咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 878 篇 会议
  • 3 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 691 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 174 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 核科学与技术
    • 34 篇 冶金工程
  • 1,003 篇 理学
    • 548 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 118 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 616 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 93 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 64 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 51 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是271-280 订阅
排序:
DEM-bond model: A computational framework for designing mechanically enhanced polymer nanosphere-based ordered nanostructures
收藏 引用
Materials and Design 2025年 253卷
作者: Chen, Dan Chen, Zhiren Zhang, Tengfang Zhu, Zhihong Zhou, Qingwei Luo, Fang Wu, Fan Wang, Yunming Guo, Chucai College of Advanced Interdisciplinary Studies & Hunan Provincial Key Laboratory of Novel NanoOptoelec-tronic Information Materials and Devices National University of Defense Technology Hunan Changsha410073 China Nanhu Laser Laboratory National University of Defense Technology Hunan Changsha410073 China China Telecom Cloud Computing Co. Ltd. Hunan Branch Hunan Changsha410000 China Shenzhen TenFong Technology Co. Ltd Guangdong Shenzhen518055 China State Key Laboratory of Materials Processing and Die & Mould Technology School of Materials Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
Polymer nanosphere-based devices demonstrate exceptional optoelectronic properties due to the surface and size effect. However, the lack of predictive computational models for nanosphere interactions during fabricatio... 详细信息
来源: 评论
A Selection Strategy for Network Security Defense Based on a Time Game Model
A Selection Strategy for Network Security Defense Based on a...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Sun, Pengyu Zhang, Hengwei Ma, Junqiang Li, Chenwei Mi, Yan Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net... 详细信息
来源: 评论
New strategy for searching disturbance vector of SHA-1 collision attack
收藏 引用
Science China(Information Sciences) 2017年 第12期60卷 280-282页
作者: Hao FENG Guang ZENG Wenbao HAN Yang YANG State Key Laboratory of Mathematical Engineering and Advanced Computing Centrum Wiskunde & Informatica Amsterdam 1098 XG Zhengzhou Information Science and Technology Institute Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 1... 详细信息
来源: 评论
Timing Strategy for Active Detection of APT Attack Based on FlipIt Model and Q-learning Method
Timing Strategy for Active Detection of APT Attack Based on ...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Liu, Zhilin Zhang, Hengwei Sun, Pengyu Mi, Yan Zhang, Xiaoning Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr... 详细信息
来源: 评论
VFDETECT: A Vulnerable Code Clone Detection System Based on Vulnerability Fingerprint  3
VFDETECT: A Vulnerable Code Clone Detection System Based on ...
收藏 引用
2017 IEEE 第3届信息技术与机电一体化工程国际学术会议(ITOEC 2017)
作者: Zhen Liu Qiang Wei Yan Cao State Key Laboratory of Mathematical Engineering and Advanced Computing China National Digital Switching System Engineering and Technological Research Center
Vulnerable code reuse in open source software is a serious threat to software ***,the existing highefficiency methods for vulnerable code clone detection have a large number of false-nega
来源: 评论
Network Attack Intention Recognition Based on Signaling Game Model and Netlogo Simulation
Network Attack Intention Recognition Based on Signaling Game...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Zhang, Xiaoning Zhang, Hengwei Li, Chenwei Sun, Pengyu Liu, Zhilin Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes... 详细信息
来源: 评论
Utilization-Aware Data Variable Allocation on NVM- Based SPM in Real-Time Embedded Systems
收藏 引用
Journal of Electronic Science and Technology 2021年 第2期19卷 163-172页
作者: Jin-Yu Zhan Yi-Xin Li Wei Jiang Jun-Huan Yang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054 State Key Lab of Mathematical Engineering and Advanced Computing Wuxi 214000
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm fo... 详细信息
来源: 评论
Bi-population genetic algorithm-based attack path discovery research in large-scale networks  4
Bi-population genetic algorithm-based attack path discovery ...
收藏 引用
4th World Conference on computing and Communication Technologies, WCCCT 2021
作者: Tairan, Hu Wenlong, Gao Tianyang, Zhou Yichao, Zang National Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
with the growth of network scale, present researches on the attack path discovery often encounter the problem of search space explosion that results in fails. To tackle the problem of attack path discovery for large-s... 详细信息
来源: 评论
Population-Based Meta-Heuristic Optimization Algorithm Booster: An Evolutionary and Learning Competition Scheme
收藏 引用
Neurocomputing 2025年 643卷
作者: Jun Wang Junyu Dong Huiyu Zhou Xinghui Dong State Key Laboratory of Physical Oceanography and Faculty of Information Science and Engineering Ocean University of China China School of Computing and Mathematical Sciences University of Leicester UK
In a Population-Based Meta-Heuristic Optimization Algorithm (PMOA), individuals in the population will constantly generate new promising individuals, to form new populations. Although the population continuously chang...
来源: 评论
AFDM-Enabled Integrated Sensing and Communication: Theoretical Framework and Pilot Design
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Fan Wang, Zhaocheng Mao, Tianqi Jiao, Tianyu Zhuo, Yinxiao Wen, Miaowen Xiang, Wei Chen, Sheng Karagiannidis, George K. Department of Electronic Engineering Tsinghua University Beijing100084 China State Key Laboratory of CNS/ATM Beijing Institute of Technology Beijing100081 China Zhuhai519088 China School of Electronic and Information Engineering South China University of Technology Guangzhou China School of Computing Engineering and Mathematical Sciences La Trobe University MelbourneVIC3086 Australia School of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom Department of Electrical and Computer Engineering Aristotle University of Thessaloniki Greece
The integrated sensing and communication (ISAC) has been envisioned as one representative usage scenario of sixth-generation (6G) network. However, the unprecedented characteristics of 6G, especially the doubly disper... 详细信息
来源: 评论