咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是191-200 订阅
Multi Association Semantics-Based User Matching Algorithm Without Prior Knowledge
Multi Association Semantics-Based User Matching Algorithm Wi...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
作者: Jiang, Qiuyan Gong, Daofu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
Cross-network user matching is one of the basic issues for realizing social network data integration. Existing research based on structure features provides a good matching method for nodes with high-degree, but ignor... 详细信息
来源: 评论
Malicious Traffic Detection Model Refactor Method Based on Adaptive Sample Generation  5
Malicious Traffic Detection Model Refactor Method Based on A...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Jiao, Liang Fei, Jinlong Zhao, Min State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Tianjin University of Science and Technology School of Electronic Information and Automation Tianjin China
As machine learning models are widely used in malicious traffic detection, model security has become an important research topic. Aiming at the problems that the model refactor attack methods need a large amount of pr... 详细信息
来源: 评论
Improving CoatNet for Spatial and JPEG Domain Steganalysis
Improving CoatNet for Spatial and JPEG Domain Steganalysis
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Hao Li Xiangyang Luo Yi Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Advanced Computing and Key Laboratory of Cyberspace Situation Awareness of Henan Provinc Zhengzhou China
The covert communication technology represented by image steganography can realize the safe and reliable information transmission over an open network. Steganalysis is an important way to measure the security of stega...
来源: 评论
THE Furnace temperature curve based on one-dimensional unsteady heat conduction model  14
THE Furnace temperature curve based on one-dimensional unste...
收藏 引用
14th International Symposium on Computational Intelligence and Design, ISCID 2021
作者: Liu, Jiaqi Zhou, Hongchuan Yang, Benchao Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to... 详细信息
来源: 评论
mathematical modeling of intelligent RGV simulation scheduling system based on simulated annealing algorithm  14
Mathematical modeling of intelligent RGV simulation scheduli...
收藏 引用
14th International Symposium on Computational Intelligence and Design, ISCID 2021
作者: Yang, Benchao Zhou, Hongchuan Liu, Jiaqi State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
By establishing a mathematical model, the intelligent RGV scheduling scheme is optimized to design an efficient and stable intelligent RGV simulation scheduling system. This paper studies two different situations, inc... 详细信息
来源: 评论
A thermoviscoelastic finite deformation constitutive model based on dual relaxation mechanisms for amorphous shape memory polymers
收藏 引用
International Journal of Smart and Nano Materials 2023年 第2期14卷 243-264页
作者: Hao Duan Jianping Gu Hao Zeng Akbar A.Khatibi Huiyu Sun State Key Laboratory of Mechanics and Control of Mechanical Structures Nanjing University of Aeronautics and AstronauticsNanjingChina Jiangsu Key Laboratory of Advanced Structural Materials and Application Technology School of Materials Science and EngineeringNanjing Institute of TechnologyNanjingChina School of Physical and Mathematical Sciences Nanjing Tech UniversityNanjingChina School of Engineering Royal Melbourne Institute of TechnologyMelbourneAustralia
This paper proposes a new thermoviscoelastic finite deformation model incorporating dual relaxation mechanisms to predict the complete thermo-mechanical response of amorphous shape memory *** model is underpinned by t... 详细信息
来源: 评论
A Regional Network Topology Construction Algorithm Based on Sampling Measurement  5
A Regional Network Topology Construction Algorithm Based on ...
收藏 引用
2021 5th International Workshop on advanced Algorithms and Control engineering, IWAACE 2021
作者: Tao, Zhiyuan Liu, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ... 详细信息
来源: 评论
DRTaint: A Dynamic Taint Analysis Framework Supporting Correlation Analysis between Data Regions
DRTaint: A Dynamic Taint Analysis Framework Supporting Corre...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Yang, Pan Kang, Fei Zhao, Yuntian Shu, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Taint analysis is a common technology for software analysis, which is widely used in the region of information security. Aiming at the problem that the existing binary program dynamic taint analysis framework does not... 详细信息
来源: 评论
A survey of offensive security research on PLCs
A survey of offensive security research on PLCs
收藏 引用
2021 International Conference on Computer, Communication, Control, Automation and Robotics, CCCAR 2021
作者: Ma, Rongkuan Wei, Qiang Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS... 详细信息
来源: 评论
A software upgrade security analysis method based on program analysis
A software upgrade security analysis method based on program...
收藏 引用
2021 IEEE International Conference on Computer Science, Electronic Information engineering and Intelligent Control Technology, CEI 2021
作者: Lv, Xiaoshao Shu, Hui Kang, Fei Huang, Yuyao State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi... 详细信息
来源: 评论