咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering And Advanced Computing"
1989 条 记 录,以下是1671-1680 订阅
排序:
Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
收藏 引用
Physical Review A 2015年 第5期91卷 052305-052305页
作者: Yangyang Fei Ming Gao Weilong Wang Chaobo Li Zhi Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
To the active-basis-choice decoy-state quantum-key-distribution systems with detector efficiency mismatch, we present a modified attack strategy, which is based on the faked states attack, with quantum nondemolition m... 详细信息
来源: 评论
Round-optimal password-based group key exchange protocols in the standard model  13th
Round-optimal password-based group key exchange protocols in...
收藏 引用
13th International Conference on Applied Cryptography and Network Security, ACNS 2015
作者: Xu, Jing Hu, Xue-Xian Zhang, Zhen-Feng Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450002 China
Password-based group key exchange protocols allow group users who share only a short, low entropy password to agree on a cryptographically strong session key. One fundamental complexity measure of such protocols is it... 详细信息
来源: 评论
Perovskite Solar Cells: Unique Seamlessly Bonded CNT@Graphene Hybrid Nanostructure Introduced in an Interlayer for Efficient and Stable Perovskite Solar Cells (Adv. Funct. Mater. 32/2018)
收藏 引用
advanced Functional Materials 2018年 第32期28卷
作者: Xuanhua Li Tengteng Tong Qinjiang Wu Shaohui Guo Qiang Song Jian Han Zhixiang Huang State Key Laboratory of Solidification Processing Research and Development Institute of Northwestern Polytechnical University In Shenzhen Center for Nano Energy Materials School of Materials Science and Engineering Northwestern Polytechnical University and Shaanxi Joint Lab of Graphene (NPU) Xi'an 710072 China Northwestern Polytechnical University‐Queen Mary University of London (NPU‐QMUL) Joint Research Institute of Advanced Materials and Structures (JRI‐AMAS) Xi'an 710072 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University No. 3 Feixi Road Hefei Anhui Province 230039 P. R. China
来源: 评论
Business process mining based insider threat detection system
收藏 引用
Tongxin Xuebao/Journal on Communications 2016年 37卷 180-188页
作者: Zhu, Tai-Ming Guo, Yuan-Bo Ju, An-Kang Ma, Jun School of Cyberspace Security PLA Information Engineering University Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214000 China
Current intrusion detection systems are mostly for detecting external attacks, but sometimes the internal staff may bring greater harm to organizations in information security. Traditional insider threat detection met... 详细信息
来源: 评论
Junk code elimination based on idle object set
Junk code elimination based on idle object set
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Wei Lin Jin-long Fei Rui-jie Cai State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f...
来源: 评论
Carrier-depletion mach-zehnder silicon optical modulator for bpsk and multi-level applications
Carrier-depletion mach-zehnder silicon optical modulator for...
收藏 引用
Asia Communications and Photonics Conference, ACPC 2015
作者: Ding, Jianfeng Yang, Lin Zhang, Lei State Key Laboratory on Integrated Optoelectronics Institute of Semiconductors P. O. Box 912 Beijing100083 China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
We demonstrate a BPSK carrier-depletion modulator. The device generates a PAM-4 optical signal which means it is possible to be used in a 16-QAM applications. © 2015 OSA.
来源: 评论
An SIMD Code Generation Technology for Indirect Array
An SIMD Code Generation Technology for Indirect Array
收藏 引用
2015 7th International Conference on Computer Research and Development (ICCRD 2015)
作者: Peng-yuan Li Rong-cai Zhao Qing-hua Zhang Lin Han State Key Laboratory of Mathematical Engineering and Advanced Computing
Due to disjoint memory references and non-aligned memory references, existing SIMD compilers can't vectorize loops containing indirect array utilizing SIMD(Single Instruction Multiple Data) instructions. However, ... 详细信息
来源: 评论
The Design and Research for Network Address Space Randomization in OpenFlow Network
The Design and Research for Network Address Space Randomizat...
收藏 引用
2015 Workshop 5
作者: Ziyu Zhao Yuanbo Guo Wei Liu State Key Laboratory of Mathematical Engineering and Advanced Computing
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility... 详细信息
来源: 评论
Distributed key Revocation Scheme Based on Shared Binary Tree
Distributed Key Revocation Scheme Based on Shared Binary Tre...
收藏 引用
2015 IEEE International Conference on Progress in Informatics and computing(PIC 2015)
作者: Shaoren Wang Xuehui Du Zhi Yang State Key Laboratory of Mathematical Engineering and Advanced Computing
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on sha... 详细信息
来源: 评论
Dynamic Program Behavior Model Based on Layered Dependencies
Dynamic Program Behavior Model Based on Layered Dependencies
收藏 引用
2015 6th IEEE International Conference on Software engineering and Service Science(ICSESS 2015)
作者: Chao Fan Rongcai Zhao Zheng Shan Hongbo Cai State Key Laboratory of Mathematical Engineering and Advanced Computing
It is effective to ensure the credibility of program to monitor the real-time status in the whole process when the program is been executed. Aiming at the problem of high convexity of feature extracting and interactio... 详细信息
来源: 评论