咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1957 条 记 录,以下是1-10 订阅
排序:
Software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 评论
Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1223-1243页
作者: Yuancong Chai Yuefei Zhu Wei Lin Ding Li State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou450001China
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged... 详细信息
来源: 评论
Research Progress of Reverse Monte Carlo and Its Application in Josephson Junction Barrier Layer
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第12期137卷 2077-2109页
作者: Junling Qiu Huihui Sun Shuya Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
As indispensable components of superconducting circuit-based quantum computers,Josephson junctions determine how well superconducting qubits *** Monte Carlo(RMC)can be used to recreate Josephson junction’s atomic str... 详细信息
来源: 评论
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 694-707页
作者: Wangxin FENG Xiangyang LUO Tengyao LI Chunfang YANG State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Cyberspace Situation Awareness of Henan Province
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of net... 详细信息
来源: 评论
LaTLS: A Lattice-Based TLS Proxy Protocol
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 313-321页
作者: ZHANG Xinglong CHENG Qingfeng LI Yuting State Key Laboratory of Mathematical Engineering and Advanced Computing
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot... 详细信息
来源: 评论
IP2vec:an IP node representation model for IP geolocation
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 189-204页
作者: Fan ZHANG Meijuan YIN Fenlin LIU Xiangyang LUO Shuodi ZU State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou 450001China
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation ... 详细信息
来源: 评论
Integrating Neighborhood Geographic Distribution and Social Structure Influence for Social Media User Geolocation
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第9期140卷 2513-2532页
作者: Meng Zhang Xiangyang Luo Ningbo Huang Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
Geolocating social media users aims to discover the real geographical locations of users from their publicly available data,which can support online location-based applications such as disaster alerts and local conten... 详细信息
来源: 评论
Pre-trained Semantic Interaction based Inductive Graph Neural Networks for Text Classification  31
Pre-trained Semantic Interaction based Inductive Graph Neura...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Shiyu Zhou, Gang Lu, Jicang Chen, Jing Huang, Ningbo State Key Laboratory of Mathematical Engineering and Advanced Computing China
Nowadays, research of Text Classification (TC) based on graph neural networks (GNNs) is on the rise. Both inductive methods and transductive methods have made significant progress. For transductive methods, the semant... 详细信息
来源: 评论
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 455-465页
作者: Jialin Li Xiangyang Luo Yi Zhang Pei Zhang Chunfang Yang Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography... 详细信息
来源: 评论
Meta Transductive Linear Probing for Few-Shot Node Classification  5
Meta Transductive Linear Probing for Few-Shot Node Classific...
收藏 引用
5th IEEE International Conference on Pattern Recognition and Machine Learning, PRML 2024
作者: Lan, Mingjing Huang, Ningbo Zhou, Gang Xia, Yi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Graph few-shot learning aims to predict well by training with very few labeled data. Meta learning has been the most popular solution for few-shot learning problem. However, transductive linear probing shows that fine... 详细信息
来源: 评论