咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是171-180 订阅
SROBR: Semantic Representation of Obfuscation-Resilient Binary Code
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Tang, Ke Shan, Zheng Liu, Fudong Huang, Yizhao Sun, Rongbo Qiao, Meng Zhang, Chunyan Wang, Jue Gui, Hairen State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software p... 详细信息
来源: 评论
Data quantity governance for machine learning in materials science
收藏 引用
National Science Review 2023年 第7期10卷 234-250页
作者: Yue Liu Zhengwei Yang Xinxin Zou Shuchang Ma Dahui Liu Maxim Avdeev Siqi Shi School of Computer Engineering and Science Shanghai University Shanghai Engineering Research Center of Intelligent Computing System Australian Nuclear Science and Technology Organisation School of Chemistry The University of Sydney State Key Laboratory of Advanced Special Steel School of Materials Science and Engineering Shanghai University Materials Genome Institute Shanghai University
Data-driven machine learning(ML) is widely employed in the analysis of materials structure-activity relationships,performance optimization and materials design due to its superior ability to reveal latent data pattern... 详细信息
来源: 评论
Overview of Intrusion Detection in Smart Substation  10
Overview of Intrusion Detection in Smart Substation
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Li, Zecun Ma, Rongkuan Xie, Yaobin Lu, Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Shangu Cyber Security Technology Co. Ltd Zhengzhou China
The development of Cyber-Physical Fusion Technology gradually takes the power grid in the direction of intelligence, making the smart substation a typical cyber-physical fusion system. However, while the introduction ... 详细信息
来源: 评论
An anonymous key agreement protocol with robust authentication for smart grid infrastructure
收藏 引用
Science China(Information Sciences) 2022年 第09期65卷 291-293页
作者: Ting CHEN Qingfeng CHENG Xinghua LI School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,The issue on how to ensure the smart grid environment’s security and reliability has always been a focus in current research. The rapid expansion of the Internet of Things enables billions of smart device... 详细信息
来源: 评论
Unraveling the Morphological and Energetic Properties of 2PACz Self-Assembled Monolayers Fabricated With Upscaling Deposition Methods
收藏 引用
Energy & Environmental Materials 2025年 第2期8卷 295-308页
作者: Silvia Mariotti Ilhem Nadia Rabehi Congyang Zhang Xiaomin Huo Jiahao Zhang Penghui Ji Tianhao Wu Tongtong Li Shuai Yuan Xiaomin Liu Ting Guo Chenfeng Ding Hengyuan Wang Annalisa Bruno Luis K.Ono Yabing Qi Energy Materials and Surface Sciences Unit (EMSSU) Okinawa Institute of cience and Technology Graduate University (OIST) State Key Laboratory of Organic Electronics and Information Displays & Institute of Advanced Materials (IAM) Nanjing University of Posts & Telecommunications School of Physical and Mathematical Science & School of Materials Science Engineering & EEnergy Research Institute NTU Nanyang Technological University
Self-assembled monolayers(SAMs) are widely used as hole transport materials in inverted perovskite solar cells,offering low parasitic absorption and suitability for semitransparent and tandem solar *** SAMs have sho... 详细信息
来源: 评论
Pushing AI to wireless network edge: an overview on integrated sensing, communication, and computation towards 6G
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 7-25页
作者: Guangxu ZHU Zhonghao LYU Xiang JIAO Peixi LIU Mingzhe CHEN Jie XU Shuguang CUI Ping ZHANG Shenzhen Research Institute of Big Data Future Network of Intelligence Institute (FNii) The Chinese University of Hong Kong (Shenzhen) School of Science and Engineering (SSE) The Chinese University of Hong Kong (Shenzhen) State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Peking University Department of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Peng Cheng Laboratory State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-gen... 详细信息
来源: 评论
Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
收藏 引用
Frontiers of Information Technology & Electronic engineering 2022年 第3期23卷 351-360页
作者: Rongkuan MA Hao ZHENG Jingyi WANG Mufeng WANG Qiang WEI Qingxian WANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Zhejiang University NGICS Platform Hangzhou 310000China
Proprietary(or semi-proprietary)protocols are widely adopted in industrial control systems(ICSs).Inferring protocol format by reverse engineering is important for many network security applications,e.g.,program tests ... 详细信息
来源: 评论
NAS Honeypot Technology Based on Attack Chain  10th
NAS Honeypot Technology Based on Attack Chain
收藏 引用
10th International Conference on Computer engineering and Networks, CENet 2020
作者: Liu, Bing Shu, Hui Kang, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the wide application of network attached storage (NAS), the security problem is becoming more and more serious, together with the increasingly fierce attacks against NAS devices of different manufacturers. In ord... 详细信息
来源: 评论
Mitigating Language Confusion through Inference-time Intervention  31
Mitigating Language Confusion through Inference-time Interve...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Xie, Yunfan Zou, Lixin Luo, Dan Tang, Min Li, Chenliang Dong, Liming Luo, Xiangyang Wuhan University Wuhan China Lehigh University Bethlehem United States Monash University Melbourne Australia National Defense University Beijing China State Key Lab of Mathematical Engineering and Advanced Computing Zhengzhou China
Although large language models (LLMs) trained on extensive multilingual corpora exhibit impressive language transfer, they often fail to respond in the user's desired language due to corpus imbalances, an embarras... 详细信息
来源: 评论
Research on key Technology of Industrial Network Boundary Protection based on Endogenous Security  4
Research on Key Technology of Industrial Network Boundary Pr...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Yu, Fei Wei, Qiang Geng, Yangyang Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deploy... 详细信息
来源: 评论