咨询与建议

限定检索结果

文献类型

  • 1,758 篇 期刊文献
  • 602 篇 会议
  • 2 册 图书

馆藏范围

  • 2,362 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,513 篇 理学
    • 1,130 篇 物理学
    • 312 篇 数学
    • 120 篇 化学
    • 115 篇 生物学
    • 93 篇 地球物理学
    • 90 篇 统计学(可授理学、...
    • 31 篇 系统科学
  • 1,281 篇 工学
    • 590 篇 计算机科学与技术...
    • 440 篇 软件工程
    • 247 篇 核科学与技术
    • 157 篇 电子科学与技术(可...
    • 143 篇 信息与通信工程
    • 135 篇 光学工程
    • 126 篇 电气工程
    • 98 篇 控制科学与工程
    • 97 篇 生物工程
    • 92 篇 化学工程与技术
    • 86 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 57 篇 机械工程
    • 54 篇 材料科学与工程(可...
    • 52 篇 冶金工程
    • 44 篇 力学(可授工学、理...
    • 43 篇 动力工程及工程热...
    • 34 篇 航空宇航科学与技...
  • 180 篇 管理学
    • 113 篇 管理科学与工程(可...
    • 69 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 55 篇 医学
    • 46 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 27 篇 法学
  • 22 篇 经济学
  • 14 篇 农学
  • 5 篇 军事学
  • 4 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 198 篇 hadron colliders
  • 72 篇 higgs bosons
  • 64 篇 hadrons
  • 54 篇 relativistic hea...
  • 52 篇 w & z bosons
  • 40 篇 particle decays
  • 38 篇 top quark
  • 34 篇 hadron-hadron sc...
  • 34 篇 particle product...
  • 34 篇 quark & gluon je...
  • 33 篇 supersymmetric m...
  • 30 篇 deep learning
  • 28 篇 supersymmetry
  • 27 篇 bottom quark
  • 27 篇 cosmic rays
  • 26 篇 quantum chromody...
  • 26 篇 electroweak inte...
  • 25 篇 machine learning
  • 25 篇 quantum cryptogr...
  • 25 篇 bosons

机构

  • 638 篇 department of ph...
  • 557 篇 cavendish labora...
  • 515 篇 oliver lodge lab...
  • 511 篇 infn sezione di ...
  • 490 篇 infn sezione di ...
  • 490 篇 physikalisches i...
  • 439 篇 infn sezione di ...
  • 436 篇 university of ch...
  • 417 篇 infn laboratori ...
  • 399 篇 infn sezione di ...
  • 354 篇 infn sezione di ...
  • 346 篇 infn sezione di ...
  • 341 篇 infn sezione di ...
  • 333 篇 infn sezione di ...
  • 321 篇 iccub universita...
  • 294 篇 infn sezione di ...
  • 285 篇 universiteit maa...
  • 276 篇 fakultät physik ...
  • 264 篇 faculty of scien...
  • 262 篇 department for p...

作者

  • 191 篇 c. alexa
  • 189 篇 j. m. izen
  • 188 篇 g. bella
  • 185 篇 j. strandberg
  • 183 篇 d. calvet
  • 183 篇 c. amelung
  • 175 篇 n. orlando
  • 171 篇 y. tayalati
  • 168 篇 g. spigo
  • 168 篇 v. chiarella
  • 165 篇 f. siegert
  • 161 篇 s. veneziano
  • 157 篇 a. dimitrievska
  • 156 篇 f. deliot
  • 156 篇 beiter a.
  • 154 篇 m. lu
  • 154 篇 r. ströhmer
  • 149 篇 barter w.
  • 148 篇 m. rijssenbeek
  • 148 篇 s. jin

