咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是181-190 订阅
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qiankun Pi Jicang Lu Yepeng Sun Qinlong Fan Xukun Zhou Shouxin Shang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
OpenMP automatic translation framework for Sunway TaihuLight  3
OpenMP automatic translation framework for Sunway TaihuLight
收藏 引用
3rd IEEE International Conference on Communications, Information System and Computer engineering, CISCE 2021
作者: Li, Mingliang Pang, Jianmin Yue, Feng Wang, Qihan State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
The Sunway processor is a unique heterogeneous many-core processor used by Sunway TaihuLight supercomputer. However, developing parallel programs on the Sunway processor is still complex. In this paper, a source-to-so... 详细信息
来源: 评论
Detection and localization of cyber attacks on water treatment systems:an entropy-based approach
收藏 引用
Frontiers of Information Technology & Electronic engineering 2022年 第4期23卷 587-603页
作者: Ke LIU Mufeng WANG Rongkuan MA Zhenyong ZHANG Qiang WEI State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China College of Control Science and Engineering Zhejiang UniversityHangzhou310027China
With the advent of Industry 4.0,water treatment systems(WTSs)are recognized as typical industrial cyber-physical systems(iCPSs)that are connected to the open *** information technology(IT)benefits the WTS in the aspec... 详细信息
来源: 评论
Anti-obfuscation Binary Code Clone Detection Based on Software Gene  7th
Anti-obfuscation Binary Code Clone Detection Based on Softwa...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Tang, Ke Liu, Fudong Shan, Zheng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin... 详细信息
来源: 评论
Network Device Identification Based on MAC Boundary Inference  7th
Network Device Identification Based on MAC Boundary Inferenc...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Guo, Xinmiao Li, Xiangnan Li, Ruixiang Wang, Xiuting Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely... 详细信息
来源: 评论
IPv6 Landmark Mining Based on Domain Name Screening and IPv4-IPv6 Connection  21
IPv6 Landmark Mining Based on Domain Name Screening and IPv4...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Liu, Minghao Sun, Yuchen Liu, Chong Zu, Shuodi Zhang, Fan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Existing IP landmark mining technologies mainly focus on IPv4, and less attention is paid to the association between IPv4 and IPv6. The current IPv6 network has fewer reliable landmarks with limited accuracy, while th... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
The Adjacency Codes of the First Yellow Graphs
收藏 引用
Journal of Systems Science & Complexity 2023年 第4期36卷 1757-1768页
作者: SHI Minjia LI Shitao KIM Jon-Lark SOLE Patrick Key Laboratory of Intelligent Computing and Signal Processing Ministry of EducationSchool of Mathematical SciencesAnhui UniversityHefei 230601China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China School of Mathematical Sciences Anhui UniversityHefei 230026China Department of Math Sogang UniversitySeoulSouth Korea Aix Marseille Univ CNRSCentrale MarseilleI2MMarseilleFrance
The authors study the binary codes spanned by the adjacency matrices of the strongly regular graphs(SRGs)on at most two hundred vertices whose existence is *** authors show that in length less than one hundred they ca... 详细信息
来源: 评论
Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis
收藏 引用
Security and Communication Networks 2022年 第0期2022卷
作者: Wu, Zehui Zhang, Wenbin Wang, Yunchao Yan, Chenyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software-defined network (SDN) controllers, the core of SDN network architecture, need to deal with network events of the whole network, which has huge program state space and complex logic dependency, with security i... 详细信息
来源: 评论
Directed Association-based User Identification Algorithm  2
Directed Association-based User Identification Algorithm
收藏 引用
2nd International Conference on Computer, Big Data and Artificial Intelligence, ICCBDAI 2021
作者: Jiang, Qiuyan Gong, Daofu Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
This paper studies the social network with directed association semantics, and proposes an unsupervised user identification algorithm (DAUM-P). The algorithm construct a user associations graph based on multiple types... 详细信息
来源: 评论