanophotonics and Ultrafine Optoelectronic Systems School of Physics Beijing Institute of Technology Beijing100081 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link 637371 Singapore Centre for Disruptive Photonic Technologies The Photonics Institute Nanyang Technological University 50 Nanyang Avenue 639798 Singapore
The hypothetical Weyl particles in high-energy physics have been discovered in three-dimensional crystals as collective quasiparticle excitations near two-fold degenerate Weyl points1-5. Such momentum-space Weyl parti... 详细信息
来源: 评论
Power-Aware Data Management Based on Hybrid RAM-NVM Memory for Smart Bracelet
收藏 引用
Journal of Electronic Science and Technology 2017年 第4期15卷 385-390页
作者: Jin-Yu Zhan Jun-Huan Yang Wei Jiang Yi-Xin Li Yi-Ming Zhang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi 214000China
Wearable devices become popular because they can help people observe health *** battery life is the critical problem for wearable devices. The non-volatile memory(NVM) attracts attention in recent years because of its... 详细信息
来源: 评论