咨询与建议

限定检索结果

文献类型

  • 1,075 篇 期刊文献
  • 879 篇 会议
  • 3 册 图书

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,244 篇 工学
    • 690 篇 计算机科学与技术...
    • 563 篇 软件工程
    • 175 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 92 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 59 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 35 篇 核科学与技术
  • 1,005 篇 理学
    • 549 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 119 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 618 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 95 篇 university of ch...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 school of physic...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 77 篇 institute of fro...
  • 77 篇 school of physic...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 67 篇 national astrono...
  • 66 篇 department of en...

作者

  • 83 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 65 篇 li xin
  • 65 篇 guo y.q.
  • 64 篇 bao y.w.
  • 63 篇 hu h.b.
  • 63 篇 liu b.
  • 62 篇 min z.
  • 58 篇 qin j.j.

语言

  • 1,863 篇 英文
  • 52 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是171-180 订阅
排序:
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
UEFI Security Threats Introduced by S3 and Mitigation Measure  7
UEFI Security Threats Introduced by S3 and Mitigation Measur...
收藏 引用
7th International Conference on Signal and Image Processing, ICSIP 2022
作者: Jiao, Weihua Li, Qingbao Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
UEFI is widely used as the new generation BIOS, except for some new features, it also brings some security issues. The threat brought by S3 sleep jeopardizes the security of computer platforms seriously. An attacker c... 详细信息
来源: 评论
Leveraging markov chain and optimal mutation strategy for smart fuzzing
Leveraging markov chain and optimal mutation strategy for sm...
收藏 引用
2014 International Conference on Information and Network Security, ICINS 2014
作者: Ouyang, Yongji Wu, Zehui Mu, Qing Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzz testing is an important way of vulnerability discovery, however, the existing fuzzers based on symbolic execution and others have inherent shortcomings like needing more computing resource, in-depth analysis and ... 详细信息
来源: 评论
Research on Cross-site Scripting Attack Detection Technology Based on Few-shot Learning  6
Research on Cross-site Scripting Attack Detection Technology...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Lu, Dongzhe Liu, Long State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the intensification of informatization and mobility, various web security threats are emerging. Cross-site scripting (XSS) attack is the most common type of web attack. Most traditional detection methods have bee... 详细信息
来源: 评论
Research on security assessment based on big data and multi-entity profile  5
Research on security assessment based on big data and multi-...
收藏 引用
5th IEEE advanced Information Technology, Electronic and Automation Control Conference, IAEAC 2021
作者: Liu, Wenfu Pang, Jianmin Yang, Shudan Li, Nan Du, Qiming Sun, Daozhu Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties"(entities in this paper) have interna... 详细信息
来源: 评论
Feature-based identification method of MCU firmware IO interface  6
Feature-based identification method of MCU firmware IO inter...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Sun, Yuanbo Dong, Weiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ... 详细信息
来源: 评论
Fast Warming Over the Mongolian Plateau a Catalyst for Extreme Rainfall Over North China
收藏 引用
Geophysical Research Letters 2025年 第8期52卷
作者: Gu, Jun Zhao, Chun Xu, Mingyue Ma, Yuanyuan Hu, Zhiyuan Jin, Chen Guo, Jianping Geng, Tao Cai, Wenju Deep Space Exploration Laboratory/School of Earth and Space Sciences/CMA-USTC Laboratory of Fengyun Remote Sensing/State Key Laboratory of Fire Science/Institute of Advanced Interdisciplinary Research on High-Performance Computing Systems and Software University of Science and Technology of China Hefei China Laoshan Laboratory Qingdao China CAS Center for Excellence in Comparative Planetology University of Science and Technology of China Hefei China Key Laboratory of Land Surface Process and Climate Change in Cold and Arid Regions Northwest Institute of Eco-Environment and Resources Chinese Academy of Sciences Lanzhou China Key Laboratory for Climate Change and Natural Disaster Studies of Guangdong Province School of Atmospheric Sciences Sun Yat-sen University Zhuhai China Southern Marine Science and Engineering Guangdong Laboratory Zhuhai China State Key Laboratory of Severe Weather Chinese Academy of Meteorological Sciences Beijing China and Physical Oceanography Laboratory Ocean University of China Qingdao China
Extreme rainfall events are becoming increasingly severe under a warming climate. North China has experienced several catastrophic rainfall events, of which the rainstorm in 2023 was particularly severe inducing unpre... 详细信息
来源: 评论
Creation of Magnetic Skyrmions in Two-Dimensional Van Der Waals Ferromagnets by Lattice Distortion
SSRN
收藏 引用
SSRN 2025年
作者: Zhang, Tingjia Yang, Chendi Lv, Xiaowei Zhao, Tuoyu Shi, Wu Li, Wei Liang, Jia Che, Renchao School of Materials and Chemistry University of Shanghai for Science and Technology Shanghai200093 China Laboratory of Advanced Materials Shanghai Key Lab of Molecular Catalysis and Innovative Materials Academy for Engineering and Technology Advanced Coatings Research Center of Ministry of Education of China Fudan University Shanghai200438 China State Key Laboratory of Surface Physics Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai200433 China Zhangjiang Fudan International Innovation Center Fudan University Shanghai201210 China Department of Physics Fudan University Shanghai200433 China Department of Materials Science State Key Laboratory of Photovoltaic Science and Technology Fudan University Shanghai200433 China
Two-dimensional (2D) van der Waals (vdW) ferromagnets provide an excellent platform for exploring exotic physical phenomena such as magnetic skyrmions and quantum topological phases. However, the centrosymmetric cryst... 详细信息
来源: 评论
On the Cycle Structure of Some Nonlinear Feedback Shift Registers
收藏 引用
Chinese Journal of Electronics 2014年 第4期23卷 801-804页
作者: WANG Zhongxiao XU Hong QI Wenfeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Department of Computer Science and Engineering Shanghai Jiao Tong University
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers(NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can b... 详细信息
来源: 评论
Path Sensitive Static Analysis of Taint-Style Vulnerabilities in PHP Code  17
Path Sensitive Static Analysis of Taint-Style Vulnerabilitie...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Xue-Xiong Yan Qing-Xian Wang Heng-Tai Ma Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, th... 详细信息
来源: 评论