咨询与建议

限定检索结果

文献类型

  • 1,099 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,985 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,267 篇 工学
    • 704 篇 计算机科学与技术...
    • 573 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 170 篇 电气工程
    • 122 篇 控制科学与工程
    • 122 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 92 篇 光学工程
    • 79 篇 网络空间安全
    • 70 篇 机械工程
    • 60 篇 仪器科学与技术
    • 56 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,011 篇 理学
    • 551 篇 物理学
    • 384 篇 数学
    • 122 篇 统计学(可授理学、...
    • 119 篇 化学
    • 115 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 deep neural netw...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 85 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced Computing"
1985 条 记 录,以下是961-970 订阅
排序:
A review of cryptographic algorithm recognition technology for binary code
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1856卷
作者: Chenxia Zhao Fei Kang Ju Yang Hui Shu Zhengzhou University Zhengzhou Henan 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo...
来源: 评论
Poison over troubled forwarders: a cache poisoning attack targeting DNS forwarding device  20
Poison over troubled forwarders: a cache poisoning attack ta...
收藏 引用
Proceedings of the 29th USENIX Conference on Security Symposium
作者: Xiaofeng Zheng Chaoyi Lu Jian Peng Qiushi Yang Dongjie Zhou Baojun Liu keyu Man Shuang Hao Haixin Duan Zhiyun Qian Tsinghua University and Qi An Xin Technology Research Institute Tsinghua University Qi An Xin Technology Research Institute State Key Laboratory of Mathematical Engineering and Advanced Computing University of California Riverside University of Texas at Dallas
In today's DNS infrastructure, DNS forwarders are devices standing in between DNS clients and recursive resolvers. The devices often serve as ingress servers for DNS clients, and instead of resolving queries, they...
来源: 评论
Nonreciprocal Single-Photon Band Structure
收藏 引用
Physical Review Letters 2022年 第20期128卷 203602-203602页
作者: Jiang-Shan Tang Wei Nie Lei Tang Mingyuan Chen Xin Su Yanqing Lu Franco Nori keyu Xia College of Engineering and Applied Sciences National Laboratory of Solid State Microstructures and Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing 210023 China School of Physics Nanjing University Nanjing 210023 China RIKEN Quantum Computing Center RIKEN Cluster for Pioneering Research Wako-shi Saitama 351-0198 Japan Center for Joint Quantum Studies and Department of Physics School of Science Tianjin University Tianjin 300350 China School of Electronic Science and Engineering Nanjing University Nanjing 210023 China Physics Department The University of Michigan Ann Arbor Michigan 48109-1040 USA Jiangsu Key Laboratory of Artificial Functional Materials Nanjing University Nanjing 210023 China Key Laboratory of Intelligent Optical Sensing and Manipulation (Nanjing University) Ministry of Education Nanjing 210023 China
We study a single-photon band structure in a one-dimensional coupled-resonator optical waveguide that chirally couples to an array of two-level quantum emitters (QEs). The chiral interaction between the resonator mode... 详细信息
来源: 评论
Stabilization of continuous-time Markov/semi-Markov jump linear systems via finite data-rate feedback
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Jingyi Feng, Jianwen Xu, Chen Wu, Xiaoqun Lü, Jinhu College of Mathematics and Statistics Shenzhen University Shenzhen518060 China School of Mathematics and Statistics Hubei Key Laboratory of Computational Science Wuhan University Wuhan China State Key Laboratory of Software Development Environment School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China
This paper investigates almost sure exponential stabilization of continuous-time Markov jump linear systems (MJLSs) under communication data-rate constraints by introducing sampling and quantization into the feedback ... 详细信息
来源: 评论
Moment-Based Space-Variant Shack–Hartmann Wavefront Reconstruction
SSRN
收藏 引用
SSRN 2023年
作者: Feng, Fan Liang, Chen Chen, Dongdong Du, Ke Yang, Runjia Lu, Chang Chen, Shumin He, Wenting Xu, Pingyong Chen, Liangyi Tao, Louis Mao, Heng Center for Bioinformatics National Laboratory of Protein Engineering and Plant Genetic Engineering School of Life Sciences Peking University Beijing100871 China GBA Institute of Collaborative Innovation Guangzhou510300 China LMAM School of Mathematical Sciences Peking University Beijing100871 China School of Software and Microelectronics Peking University Beijing100871 China State Key Laboratory of Membrane Biology Beijing Key Laboratory of Cardiometabolic Molecular Medicine Institute of Molecular Medicine Center for Life Sciences College of Future Technology Peking University Beijing100871 China School of Instrumentation and Optoelectronic Engineering Beihang University Beijing100191 China Key Laboratory of RNA Biology Institute of Biophysics Chinese Academy of Sciences Beijing100101 China National Laboratory of Biomacromolecules Institute of Biophysics Chinese Academy of Sciences Beijing100101 China PKU-IDG/McGovern Institute for Brain Research Beijing100871 China Beijing Academy of Artificial Intelligence Beijing100871 China Center for Quantitative Biology Peking University Beijing100871 China Beijing Advanced Innovation Center for Imaging Theory and Technology Capital Normal University Beijing100871 China
Based on image moment theory, an approach for space-variant Shack–Hartmann wavefront reconstruction is presented in this article. The relation between the moment of a pair of subimages and the local transformation co... 详细信息
