咨询与建议

限定检索结果

文献类型

  • 672 篇 会议
  • 386 篇 期刊文献

馆藏范围

  • 1,058 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 712 篇 工学
    • 522 篇 计算机科学与技术...
    • 414 篇 软件工程
    • 116 篇 信息与通信工程
    • 74 篇 电子科学与技术(可...
    • 70 篇 网络空间安全
    • 62 篇 电气工程
    • 62 篇 生物工程
    • 61 篇 控制科学与工程
    • 34 篇 机械工程
    • 32 篇 光学工程
    • 32 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 19 篇 动力工程及工程热...
    • 18 篇 安全科学与工程
    • 14 篇 仪器科学与技术
    • 14 篇 冶金工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 力学(可授工学、理...
    • 13 篇 核科学与技术
  • 409 篇 理学
    • 198 篇 数学
    • 169 篇 物理学
    • 74 篇 生物学
    • 53 篇 统计学(可授理学、...
    • 40 篇 化学
    • 33 篇 系统科学
  • 156 篇 管理学
    • 94 篇 管理科学与工程(可...
    • 68 篇 图书情报与档案管...
    • 20 篇 工商管理
  • 28 篇 法学
    • 23 篇 社会学
  • 14 篇 军事学
    • 14 篇 军队指挥学
  • 13 篇 医学
  • 11 篇 经济学
  • 10 篇 农学
  • 6 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 28 篇 network security
  • 25 篇 feature extracti...
  • 23 篇 deep learning
  • 23 篇 security
  • 19 篇 machine learning
  • 19 篇 software
  • 18 篇 semantics
  • 18 篇 malware
  • 17 篇 cryptography
  • 15 篇 training
  • 14 篇 network topology
  • 14 篇 computational mo...
  • 13 篇 data models
  • 12 篇 optimization
  • 12 篇 data mining
  • 12 篇 algorithm design...
  • 12 篇 topology
  • 11 篇 gravitational wa...
  • 11 篇 heuristic algori...
  • 10 篇 conferences

机构

  • 631 篇 state key labora...
  • 39 篇 state key labora...
  • 24 篇 state key lab of...
  • 18 篇 information engi...
  • 17 篇 department of as...
  • 16 篇 advanced technol...
  • 16 篇 kamioka branch n...
  • 16 篇 institute for pl...
  • 16 篇 university of so...
  • 16 篇 department of ph...
  • 16 篇 department of ph...
  • 16 篇 accelerator labo...
  • 16 篇 faculty of infor...
  • 15 篇 infn sezione di ...
  • 15 篇 national tsing h...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 department of ph...
  • 15 篇 scuola di ingegn...
  • 15 篇 king’s college l...

作者

  • 44 篇 luo xiangyang
  • 30 篇 xiangyang luo
  • 25 篇 shan zheng
  • 19 篇 zheng shan
  • 18 篇 fenlin liu
  • 17 篇 yue zhao
  • 17 篇 pang jianmin
  • 17 篇 jianmin pang
  • 17 篇 liu fudong
  • 16 篇 r. takahashi
  • 16 篇 k. komori
  • 16 篇 t. kajita
  • 16 篇 s. eguchi
  • 16 篇 t. sawada
  • 16 篇 l.-w. luo
  • 16 篇 c. kim
  • 16 篇 t. akutsu
  • 16 篇 h. tagoshi
  • 16 篇 liu fenlin
  • 15 篇 j. c. bayley

