咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 755 篇 期刊文献

馆藏范围

  • 1,560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,000 篇 工学
    • 620 篇 计算机科学与技术...
    • 501 篇 软件工程
    • 147 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 98 篇 控制科学与工程
    • 83 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 73 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 51 篇 机械工程
    • 48 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
    • 25 篇 冶金工程
    • 24 篇 力学(可授工学、理...
  • 738 篇 理学
    • 420 篇 物理学
    • 250 篇 数学
    • 94 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 83 篇 化学
    • 72 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 31 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 27 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 620 篇 state key labora...
  • 103 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 85 篇 department of ph...
  • 85 篇 key laboratory f...
  • 82 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 79 篇 institute of fro...
  • 79 篇 school of physic...
  • 79 篇 school of physic...
  • 79 篇 moscow institute...
  • 79 篇 school of astron...
  • 78 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 76 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 bao y.w.
  • 67 篇 hu h.b.
  • 67 篇 liu b.
  • 64 篇 li xin
  • 62 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,489 篇 英文
  • 38 篇 中文
  • 36 篇 其他
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1560 条 记 录,以下是181-190 订阅
排序:
SROBR: Semantic Representation of Obfuscation-Resilient Binary Code
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Tang, Ke Shan, Zheng Liu, Fudong Huang, Yizhao Sun, Rongbo Qiao, Meng Zhang, Chunyan Wang, Jue Gui, Hairen State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the rapid development of information technology, the scale of software has increased exponentially. Binary code similarity detection technology plays an important role in many fields, such as detecting software p... 详细信息
来源: 评论
Medical image registration and its application in retinal images:a review
收藏 引用
Visual computing for Industry,Biomedicine,and Art 2024年 第1期7卷 142-164页
作者: Qiushi Nie Xiaoqing Zhang Yan Hu Mingdao Gong Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Center for High Performance Computing and Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Singapore Eye Research Institute Singapore 169856Singapore State Key Laboratory of Ophthalmology Optometry and Visual ScienceEye HospitalWenzhou Medical UniversityWenzhou 325027China
Medical image registration is vital for disease diagnosis and treatment with its ability to merge diverse informa-tion of images,which may be captured under different times,angles,or *** several surveys have reviewed ... 详细信息
来源: 评论
Overview of Intrusion Detection in Smart Substation  10
Overview of Intrusion Detection in Smart Substation
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Li, Zecun Ma, Rongkuan Xie, Yaobin Lu, Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Shangu Cyber Security Technology Co. Ltd Zhengzhou China
The development of Cyber-Physical Fusion Technology gradually takes the power grid in the direction of intelligence, making the smart substation a typical cyber-physical fusion system. However, while the introduction ... 详细信息
来源: 评论
One-step implementation of a nonadiabatic geometric fSim gate in superconducting circuits
收藏 引用
Physical Review A 2024年 第2期110卷 022608-022608页
作者: M.-R. Yun Zheng Shan L.-L. Sun L.-L. Yan Y. Jia Shi-Lei Su Gang Chen School of Physics and Laboratory of Zhongyuan Light Key Laboratory of Materials Physics of Ministry of Education State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 Henan China College of Physics Institute of Quantum Materials and Physics Key Laboratory for Special Functional Materials of Ministry of Education and School of Materials and Engineering
Due to their significant application in reducing algorithm depth, fSim gates have attracted a lot of attention. However, during the implementation of quantum gates, fluctuations in control parameters and decoherence c... 详细信息
来源: 评论
Detection and localization of cyber attacks on water treatment systems:an entropy-based approach
收藏 引用
Frontiers of Information Technology & Electronic engineering 2022年 第4期23卷 587-603页
作者: Ke LIU Mufeng WANG Rongkuan MA Zhenyong ZHANG Qiang WEI State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China College of Control Science and Engineering Zhejiang UniversityHangzhou310027China
With the advent of Industry 4.0,water treatment systems(WTSs)are recognized as typical industrial cyber-physical systems(iCPSs)that are connected to the open *** information technology(IT)benefits the WTS in the aspec... 详细信息
来源: 评论
Automatic protocol reverse engineering for industrial control systems with dynamic taint analysis
收藏 引用
Frontiers of Information Technology & Electronic engineering 2022年 第3期23卷 351-360页
作者: Rongkuan MA Hao ZHENG Jingyi WANG Mufeng WANG Qiang WEI Qingxian WANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Zhejiang University NGICS Platform Hangzhou 310000China
Proprietary(or semi-proprietary)protocols are widely adopted in industrial control systems(ICSs).Inferring protocol format by reverse engineering is important for many network security applications,e.g.,program tests ... 详细信息
来源: 评论
NAS Honeypot Technology Based on Attack Chain  10th
NAS Honeypot Technology Based on Attack Chain
收藏 引用
10th International Conference on Computer engineering and Networks, CENet 2020
作者: Liu, Bing Shu, Hui Kang, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the wide application of network attached storage (NAS), the security problem is becoming more and more serious, together with the increasingly fierce attacks against NAS devices of different manufacturers. In ord... 详细信息
来源: 评论
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qiankun Pi Jicang Lu Yepeng Sun Qinlong Fan Xukun Zhou Shouxin Shang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
OpenMP automatic translation framework for Sunway TaihuLight  3
OpenMP automatic translation framework for Sunway TaihuLight
收藏 引用
3rd IEEE International Conference on Communications, Information System and Computer engineering, CISCE 2021
作者: Li, Mingliang Pang, Jianmin Yue, Feng Wang, Qihan State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
The Sunway processor is a unique heterogeneous many-core processor used by Sunway TaihuLight supercomputer. However, developing parallel programs on the Sunway processor is still complex. In this paper, a source-to-so... 详细信息
来源: 评论
Network Device Identification Based on MAC Boundary Inference  7th
Network Device Identification Based on MAC Boundary Inferenc...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Guo, Xinmiao Li, Xiangnan Li, Ruixiang Wang, Xiuting Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely... 详细信息
来源: 评论