咨询与建议

限定检索结果

文献类型

  • 1,107 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,993 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,288 篇 工学
    • 701 篇 计算机科学与技术...
    • 571 篇 软件工程
    • 183 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 172 篇 电气工程
    • 124 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 112 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 86 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,018 篇 理学
    • 553 篇 物理学
    • 386 篇 数学
    • 124 篇 统计学(可授理学、...
    • 120 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 220 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 622 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 university of ch...
  • 97 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 87 篇 school of physic...
  • 84 篇 center for astro...
  • 83 篇 college of physi...
  • 82 篇 school of physic...
  • 81 篇 moscow institute...
  • 80 篇 institute of fro...
  • 80 篇 school of physic...
  • 80 篇 national space s...
  • 78 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,800 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State Key Laboratory of Mathematical Engineering and advanced computing"
1993 条 记 录,以下是291-300 订阅
排序:
A review of cryptographic algorithm recognition technology for binary code
A review of cryptographic algorithm recognition technology f...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Zhao, Chenxia Kang, Fei Yang, Ju Shu, Hui Zhengzhou University Zhengzhou Henan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo... 详细信息
来源: 评论
Efficient Sparse Attention needs Adaptive Token Release
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Chaoran Zou, Lixin Luo, Dan Tang, Min Luo, Xiangyang Li, Zihao Li, Chenliang Wuhan University China Lehigh University United States Monash University Australia State Key Lab of Mathematical Engineering and Advanced Computing China
In recent years, Large Language Models (LLMs) have demonstrated remarkable capabilities across a wide array of text-centric tasks. However, their 'large' scale introduces significant computational and storage ... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback  2
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
2nd International Conference on Computer Communication and Network Security, CCNS 2021
作者: Yuwen, Shao Zheng, Zhang Bingzheng, Li Xinsheng, Ji State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering Technological RD Center Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
A pretrained transformer model for decoding individual glucose dynamics from continuous glucose monitoring data
收藏 引用
National Science Review 2025年 第5期12卷 362-381页
作者: Yurun Lu Dan Liu Zhongming Liang Rui Liu Pei Chen Yitong Liu Jiachen Li Zhanying Feng Lei M.Li Bin Sheng Weiping Jia Luonan Chen Huating Li Yong Wang Center for Excellence in Mathematical Sciences National Center for Mathematics and Interdisciplinary Sciences Hua Loo-Keng Center for Mathematical Sciences Key Laboratory of Management Decision and Information System Academy of Mathematics and Systems ScienceChinese Academy of Sciences School of Mathematics University of Chinese Academy of SciencesChinese Academy of Sciences Department of Endocrinology and Metabolism Shanghai Sixth People's Hospital Affiliated to Shanghai Jiao Tong University School of MedicineShanghai Diabetes InstituteShanghai Clinical Center for Diabetes Shanghai Key Laboratory of Diabetes Mellitus Key Laboratory of Systems Health Science of Zhejiang Province School of Life ScienceHangzhou Institute for Advanced StudyUniversity of Chinese Academy of Sciences BGI-Research School of Mathematics South China University of Technology Department of Statistics Department of Biomedical Data Science Bio-X ProgramStanford University Department of Computer Science and Engineering Shanghai Jiao Tong University State Key Laboratory of Cell Biology Center for Excellence in Molecular Cell Science Shanghai Institute of Biochemistry and Cell Biology Chinese Academy of Sciences Guangdong Institute of Intelligence Science and Technology Pazhou Laboratory (Huangpu)
Continuous glucose monitoring(CGM) technology has grown rapidly to track real-time blood glucose levels and trends with improved sensor accuracy. The ease of use and wide availability of CGM will facilitate safe and e... 详细信息
来源: 评论
Tuning 2D magnetism in Fe3+XGeTe2 films by element doping
收藏 引用
National Science Review 2022年 第6期9卷 163-170页
