咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering And Advanced Computing"
1961 条 记 录,以下是151-160 订阅
排序:
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of Embedded Devices  4
Zero WFuzzer: Target-Oriented Fuzzing for Web Interface of E...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Zheng, Yan Dong, Weiyu Cheng, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of embedded devices, security issues continue to occur. The existing automated security testing methods for embedded devices are mainly carried out from two aspects: the Web interface of the de... 详细信息
来源: 评论
An Ensemble Approach with Clustering-Based Under-sampling for Imbalanced Classification  2
An Ensemble Approach with Clustering-Based Under-sampling fo...
收藏 引用
2nd International Conference on Artificial Intelligence and Education, ICAIE 2021
作者: Ren, Huajuan Ren, Shuai Yan, Lin Wang, Ruimin Jing, Jing Shi, Jiaqi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Class imbalance widely occurs in many real-world applications, which affects the recognition of important class to a certain extent. Ensemble methods that combined resampling are effective to alleviate the class imbal... 详细信息
来源: 评论
mathematical modeling of lunar soft landing - Take chang'e-3 as an example  4
Mathematical modeling of lunar soft landing - Take chang'e-3...
收藏 引用
4th IEEE International Conference on Automation, Electronics and Electrical engineering, AUTEEE 2021
作者: Yang, Benchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, the three-dimensional sphere dynamic model of lunar precise soft landing of the probe is discussed. Taking the National College Students' mathematical modeling competition as the background and Chan... 详细信息
来源: 评论
Deep neural network-enabled battery open-circuit voltage estimation based on partial charging data
收藏 引用
Journal of Energy Chemistry 2024年 第3期90卷 120-132,I0005页
作者: Ziyou Zhou Yonggang Liu Chengming Zhang Weixiang Shen Rui Xiong State Key Laboratory of Mechanical Transmission for Advanced Equipment&College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing 400000China Department of Vehicle Engineering School of Mechanical EngineeringBeijing Institute of TechnologyBeijing 100081China Department of Electrical Engineering Harbin Institute of TechnologyHarbin 150000HeilongjiangChina School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyHawthornVictoria 3122Australia
Battery management systems(BMSs) play a vital role in ensuring efficient and reliable operations of lithium-ion *** main function of the BMSs is to estimate battery states and diagnose battery health using battery ope... 详细信息
来源: 评论
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer  21
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer
收藏 引用
5th International Conference on Computer Science and Application engineering, CSAE 2021
作者: Yu, Yingchao Qin, Xiaojun Gan, Shuitao State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In this paper, we propose a target-oriented hybrid directed binary fuzzer (HDBFuzzer) to solve the vulnerability confirmation problem based on binary code similarity comparison. HDBFuzzer combines macro function level... 详细信息
来源: 评论
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Cla...
收藏 引用
2021 IEEE International Conference on Communications, computing, Cybersecurity and Informatics, CCCI 2021
作者: Hu, Xinyi Gu, Chunxiang Chen, Yihang Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The Internet is about to enter the era of full encryption. Traditional traffic classification methods only work well in non-encrypted environments. How to identify the specific types of network encrypted traffic in an... 详细信息
来源: 评论
Analysis of TLS Encrypted Communication Behavior Based on Bipartite Graph and Traffic Information Embedding  4
Analysis of TLS Encrypted Communication Behavior Based on Bi...
收藏 引用
4th IEEE International Conference on Computer and Communication engineering Technology, CCET 2021
作者: Yan, Lin Jiang, Liehui Wang, Ruimin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Currently, encrypted traffic using the TLS protocol is widely used, and there are a lot of malicious and unknown behaviors. It is an important goal in the research field to detect the traffic behavior of TLS and maint... 详细信息
来源: 评论
Optimal scheme for dynamic adjustment of active mirror in FAST system  5
Optimal scheme for dynamic adjustment of active mirror in FA...
收藏 引用
5th International Conference on Computer Science and Artificial Intelligence, CSAI 2021
作者: Zhou, Hongchuan Liu, Jiaqi Song, Junyan Yang, Benchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper mainly studies the optimal scheme of dynamic adjustment of active mirror in FAST system by establishing mathematical model. According to the constraints such as distance variation range, a mathematical mode... 详细信息
来源: 评论
Research and Practice of Blending Teaching of Database System Integrating Ideological and Political Theories  3
Research and Practice of Blending Teaching of Database Syste...
收藏 引用
3rd IEEE International Conference on Computer Science and Educational Informatization, CSEI 2021
作者: Yao, Jinyang Liu, Fudong Wang, Junchao Zhao, Bo Shan, Zheng Xu, Peng Engineering and Advanced Computing State Key Laboratory of Mathematical Zhengzhou China
For the problem of the monotonous teaching form of the database system course, we integrate ideology and politics theories into the teaching design of the database system, combined with the 'Ideological and Politi... 详细信息
来源: 评论
Parent-based Powershell Script Fusion Technology
Parent-based Powershell Script Fusion Technology
收藏 引用
2021 International Symposium on Computer Technology and Information Science, ISCTIS 2021
作者: Cheng, Sipeng Sha, Zihan Yu, Pu Bu, Wenjuan Huo, Guovu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses... 详细信息
来源: 评论