咨询与建议

限定检索结果

文献类型

  • 1,112 篇 期刊文献
  • 889 篇 会议
  • 1 册 图书

馆藏范围

  • 2,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 709 篇 计算机科学与技术...
    • 576 篇 软件工程
    • 181 篇 信息与通信工程
    • 180 篇 电子科学与技术(可...
    • 173 篇 电气工程
    • 128 篇 控制科学与工程
    • 124 篇 化学工程与技术
    • 106 篇 材料科学与工程(可...
    • 96 篇 生物工程
    • 92 篇 光学工程
    • 81 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 51 篇 生物医学工程(可授...
    • 45 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,023 篇 理学
    • 555 篇 物理学
    • 384 篇 数学
    • 121 篇 化学
    • 121 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 81 篇 地球物理学
    • 60 篇 系统科学
  • 223 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 86 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 31 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 software
  • 24 篇 cryptography
  • 20 篇 malware
  • 19 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 625 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,743 篇 英文
  • 218 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and Advanced computing"
2002 条 记 录,以下是981-990 订阅
排序:
A Formal Verification Method for Security Protocol Implementations Based on Model Learning and Tamarin
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1871卷
作者: Xieli Zhang Yuefei Zhu Chunxiang Gu Xuyang Miao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China Henan Key Laboratory of Network Cryptography Technology Zhengzhou Henan 450002 China
The verification of security protocol implementations is notoriously difficult and important. In this paper, combining with the model learning using Tamarin, a formal verification tool of protocol specification, a for...
来源: 评论
Skyrmions in nanorings: a versatile platform for Skyrmionics
arXiv
收藏 引用
arXiv 2023年
作者: Kechrakos, Dimitris Puliafito, Vito Riveros, Alejandro Liu, Jiahao Jiang, Wanjun Carpentieri, Mario Tomasello, Riccardo Finocchio, Giovanni Athens Greece Department of Electrical and Information Engineering Technical University of Bari Bari70125 Italy Escuela de Ingeniería Universidad Central de Chile Santiago8330601 Chile Department of Mathematical and Computer Sciences Physical Sciences and Earth Sciences University of Messina MessinaI-98166 Italy State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics Tsinghua University Beijing100084 China Frontier Science Center for Quantum Information Tsinghua University Beijing100084 China College of Advanced Interdisciplinary Studies & Hunan Provincial Key Laboratory of Novel Nano-Optoelectronic Information Materials and Devices National University of Defense Technology Hunan Changsha410073 China
The dynamical properties of skyrmions can be exploited to build devices with new functionalities. Here, we first investigate a skyrmion-based ring-shaped device by means of micromagnetic simulations and Thiele’s equa... 详细信息
来源: 评论
Poison over troubled forwarders: a cache poisoning attack targeting DNS forwarding device  20
Poison over troubled forwarders: a cache poisoning attack ta...
收藏 引用
Proceedings of the 29th USENIX Conference on Security Symposium
作者: Xiaofeng Zheng Chaoyi Lu Jian Peng Qiushi Yang Dongjie Zhou Baojun Liu keyu Man Shuang Hao Haixin Duan Zhiyun Qian Tsinghua University and Qi An Xin Technology Research Institute Tsinghua University Qi An Xin Technology Research Institute State Key Laboratory of Mathematical Engineering and Advanced Computing University of California Riverside University of Texas at Dallas
In today's DNS infrastructure, DNS forwarders are devices standing in between DNS clients and recursive resolvers. The devices often serve as ingress servers for DNS clients, and instead of resolving queries, they...
来源: 评论
A review of cryptographic algorithm recognition technology for binary code
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1856卷
作者: Chenxia Zhao Fei Kang Ju Yang Hui Shu Zhengzhou University Zhengzhou Henan 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo...
来源: 评论
Nonreciprocal Single-Photon Band Structure
收藏 引用
Physical Review Letters 2022年 第20期128卷 203602-203602页
作者: Jiang-Shan Tang Wei Nie Lei Tang Mingyuan Chen Xin Su Yanqing Lu Franco Nori keyu Xia College of Engineering and Applied Sciences National Laboratory of Solid State Microstructures and Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing 210023 China School of Physics Nanjing University Nanjing 210023 China RIKEN Quantum Computing Center RIKEN Cluster for Pioneering Research Wako-shi Saitama 351-0198 Japan Center for Joint Quantum Studies and Department of Physics School of Science Tianjin University Tianjin 300350 China School of Electronic Science and Engineering Nanjing University Nanjing 210023 China Physics Department The University of Michigan Ann Arbor Michigan 48109-1040 USA Jiangsu Key Laboratory of Artificial Functional Materials Nanjing University Nanjing 210023 China Key Laboratory of Intelligent Optical Sensing and Manipulation (Nanjing University) Ministry of Education Nanjing 210023 China
We study a single-photon band structure in a one-dimensional coupled-resonator optical waveguide that chirally couples to an array of two-level quantum emitters (QEs). The chiral interaction between the resonator mode... 详细信息
来源: 评论
Stabilization of continuous-time Markov/semi-Markov jump linear systems via finite data-rate feedback
