咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
1957 条 记 录,以下是81-90 订阅
排序:
Rotation Model Enhancement for Adversarial Attack
Rotation Model Enhancement for Adversarial Attack
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Li, Zheming Liu, Hao Yang, Bo Li, Chenwei Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur... 详细信息
来源: 评论
Code Clone Detection Based on Code Semantic Enhancement Model
Code Clone Detection Based on Code Semantic Enhancement Mode...
收藏 引用
2023 International Conference on Intelligent Communication and Computer engineering, ICICCE 2023
作者: Chunyan, Zhang Ziang, Shen Chen, Liang State Key of Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Beijing University of Civil Engineering and Architecture Department of Electrical and Information Engineering Beijing China
Code clones are code fragments that are similar in composition or semantics of code statements, which can significantly improve software development efficiency and reduce costs by improving the quality of reusable cod... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  6
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Li, Chenwei Li, Zheming Yang, Bo Zhang, Hengwei State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论
Traceability Method of Network Attack Based on Evolutionary Game
Traceability Method of Network Attack Based on Evolutionary ...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Zhang, Xiaoning Sun, Pengyu Liu, Xiaohu Ma, Junqiang Zhang, Yuchen State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz... 详细信息
来源: 评论
A Cross-Platform Instant Messaging User Association Method Based on Supervised Learning  4th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
4th International Conference on Big Data and Security, ICBDS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Shi, Wenqi Guo, Jiashan School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
To solve the multi-platform user association problem of complex trajectory matching process and high time cost in cross-platform association positioning of instant messaging users, and at the same time make full use o... 详细信息
来源: 评论
Solve the False-Positive Problem of the Mimic System Based on the Best Mimic Component Set
收藏 引用
China Communications 2022年 第5期19卷 253-266页
作者: Yuwen Shao Zheng Zhang Xiaomei Wang Chuanxing Pan Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
At present,there is a problem of false positives caused by the too vast mimic scope in mimic transformation *** studies have focused on the“compensation”method to deal with this problem,which is expensive and cannot... 详细信息
来源: 评论
Social User Geolocation Method Based on POI Location Feature Enhancement in Context  1
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Liu, Yu Qiao, Yaqiong Liu, Yimin Du, Shaoyong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China School of Information Engineering North China University of Water Resources and Electric Power Zhengzhou China
The geolocation information in social media user generated text is one of the important bases for inferring users' location. The existing methods often rely on the mentioned Point of Interest (POI) and location In... 详细信息
来源: 评论
Cathodic electrolyte engineering toward durable Zn–Mn aqueous batteries
收藏 引用
National Science Review 2023年 第12期10卷 42-44页
作者: Wanhai Zhou Hong Jin Fan Dongyuan Zhao Dongliang Chao Laboratory of Advanced Materials Shanghai Key Laboratory of Molecular Catalysis and Innovative Materials State Key Laboratory of Molecular Engineering of Polymers College of Chemistry and Materials Fudan University School of Physical and Mathematical Sciences Nanyang Technological University
Zn–Mn aqueous batteries (ZMABs)present potential for grid-scale energy storage with the benefits of low cost,high safety and eco-friendliness [1].Since 1866 (Leclanchéwet cell), we have witnessed the prosperity ...
来源: 评论
Path test data generation using adaptive simulated annealing particle swarm optimization
收藏 引用
Soft computing 2024年 第17-18期28卷 9587-9607页
作者: Jiao, Chongyang Zhou, Qinglei State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Henan Information Engineering School Zhengzhou Vocational College of Industrial Safety Zhengzhou450000 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi... 详细信息
来源: 评论
A Vulnerability Automation Exploitation Method Based on Symbolic Execution
A Vulnerability Automation Exploitation Method Based on Symb...
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information service room Unit 32738 China
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln... 详细信息
来源: 评论