咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 778 篇 期刊文献

馆藏范围

  • 1,587 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,032 篇 工学
    • 623 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 100 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 78 篇 材料科学与工程(可...
    • 76 篇 网络空间安全
    • 64 篇 光学工程
    • 51 篇 机械工程
    • 50 篇 核科学与技术
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 750 篇 理学
    • 423 篇 物理学
    • 253 篇 数学
    • 96 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 186 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 25 篇 security
  • 25 篇 training
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 629 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,455 篇 英文
  • 98 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1587 条 记 录,以下是1071-1080 订阅
排序:
ChanDet: Detection Model for Potential Channel of iOS Applications
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: GuoMiao Zhou Ming Duan Qi Xi Hao Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450000 China
Despite providing iOS the security, comfortable, powerful mobile operating system, Apple has too many restrictions. Many users prefer to jailbreaking the iOS by using jailbreaking tool, which allows them to do more un...
来源: 评论
Intelligent identification of two-dimensional nanostructures by machine-learning optical microscopy
收藏 引用
Nano Research 2018年 第12期11卷 6316-6324页
作者: Xiaoyang Lin Zhizhong Si Wenzhi Fu Jianlei Yang Side Guo Yuan Cao Jin Zhang Xinhe Wang Peng Liu Kaili Jiang Weisheng Zhao Fert Beijing Research Institute School ofMicroelectronics & Beijing Advanced Innovation Center for Big Data and Brain Computing (BDBC)Beihang UniversityBeijing 100191China Beihang-GoertekJoint Microelectronics Institute Qingdao Research InstituteBeihang UniversityQingdao 266000China Fert Beijing Research Institute School of Computer Science and Engineering & Beijing Advanced Innovation Center for Big Data and Brain Computing (BDBC)Beihang UniversityBeijing 100191China State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics & Tsinghua-Foxconn Nanotechnology Research CenterCollaborative Innovation Center of Quantum MatterTsinghua UniversityBeijing 100084China
Two-dimensional (2D) materials and their heterostructures, with wafer-scale synthesis methods and fascinating properties, have attracted significant interest and triggered revolutions in corresponding device applicati... 详细信息
来源: 评论
Simulation of Passenger Evacuation of High-speed Train Cars
Simulation of Passenger Evacuation of High-speed Train Cars
收藏 引用
Fire Science and Fire Protection engineering (ICFSFPE), Conference on
作者: Shenshi Huang Ruichao Wei Kai Shi Jinxing Hu Shouxiang Lu Liping Lian Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced Technology Chinese Academy of Science Shenzhen China Institute of Advanced Materials Science and Engineering Shenzhen Institute of Advanced Technology Chinese Academy of Science Shenzhen China The Smart City Research Institute of China Electronics Technology Group Corporation Shenzhen China State Key Laboratory of Fire Science University of Science and Technology of China Hefei China School of Urban Planning and Design Peking University Shenzhen China
This study is to evaluate the passenger evacuation of the high-speed train. Geometry was built up based on current Chinese train type CRH380B, and scenarios were designed according to the current emergency response pl... 详细信息
来源: 评论
Path Sensitive Static Analysis of Taint-Style Vulnerabilities in PHP Code  17
Path Sensitive Static Analysis of Taint-Style Vulnerabilitie...
收藏 引用
2017 17th IEEE International Conference on Communication Technology (ICCT 2017)
作者: Xue-Xiong Yan Qing-Xian Wang Heng-Tai Ma Institute of Software Chinese Academy of Sciences State Key Laboratory of Mathematical Engineering and Advanced Computing
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, th... 详细信息
来源: 评论
HTTP Tunnel Trojan Detection Model Based on Deep Learning
收藏 引用
Journal of Physics: Conference Series 2019年 第4期1187卷
作者: Yubo He Yuefei Zhu Wei Lin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Aiming at reducing the high False Negative rate of the existing Trojan horse detection method based on behavior, this paper utilized the sequence characteristics of tunnel Trojan communication extracted from the trans...
来源: 评论
Photocurrent imaging of multi-memristive charge density wave switching in two-dimensional 1T-TaS2
arXiv
收藏 引用
arXiv 2020年
作者: Patel, Tarun Okamoto, Junichi Dekker, Tina Yang, Bowen Gao, Jingjing Luo, Xuan Lu, Wenjian Sun, Yuping Tsen, Adam W. Institute for Quantum Computing Department of Physics and Astronomy Department of Electrical and Computer Engineering Department of Chemistry University of Waterloo WaterlooONN2L 3G1 Canada Institute of Physics University of Freiburg FreiburgD-79104 Germany Key Laboratory of Materials Physics Institute of Solid State Physics Chinese Academy of Sciences Hefei230031 China University of Science and Technology of China Hefei230026 China High Magnetic Field Laboratory Chinese Academy of Sciences Hefei230031 China Collaborative Innovation Centre of Advanced Microstructures Nanjing University Nanjing210093 China
Transport studies of atomically thin 1T-TaS2 have demonstrated the presence of intermediate resistance states across the nearly commensurate (NC) to commensurate (C) charge density wave (CDW) transition, which can be ... 详细信息
来源: 评论
A compact construction for non-monotonic online/offline CP-ABE scheme  10th
A compact construction for non-monotonic online/offline CP-A...
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Zhang, Junqi Cheng, Qingfeng Wei, Fushan Zhang, Xinglong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Nowadays the mobile devices are becoming the necessities in our life, while they are generally resource-constrained, CP-ABE schemes designed for mobile devices should have the property of low computational complexity,... 详细信息
来源: 评论
Efficient and secure authentication scheme based on certificateless aggregate signature in space networks  7
Efficient and secure authentication scheme based on certific...
收藏 引用
2017 7th International Workshop on Computer Science and engineering, WCSE 2017
作者: Hu, Zhiyan Du, Xuehui Cao, Lifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
According to the requirements of the space networks for computing cost, communication cost and security, a new efficient certificateless aggregate signature algorithm is proposed. The signature length is only 2 group ... 详细信息
来源: 评论
A formal android permission model based on the B method  10th
A formal android permission model based on the B method
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Ren, Lu Chang, Rui Yin, Qing Man, Yujia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The rapid development of Android devices brings the increase of security requirements, especially for access control. Recently, many enhancements have been put forward towards the Android permission mechanism. However... 详细信息
来源: 评论
MemNetAR: Memory Network with Adversative Relation for Target-Level Sentiment Classification
MemNetAR: Memory Network with Adversative Relation for Targe...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Yiwei Gao Jianwei Niu Xuefeng Liu Kaili Mao Shui Yu State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing (BDBC) Beihang University Hangzhou Innovation Research Institute Beihang University School of Computer Science and Cyber Engineering Guangzhou University Guangdong China
Target-level sentiment classification aims to identify the sentiment of multiple targets in a sentence. Although existing approaches based on neural network have achieved good performance in this task, we find that ma... 详细信息
来源: 评论