咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 697 篇 计算机科学与技术...
    • 568 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 175 篇 电气工程
    • 171 篇 信息与通信工程
    • 121 篇 控制科学与工程
    • 119 篇 化学工程与技术
    • 115 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 84 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 53 篇 力学(可授工学、理...
    • 49 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 34 篇 冶金工程
  • 1,010 篇 理学
    • 548 篇 物理学
    • 389 篇 数学
    • 128 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 38 篇 法学
    • 31 篇 社会学
  • 37 篇 医学
    • 32 篇 临床医学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 15 篇 topology
  • 14 篇 network topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 hebei normal uni...
  • 94 篇 state key labora...
  • 94 篇 university of ch...
  • 91 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 81 篇 school of physic...
  • 78 篇 center for astro...
  • 77 篇 college of physi...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 75 篇 school of physic...
  • 75 篇 moscow institute...
  • 74 篇 national space s...
  • 71 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 71 篇 danzengluobu
  • 68 篇 kuleshov d.
  • 67 篇 liu d.
  • 66 篇 chen m.j.
  • 66 篇 liu s.m.
  • 66 篇 huang d.h.
  • 65 篇 dai h.l.
  • 65 篇 guo y.q.
  • 65 篇 liu b.
  • 64 篇 bao y.w.
  • 63 篇 li cheng
  • 63 篇 li xin
  • 63 篇 hu h.b.
  • 61 篇 liu h.d.
  • 61 篇 mao j.r.

语言

  • 1,860 篇 英文
  • 57 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering And Advanced Computing"
1958 条 记 录,以下是181-190 订阅
排序:
Interfacial molecular anchor for ambient all-bladed perovskite solar modules
收藏 引用
Joule 2025年 第5期9卷
作者: Zhu, Xuejie Yu, Dongqi Zhou, Xin Wang, Nan Liu, Hong Liang, Zihui Wu, Congcong Wang, Kai Jin, Dayong Liu, Shengzhong Yang, Dong State Key Laboratory of Photoelectric Conversion and Utilization of Solar Energy Dalian National Laboratory for Clean Energy Dalian Institute of Chemical Physics Dalian116023 China School of Physics and Electronic Technology Liaoning Normal University Dalian116029 China Interdisciplinary Research Center for Biology and Chemistry Liaoning Normal University Liaoning Dalian116029 China Key Laboratory for the Green Preparation and Application of Functional Materials Hubei Key Laboratory of Polymer Materials School of Materials Science and Engineering Hubei University Wuhan430062 China National Local Joint Laboratory for Advanced Textile Processing and Clean Production Wuhan Textile University Wuhan430073 China Huanjiang Laboratory Zhejiang University Zhuji311800 China School of Mathematical and Physical Sciences Faculty of Science University of Technology Sydney SydneyNSW Australia Eastern Institute for Advanced Study Eastern Institute of Technology Ningbo China Center of Materials Science and Optoelectronics Engineering University of Chinese Academy of Sciences Beijing100049 China
Ambient blade coating of perovskite solar modules shows great potential for large-scale manufacture and commercialization. However, blade coating nanometer-thick buffer layers typically results in a nonuniform surface... 详细信息
来源: 评论
Recurrent neural network based binary code vulnerability detection  2
Recurrent neural network based binary code vulnerability det...
收藏 引用
2nd International Conference on Algorithms, computing and Artificial Intelligence, ACAI 2019
作者: Zheng, Jianyun Pang, Jianmin Zhang, Xiaochuan Zhou, Xin Li, MingLiang Wang, Jun State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network (RNN) ... 详细信息
来源: 评论
A software upgrade security analysis method on network traffic classification using deep learning
A software upgrade security analysis method on network traff...
收藏 引用
2020 International Conference on Urban engineering and Management Science, ICUEMS 2020
作者: Zhang, Bing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论
The Executors Scheduling Algorithm for the Web Server Based on the Attack Surface
The Executors Scheduling Algorithm for the Web Server Based ...
收藏 引用
2020 IEEE International Conference on Advances in Electrical engineering and Computer Applications, AEECA 2020
作者: Nie, Guanglai Zhang, Zheng Zhao, Yufeng Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith... 详细信息
来源: 评论
RLGBG: A Reachable Landmark Grouping Based IP Geolocation Method for Unreachable Target  29th
RLGBG: A Reachable Landmark Grouping Based IP Geolocation Me...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Zu, Shuodi Liu, Chong Zhang, Fan Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
IP geolocation technology can estimate or determine the geographical location of terminal device through IP address, which is an important basis for location-based network services. The existing IP geolocation methods... 详细信息
来源: 评论
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks  16
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
Building smart classroom of combinatorial mathematics based on PBL teaching model  10
Building smart classroom of combinatorial mathematics based ...
收藏 引用
10th International Conference on Information Technology in Medicine and Education, ITME 2019
作者: Yang, Benchao Zeng, Guang Yu, Gang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
With the prevalence of artificial intelligence and the continuous development of information-based teaching, the emergence of smart classrooms has provided a new teaching environment for classroom teaching. As a new a... 详细信息
来源: 评论
A dynamic network change detection method using network embedding  4th
A dynamic network change detection method using network embe...
收藏 引用
4th International Conference on Cloud computing and Security, ICCCS 2018
作者: Sun, Tong Liu, Yan China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic networks are ubiquitous. Detecting dynamic network changes is helpful to understand the network development trend and discover network anomalies in time. It is a research hotspot at present. The structure of t... 详细信息
来源: 评论
Binary vulnerability mining technology based on neural network feature fusion  5
Binary vulnerability mining technology based on neural netwo...
收藏 引用
5th International Conference on advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Han, Wenjie Pang, Jianmin Zhou, Xin Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien... 详细信息
来源: 评论
Dynamic Network Change Detection via Dynamic Network Representation Learning  14th
Dynamic Network Change Detection via Dynamic Network Represe...
收藏 引用
14th EAI International Conference on Communications and Networking in China, ChinaCom 2019
作者: Feng, Hao Liu, Yan Zhou, Ziqiao Chen, Jing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The structure of the network in the real world is very complex, as the dynamic network structure evolves in time dimension, how to detect network changes accurately and further locate abnormal nodes is a research hots... 详细信息
来源: 评论