语言

  • 2,203 篇 英文
  • 121 篇 其他
  • 40 篇 中文
检索条件"机构=State Key Laboratory of High Performance Computing and College of Computer Science and Technology"
2362 条 记 录,以下是311-320 订阅
排序:
Resilience of Quantum key Distribution Source against Laser-Damage Attack by a Variety of Lasers
Resilience of Quantum Key Distribution Source against Laser-...
收藏 引用
2023 Conference on Lasers and Electro-Optics Europe and European Quantum Electronics Conference, CLEO/Europe-EQEC 2023
作者: Ruzhitskaya, Daria Zhluktova, Irina Ponosova, Anastasiya Trefilov, Daniil Chaiwongkhot, Poompong Huang, Anqi Kamynin, Vladimir Makarov, Vadim Russian Quantum Center Skolkovo Moscow121205 Russia NTI Center for Quantum Communications National University of Science and Technology MISiS Moscow119049 Russia Prokhorov General Physics Institute of Russian Academy of Sciences Moscow119991 Russia MIREA - Russian Technological University Moscow119454 Russia Vigo Quantum Communication Center University of Vigo VigoE-36310 Spain Department of Physics Faculty of Science Mahidol University Bangkok10400 Thailand Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Shanghai Branch National Laboratory for Physical Sciences at Microscale CAS Center for Excellence in Quantum Information University of Science and Technology of China Shanghai201315 China
Quantum key distribution (QKD) systems provide quantum-safe key exchange. Therefore, complete security analysis of implementations of QKD protocols is in the focus of interest of a worldwide information-security commu... 详细信息
来源: 评论
Editorial:Special Topic on Federated Learning for IoT and Edge computing
收藏 引用
ZTE Communications 2022年 第3期20卷 1-2页
作者: PAN Yi CUI Laizhong CAI Zhipeng LI Wei Faculty of Computer Science and Control Engineering at Shenzhen Institute of Advanced Technology Chinese Academy of SciencesChina the Academy of the United Nations Sciences and Technology Organization Ukrainian Academy of Engineering Sciences American Institute for Medical and Biological Engineering Institute of Engineering Technology the College of Computer Science and Software Engineering at Shenzhen University China Department of Computer Science and the College of Business at Georgia State University USA the Center for Distributed and High Performance Computing School of Computer ScienceThe University of Sydney the Australia-China Joint Research Center on Energy Informatics and Demand Response Technologies
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer an... 详细信息
来源: 评论
CoChain: high Concurrency Blockchain Sharding via Consensus on Consensus
CoChain: High Concurrency Blockchain Sharding via Consensus ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Mingzhe Li You Lin Jin Zhang Wei Wang Computer Science and Engineering Department Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Computer Science and Engineering Department Hong Kong University of Science and Technology Technology and Research Institute of High Performance Computing and Agency for Science Singapore
Sharding is an effective technique to improve the scalability of blockchain. It splits nodes into multiple groups so that they can process transactions in parallel. To achieve higher parallelism and concurrency at lar...
来源: 评论
DL-Chain: Scalable and Stable Blockchain Sharding with high Concurrency via Dual-Layer Consensus
arXiv
收藏 引用
arXiv 2024年
作者: Lin, You Li, Mingzhe Wei, Qingsong Liu, Yong Goh, Siow Mong Rick Zhang, Jin The Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China The Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China The Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong The Institute of High Performance Computing A*STAR Singapore Singapore The Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China
Sharding enhances blockchain scalability by partitioning nodes into multiple groups for concurrent transaction processing. Configuring a large number of small shards helps improve the transaction concurrency of a shar... 详细信息
来源: 评论
Privacy-Preserving 3D Skeleton-Based Video Action Recognition via Graph Convolution Network
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Gao, Xuesong Li, Keqiu Liu, Xiulong Nie, Jie Chen, Weiqiang Tian, Yonghong Tianjin University College of Intelligence and Computing China Ocean University of China Faculty of Information Science and Engineering China Hisense Co. Ltd State Key Laboratory of Digital Multimedia Technology China Peking University School of Computer Science China
In recent years, 3D skeleton data-based human action recognition has attracted an increasing number of researchers because of its high robustness under illumination change and scene variation. However, in 3D skeleton ... 详细信息
来源: 评论
Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol
收藏 引用
science China(Physics,Mechanics & Astronomy) 2021年 第6期64卷 121-124页
作者: Yu-Guang Yang Yue-Chao Wang Yong-Li Yang Xiu-Bo Chen Dan Li Yi-Hua Zhou Wei-Min Shi Faculty of Information Technology Beijing University of TechnologyBeijing 100124China Beijing Key Laboralory of Trusted Computing Beijing 100124China Guangxi Key Laboratory of Crptography and Information Security Guilin 541004China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China
In a recent article[Gao et al.,***.63,120311(2020)],a two-receiver measurement-deviceindependent quantum secret sharing(MDI-QSS)protocol was *** was proven to be secure against eavesdropping and generalized to the mul... 详细信息
来源: 评论
Enhancing Reentrancy Vulnerability Detection and Repair with a Hybrid Model Framework
Enhancing Reentrancy Vulnerability Detection and Repair with...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Mengliang Li Xiaoxue Ren Han Fu Zhuo Li Jianling Sun State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security College of Computer Science and Technology Zhejiang University State Street Technology(Zhejiang) Ltd
Smart contracts bring revolutionary changes to the credit landscape. However, their security remains intensely scrutinized due to numerous hacking incidents and inherent logical challenges. One well-known and represen... 详细信息
来源: 评论
Spatial-Temporal Reconstruction Error for AIGC-based Forgery Image Detection
Spatial-Temporal Reconstruction Error for AIGC-based Forgery...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chengji Shen Zhenjiang Liu Kaixuan Chen Jie Lei Mingli Song Zunlei Feng State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Idlefish Network Technology Alibaba Group College of Computer Science and Technology Zhejiang University of Technology
The remarkable success of AI-Generated Content (AIGC), especially diffusion image generation models, brings about unprecedented creative applications, but also creates fertile ground for malicious counterfeiting and c... 详细信息
来源: 评论
Quantum memory assisted entangled state verification with local measurements
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Siyuan Xie, Wei Xu, Ping Wang, Kun Hefei National Research Center for Physical Sciences Microscale School of Physical Sciences University of Science and Technology of China Hefei230026 China College of Physics Jilin University Changchun130012 China School of Computer Science and Technology University of Science and Technology of China Hefei230027 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
We consider the quantum memory assisted quantum state verification task, where an adversary prepare independent multipartite entangled states and send to the local verifiers, who then store several copies in the quant... 详细信息
来源: 评论
SpatioTemporal Learning for Human Pose Estimation in Sparsely-Labeled Videos
arXiv
收藏 引用
arXiv 2025年
作者: Jiao, Yingying Wang, Zhigang Wu, Sifan Fan, Shaojing Liu, Zhenguang Xu, Zhuoyue Wu, Zheqi College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Technology Zhejiang Gongshang University China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China
Human pose estimation in videos remains a challenge, largely due to the reliance on extensive manual annotation of large datasets, which is expensive and labor-intensive. Furthermore, existing approaches often struggl... 详细信息
来源: 评论