来源: 评论
A Security-Sensitive Function Mining Framework for Source Code  5th
A Security-Sensitive Function Mining Framework for Source Co...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Chen, Lin Yang, Chunfang Liu, Fenlin Gong, Daofu Ding, Shichang Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China University of Göttingen Goldschmidtstr. 7 Göttingen37077 Germany
The security-sensitive functions can be effectively used to improve the efficiency of vulnerability mining techniques, but mining security-sensitive functions of the large-scale code base is difficult. An automatic mi... 详细信息
来源: 评论
Moment-based Space-variant Shack-Hartmann Wavefront Reconstruction
arXiv
收藏 引用
arXiv 2023年
作者: Feng, Fan Liang, Chen Chen, Dongdong Du, Ke Yang, Runjia Lu, Chang Chen, Shumin He, Wenting Xu, Pingyong Chen, Liangyi Tao, Louis Mao, Heng Center for Bioinformatics National Laboratory of Protein Engineering and Plant Genetic Engineering School of Life Sciences Peking University Beijing100871 China GBA Institute of Collaborative Innovation Guangzhou510300 China LMAM School of Mathematical Sciences Peking University Beijing100871 China School of Software and Microelectronics Peking University Beijing100871 China State Key Laboratory of Membrane Biology Beijing Key Laboratory of Cardiometabolic Molecular Medicine Institute of Molecular Medicine Center for Life Sciences College of Future Technology Peking University Beijing100871 China School of Instrumentation and Optoelectronic Engineering Beihang University Beijing100191 China Key Laboratory of RNA Biology Institute of Biophysics Chinese Academy of Sciences Beijing100101 China National Laboratory of Biomacromolecules Institute of Biophysics Chinese Academy of Sciences Beijing100101 China PKU-IDG/McGovern Institute for Brain Research Beijing100871 China Beijing Academy of Artificial Intelligence Beijing100871 China Center for Quantitative Biology Peking University Beijing100871 China Beijing Advanced Innovation Center for Imaging Theory and Technology Capital Normal University Beijing100871 China
This article presents an approach for space-variant Shack-Hartmann wavefront reconstruction based on image moment theory. We derive the relation between the moment of a pair of subimages and the local transformation c... 详细信息
来源: 评论
Virasoro Generators in the Fibonacci Model Tensor Network — Tackling Finite Size Effects
arXiv
收藏 引用
arXiv 2022年
作者: Zeng, Xiangdong Wang, Ruoshui Shen, Ce Hung, Ling-Yan State Key Laboratory of Surface Physics Fudan University Shanghai200433 China Department of Physics Center for Field Theory and Particle Physics Fudan University Shanghai200433 China Cornell University IthacaNY14853 United States Institute for Advanced Study Tsinghua University Beijing100084 China Institute for Nanoelectronic devices and Quantum computing Fudan University Shanghai200433 China Yau Mathematical Sciences Center Tsinghua University Beijing100084 China
In this paper, we extend the method implementing Virasoro operators in a tensor network we proposed in [1] and test it on the Fibonacci model, which is known to suffer from far more finite size effects. To pick up the... 详细信息
来源: 评论
Comments on Privacy-preserving Yoking proof with key exchange in the three-party setting
收藏 引用
International Journal of Network Security 2019年 第2期21卷 355-358页
作者: Cheng, Qingfeng Zhang, Xinglong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan Province450001 China
In 2017, Tian, Yang and Mu presented a new three-party key exchange protocol YPKE in radio frequency identification environment, which is based on the HMQV protocol. They claimed that the proposed YPKE protocol in the... 详细信息
来源: 评论
A pretrained transformer model for decoding individual glucose dynamics from continuous glucose monitoring data
收藏 引用
National Science Review 2025年 第5期 362-381页
作者: Yurun Lu Dan Liu Zhongming Liang Rui Liu Pei Chen Yitong Liu Jiachen Li Zhanying Feng Lei M.Li Bin Sheng Weiping Jia Luonan Chen Huating Li Yong Wang Center for Excellence in Mathematical Sciences National Center for Mathematics and Interdisciplinary Sciences Hua Loo-Keng Center for Mathematical Sciences Key Laboratory of Management Decision and Information System Academy of Mathematics and Systems ScienceChinese Academy of Sciences School of Mathematics University of Chinese Academy of SciencesChinese Academy of Sciences Department of Endocrinology and Metabolism Shanghai Sixth People's Hospital Affiliated to Shanghai Jiao Tong University School of MedicineShanghai Diabetes InstituteShanghai Clinical Center for Diabetes Shanghai Key Laboratory of Diabetes Mellitus Key Laboratory of Systems Health Science of Zhejiang Province School of Life ScienceHangzhou Institute for Advanced StudyUniversity of Chinese Academy of Sciences BGI-Research School of Mathematics South China University of Technology Department of Statistics Department of Biomedical Data Science Bio-X ProgramStanford University Department of Computer Science and Engineering Shanghai Jiao Tong University State Key Laboratory of Cell Biology Center for Excellence in Molecular Cell Science Shanghai Institute of Biochemistry and Cell Biology Chinese Academy of Sciences Guangdong Institute of Intelligence Science and Technology Pazhou Laboratory (Huangpu)
Continuous glucose monitoring(CGM) technology has grown rapidly to track real-time blood glucose levels and trends with improved sensor accuracy. The ease of use and wide availability of CGM will facilitate safe and e...
来源: 评论