作者: Shanshan Liu Zihan Li Ke Yang Enze Zhang Awadhesh Narayan Xiaoqian Zhang Jiayi Zhu Wenqing Liu Zhiming Liao Masaki Kudo Takaaki Toriyama Yunkun Yang Qiang Li Linfeng Ai Ce Huang Jiabao Sun Xiaojiao Guo Wenzhong Bao Qingsong Deng Yanhui Chen Lifeng Yin Jian Shen Xiaodong Han Syo Matsumura Jin Zou Yongbing Xu Xiaodong Xu Hua Wu Faxian Xiu State Key Laboratory of Surface Physics and Department of Physics Fudan University Institute for Nanoelectronic Devices and Quantum Computing Fudan University College of Science University of Shanghai for Science and Technology Laboratory for Computational Physical Sciences(MOE) Fudan University Solid State and Structural Chemistry Unit Indian Institute of Science School of Electronic Science and Engineering Nanjing University Department of Physics University of Washington Department of Electronic Engineering Royal Holloway University of London Materials Engineering The University of Queensland Beijing Key Laboratory of Microstructure and Property of Advanced Materials Institute of Microstructure and Property of Advanced Materials Beijing University of Technology The Ultramicroscopy Research Center Kyushu University State Key Laboratory of ASIC and System School of Microelectronics Fudan University Collaborative Innovation Center of Advanced Microstructures Department of Applied Quantum Physics and Nuclear Engineering Kyushu University Centre for Microscopy and Microanalysis The University of Queensland Shanghai Research Center for Quantum Sciences
Two-dimensional(2D) ferromagnetic materials have been discovered with tunable magnetism and orbital-driven nodal-line features. Controlling the 2D magnetism in exfoliated nanoflakes via electric/magnetic fields enab... 详细信息
来源: 评论
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1307-1324页
作者: Ke Liu Jing-Yi Wang Qiang Wei Zhen-Yong Zhang Jun Sun Rong-Kuan Ma Rui-Long Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China College of Computer Science and Technology Guizhou UniversityGuiyang 550025China School of Information Systems Singapore Management UniversitySingapore 689867Singapore
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ... 详细信息
来源: 评论
A Cross-Platform Instant Messaging User Association Method Based on Spatio-temporal Trajectory  8th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Li, Lingling Yang, Yang Liu, Fenlin School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Intelligent Engineering Zhengzhou University of Aeronautics Zhengzhou450000 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore
The current research on cross-platform instant messaging user association is mainly divided into two categories: based on user attributes and based on user behavior. Methods based on user attributes mainly identify us... 详细信息
来源: 评论
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon via exploiting mitigations  23
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon v...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Tingting Yin Zicong Gao Zhenghang Xiao Zheyu Ma Min Zheng Chao Zhang Tsinghua University and Ant Group State Key Laboratory of Mathematical Engineering and Advanced Computing Hunan University Tsinghua University Ant Group Tsinghua University and Zhongguancun Laboratory
macOS drivers, i.e., Kernel EXTensions (kext), are attractive attack targets for adversaries. However, automatically discovering vulnerabilities in kexts is extremely challenging because kexts are mostly closed-source...
来源: 评论
Thermally Evaporated ZnSe for Efficient and Stable Regular/Inverted Perovskite Solar Cells by Enhanced Electron Extraction
收藏 引用
Energy & Environmental Materials 2023年 第5期6卷 440-448页
作者: Xin Li Guibin Shen Xin Ren Ng Zhiyong Liu Yun Meng Yongwei Zhang Cheng Mu Zhi Gen Yu Fen Lin Solar Energy Research Institute of Singapore(SERIS) National University of SingaporeSingapore 117574Singapore Key Laboratory of Advanced Light Conversion Materials and Biophotonics Department of ChemistryRenmin University of ChinaBeijing 100872China State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Materials Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore Shandong Provincial Engineering and Technical Center of Light Manipulation and Shandong Provincial Key Laboratory of Optics and Photonic Devices School of Physics and ElectronicsShandong Normal UniversityJinan 250014China Institute of High Performance Computing A^(*)STARSingapore 138632Singapore
Electron transport layers(ETLs)are crucial for achieving efficient and stable planar perovskite solar cells(PSCs).Reports on versatile inorganic ETLs using a simple film fabrication method and applicability for both l... 详细信息
来源: 评论
BA-Audit: Blockchain-Based Public Auditing for Aggregated Data Sharing in Edge-Assisted IoT  1
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Liu, Mingxi Lu, Ning Yin, Jingli Cheng, Qingfeng Shi, Wenbo School of Computer Science and Engineering Northeastern University Shenyang China School of Computer Science and Technology Xidian University Xi’an China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou China
With the massive placement of sensors leading to a surge in IoT data, it is wise for system administrators to use data aggregation strategies to collect and share data in edge-assisted IoT scenarios because traditiona... 详细信息
来源: 评论