语言

  • 1,022 篇 英文
  • 21 篇 中文
  • 16 篇 其他
检索条件"机构=State Key Lab of Mathematical Engineering and Advanced Computing"
1058 条 记 录,以下是701-710 订阅
排序:
Discovery of a maximally charged Weyl point
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Qiaolu Chen, Fujia Yan, Qinghui Zhang, Li Gao, Zhen Yang, Shengyuan A. Yu, Zhi-Ming Chen, Hongsheng Zhang, Baile Yang, Yihao Interdisciplinary Center for Quantum Information State Key Laboratory of Modern Optical Instrumentation ZJU-Hangzhou Global Scientific and Technological Innovation Center Zhejiang University Hangzhou310027 China International Joint Innovation Center Key Lab. of Advanced Micro Nano Electronic Devices & Smart Systems of Zhejiang The Electromagnetics Academy Zhejiang University Zhejiang University Haining314400 China Jinhua Institute of Zhejiang University Zhejiang University Jinhua321099 China Department of Electrical and Electronic Engineering Southern University of Science and Technology Shenzhen518055 China Research Laboratory for Quantum Materials Singapore University of Technology and Design 487372 Singapore School of Physics Beijing Institute of Technology Beijing100081 China Beijing Key Laboratory of Nanophotonics and Ultrafine Optoelectronic Systems School of Physics Beijing Institute of Technology Beijing100081 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link 637371 Singapore Centre for Disruptive Photonic Technologies The Photonics Institute Nanyang Technological University 50 Nanyang Avenue 639798 Singapore
The hypothetical Weyl particles in high-energy physics have been discovered in three-dimensional crystals as collective quasiparticle excitations near two-fold degenerate Weyl points1-5. Such momentum-space Weyl parti... 详细信息
来源: 评论
Power-Aware Data Management Based on Hybrid RAM-NVM Memory for Smart Bracelet
收藏 引用
Journal of Electronic Science and Technology 2017年 第4期15卷 385-390页
作者: Jin-Yu Zhan Jun-Huan Yang Wei Jiang Yi-Xin Li Yi-Ming Zhang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi 214000China
Wearable devices become popular because they can help people observe health *** battery life is the critical problem for wearable devices. The non-volatile memory(NVM) attracts attention in recent years because of its... 详细信息
来源: 评论
Active Defense Technology Based on Natural Software Diversity in Java Web Services
收藏 引用
Journal of Physics: Conference Series 2020年 第3期1550卷
作者: Zhenwu Liu Zheng Zhang Hao Liu Gaofei Zhang Yuan Chen State key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou HeNan 450001 China PLA Strategic Support Force Information Engineering University ZhengZhou HeNan 450001 China Jiangnan Institute of Computing Technology WuXi JiangSu 214083 China
With the popular use of network application services and the growing number of users, web services have become the main target of hackers. Traditional single software has insufficient security protection against unkno...
来源: 评论
Constructing PLC Binary Program Model for Detection Purposes
Constructing PLC Binary Program Model for Detection Purposes
收藏 引用
1st International Conference on advanced Algorithms and Control engineering, ICAACE 2018
作者: Chang, Tianyou Wei, Qiang Geng, Yangyang Zhang, Hongwei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China People's Bank of China Center Branch of Zhoukou City Zhoukou Henan466000 China
Programmable Logic Controller (PLC) programs are vulnerable to tampering attacks with addition of malware, which can substantially cause severe physical destructions. In order to solve the problems, We propose a stati... 详细信息
来源: 评论
Topology-Aware Software Assignment in Networked Systems
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1213卷
作者: Junchao Wang Hao Liu Zhenwu Liu Zheng Zhang Jianmin Pang State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Cyberspace mimic defense has been proven to be a revolutionary defense technology that 'changes the rules of the game' to ensure the security of cyberspace. However, the software diversity inherent in mimic de...
来源: 评论
A Framework for Multi-Variant Execution Environment
收藏 引用
Journal of Physics: Conference Series 2019年 第1期1325卷
作者: Wang Junchao Liu Zhenwu Liu Hao Pang Jianmin State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software diversity has been proven to be an effective approach to enhance system security. To make the best of the advantage brought by software diversity, a multi-variant execution environment is needed. However, alt...
来源: 评论
Attacking Intel UEFI by Using Cache Poisoning
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: Dong Wang Wei Yu Dong State Key Laboratory of Mathematical Engineering And Advanced Computing Zhengzhou China
The Unified Extensible Firmware Interface (UEFI) is a software interface between an operating system and platform firmware designed to replace a traditional BIOS. In this paper, we evaluated the security mechanisms us...
来源: 评论
Observation of topological edge states in thermal diffusion
arXiv
收藏 引用
arXiv 2021年
作者: Hu, Hao Han, Song Yang, Yihao Liu, Dongjue Xue, Haoran Liu, Gui-Geng Cheng, Zheyu Wang, Qi Jie Zhang, Shuang Zhang, Baile Luo, Yu School of Electrical and Electronic Engineering Nanyang Technological University 50 Nanyang Avenue Singapore639798 Singapore Interdisciplinary Center for Quantum Information State Key Laboratory of Modern Optical Instrumentation College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Science and Technology Innovation Center Key Lab. of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang Zhejiang University Hangzhou310027 China International Joint Innovation Center ZJU-UIUC Institute Zhejiang University Haining314400 China Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University 21 Nanyang Link Singapore637371 Singapore Department of Physics University of Hong Kong Hong Kong Department of Electrical & Electronic Engineering University of Hong Kong China Centre for Disruptive Photonic Technologies Nanyang Technological University Singapore637371 Singapore
The topological band theory predicts that bulk materials with nontrivial topological phases support topological edge states. This phenomenon is universal for various wave systems and has been widely observed for elect... 详细信息
来源: 评论
A Static Backward Taint Data Analysis Method for Detecting Web Application Vulnerabilities  9
A Static Backward Taint Data Analysis Method for Detecting W...
收藏 引用
2017 9th IEEE International Conference on Communication Software and Networks (ICCSN 2017)
作者: Xuexiong Yan Hengtai Ma Qingxian Wang Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing
This paper addresses detecting taint-style Thisvulnerabilities in PHP code. It extends classical taint-style model with an element called "cleans", which is used to specify sanitation routines. Based on the ... 详细信息
来源: 评论
Research on Programmable Logic Controller Security
收藏 引用
IOP Conference Series: Materials Science and engineering 2019年 第4期569卷
作者: Haolan Wu Yangyang Geng Ke Liu Wenwen Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China
With the convergence of computer technology and industrial networks, attackers are not limited to attacking only individual users' computers, turning to attack industrial control systems that can cause major infra...
来源: 评论