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Jingyi Feng, Jianwen Xu, Chen Wu, Xiaoqun Lü, Jinhu College of Mathematics and Statistics Shenzhen University Shenzhen518060 China School of Mathematics and Statistics Hubei Key Laboratory of Computational Science Wuhan University Wuhan China State Key Laboratory of Software Development Environment School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China
This paper investigates almost sure exponential stabilization of continuous-time Markov jump linear systems (MJLSs) under communication data-rate constraints by introducing sampling and quantization into the feedback ... 详细信息
来源: 评论
A Security-Sensitive Function Mining Framework for Source Code  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Chen, Lin Yang, Chunfang Liu, Fenlin Gong, Daofu Ding, Shichang Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China University of Göttingen Goldschmidtstr. 7 Göttingen37077 Germany
The security-sensitive functions can be effectively used to improve the efficiency of vulnerability mining techniques, but mining security-sensitive functions of the large-scale code base is difficult. An automatic mi... 详细信息
来源: 评论
Moment-Based Space-Variant Shack–Hartmann Wavefront Reconstruction
SSRN
收藏 引用
SSRN 2023年
作者: Feng, Fan Liang, Chen Chen, Dongdong Du, Ke Yang, Runjia Lu, Chang Chen, Shumin He, Wenting Xu, Pingyong Chen, Liangyi Tao, Louis Mao, Heng Center for Bioinformatics National Laboratory of Protein Engineering and Plant Genetic Engineering School of Life Sciences Peking University Beijing100871 China GBA Institute of Collaborative Innovation Guangzhou510300 China LMAM School of Mathematical Sciences Peking University Beijing100871 China School of Software and Microelectronics Peking University Beijing100871 China State Key Laboratory of Membrane Biology Beijing Key Laboratory of Cardiometabolic Molecular Medicine Institute of Molecular Medicine Center for Life Sciences College of Future Technology Peking University Beijing100871 China School of Instrumentation and Optoelectronic Engineering Beihang University Beijing100191 China Key Laboratory of RNA Biology Institute of Biophysics Chinese Academy of Sciences Beijing100101 China National Laboratory of Biomacromolecules Institute of Biophysics Chinese Academy of Sciences Beijing100101 China PKU-IDG/McGovern Institute for Brain Research Beijing100871 China Beijing Academy of Artificial Intelligence Beijing100871 China Center for Quantitative Biology Peking University Beijing100871 China Beijing Advanced Innovation Center for Imaging Theory and Technology Capital Normal University Beijing100871 China
Based on image moment theory, an approach for space-variant Shack–Hartmann wavefront reconstruction is presented in this article. The relation between the moment of a pair of subimages and the local transformation co... 详细信息
来源: 评论
Moment-based Space-variant Shack-Hartmann Wavefront Reconstruction
arXiv
收藏 引用
arXiv 2023年
作者: Feng, Fan Liang, Chen Chen, Dongdong Du, Ke Yang, Runjia Lu, Chang Chen, Shumin He, Wenting Xu, Pingyong Chen, Liangyi Tao, Louis Mao, Heng Center for Bioinformatics National Laboratory of Protein Engineering and Plant Genetic Engineering School of Life Sciences Peking University Beijing100871 China GBA Institute of Collaborative Innovation Guangzhou510300 China LMAM School of Mathematical Sciences Peking University Beijing100871 China School of Software and Microelectronics Peking University Beijing100871 China State Key Laboratory of Membrane Biology Beijing Key Laboratory of Cardiometabolic Molecular Medicine Institute of Molecular Medicine Center for Life Sciences College of Future Technology Peking University Beijing100871 China School of Instrumentation and Optoelectronic Engineering Beihang University Beijing100191 China Key Laboratory of RNA Biology Institute of Biophysics Chinese Academy of Sciences Beijing100101 China National Laboratory of Biomacromolecules Institute of Biophysics Chinese Academy of Sciences Beijing100101 China PKU-IDG/McGovern Institute for Brain Research Beijing100871 China Beijing Academy of Artificial Intelligence Beijing100871 China Center for Quantitative Biology Peking University Beijing100871 China Beijing Advanced Innovation Center for Imaging Theory and Technology Capital Normal University Beijing100871 China
This article presents an approach for space-variant Shack-Hartmann wavefront reconstruction based on image moment theory. We derive the relation between the moment of a pair of subimages and the local transformation c... 详细信息
来源: 评论
Virasoro Generators in the Fibonacci Model Tensor Network — Tackling Finite Size Effects
arXiv
收藏 引用
arXiv 2022年
作者: Zeng, Xiangdong Wang, Ruoshui Shen, Ce Hung, Ling-Yan State Key Laboratory of Surface Physics Fudan University Shanghai200433 China Department of Physics Center for Field Theory and Particle Physics Fudan University Shanghai200433 China Cornell University IthacaNY14853 United States Institute for Advanced Study Tsinghua University Beijing100084 China Institute for Nanoelectronic devices and Quantum computing Fudan University Shanghai200433 China Yau Mathematical Sciences Center Tsinghua University Beijing100084 China
In this paper, we extend the method implementing Virasoro operators in a tensor network we proposed in [1] and test it on the Fibonacci model, which is known to suffer from far more finite size effects. To pick up the... 详细信息
来源: 评论