咨询与建议

限定检索结果

文献类型

  • 805 篇 会议
  • 755 篇 期刊文献

馆藏范围

  • 1,560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,000 篇 工学
    • 620 篇 计算机科学与技术...
    • 501 篇 软件工程
    • 147 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 98 篇 控制科学与工程
    • 83 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 73 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 51 篇 机械工程
    • 48 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
    • 25 篇 冶金工程
    • 24 篇 力学(可授工学、理...
  • 738 篇 理学
    • 420 篇 物理学
    • 250 篇 数学
    • 94 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 83 篇 化学
    • 72 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 29 篇 法学
    • 24 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 31 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 27 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 620 篇 state key labora...
  • 103 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 85 篇 department of ph...
  • 85 篇 key laboratory f...
  • 82 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 79 篇 institute of fro...
  • 79 篇 school of physic...
  • 79 篇 school of physic...
  • 79 篇 moscow institute...
  • 79 篇 school of astron...
  • 78 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 76 篇 danzengluobu
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 bao y.w.
  • 67 篇 hu h.b.
  • 67 篇 liu b.
  • 64 篇 li xin
  • 62 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,489 篇 英文
  • 38 篇 中文
  • 36 篇 其他
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1560 条 记 录,以下是191-200 订阅
排序:
Research on key Technology of Industrial Network Boundary Protection based on Endogenous Security  4
Research on Key Technology of Industrial Network Boundary Pr...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Yu, Fei Wei, Qiang Geng, Yangyang Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deploy... 详细信息
来源: 评论
IPv6 Landmark Mining Based on Domain Name Screening and IPv4-IPv6 Connection  21
IPv6 Landmark Mining Based on Domain Name Screening and IPv4...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Liu, Minghao Sun, Yuchen Liu, Chong Zu, Shuodi Zhang, Fan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Existing IP landmark mining technologies mainly focus on IPv4, and less attention is paid to the association between IPv4 and IPv6. The current IPv6 network has fewer reliable landmarks with limited accuracy, while th... 详细信息
来源: 评论
Anti-obfuscation Binary Code Clone Detection Based on Software Gene  7th
Anti-obfuscation Binary Code Clone Detection Based on Softwa...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Tang, Ke Liu, Fudong Shan, Zheng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin... 详细信息
来源: 评论
Tuning 2D magnetism in Fe3+XGeTe2 films by element doping
收藏 引用
National Science Review 2022年 第6期9卷 163-170页
作者: Shanshan Liu Zihan Li Ke Yang Enze Zhang Awadhesh Narayan Xiaoqian Zhang Jiayi Zhu Wenqing Liu Zhiming Liao Masaki Kudo Takaaki Toriyama Yunkun Yang Qiang Li Linfeng Ai Ce Huang Jiabao Sun Xiaojiao Guo Wenzhong Bao Qingsong Deng Yanhui Chen Lifeng Yin Jian Shen Xiaodong Han Syo Matsumura Jin Zou Yongbing Xu Xiaodong Xu Hua Wu Faxian Xiu State Key Laboratory of Surface Physics and Department of Physics Fudan University Institute for Nanoelectronic Devices and Quantum Computing Fudan University College of Science University of Shanghai for Science and Technology Laboratory for Computational Physical Sciences(MOE) Fudan University Solid State and Structural Chemistry Unit Indian Institute of Science School of Electronic Science and Engineering Nanjing University Department of Physics University of Washington Department of Electronic Engineering Royal Holloway University of London Materials Engineering The University of Queensland Beijing Key Laboratory of Microstructure and Property of Advanced Materials Institute of Microstructure and Property of Advanced Materials Beijing University of Technology The Ultramicroscopy Research Center Kyushu University State Key Laboratory of ASIC and System School of Microelectronics Fudan University Collaborative Innovation Center of Advanced Microstructures Department of Applied Quantum Physics and Nuclear Engineering Kyushu University Centre for Microscopy and Microanalysis The University of Queensland Shanghai Research Center for Quantum Sciences
Two-dimensional(2D) ferromagnetic materials have been discovered with tunable magnetism and orbital-driven nodal-line features. Controlling the 2D magnetism in exfoliated nanoflakes via electric/magnetic fields enab... 详细信息
来源: 评论
Multi Association Semantics-Based User Matching Algorithm Without Prior Knowledge
Multi Association Semantics-Based User Matching Algorithm Wi...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
作者: Jiang, Qiuyan Gong, Daofu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
Cross-network user matching is one of the basic issues for realizing social network data integration. Existing research based on structure features provides a good matching method for nodes with high-degree, but ignor... 详细信息
来源: 评论
Directed Association-based User Identification Algorithm  2
Directed Association-based User Identification Algorithm
收藏 引用
2nd International Conference on Computer, Big Data and Artificial Intelligence, ICCBDAI 2021
作者: Jiang, Qiuyan Gong, Daofu Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
This paper studies the social network with directed association semantics, and proposes an unsupervised user identification algorithm (DAUM-P). The algorithm construct a user associations graph based on multiple types... 详细信息
来源: 评论
Malicious Traffic Detection Model Refactor Method Based on Adaptive Sample Generation  5
Malicious Traffic Detection Model Refactor Method Based on A...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Jiao, Liang Fei, Jinlong Zhao, Min State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Tianjin University of Science and Technology School of Electronic Information and Automation Tianjin China
As machine learning models are widely used in malicious traffic detection, model security has become an important research topic. Aiming at the problems that the model refactor attack methods need a large amount of pr... 详细信息
来源: 评论
Thermally Evaporated ZnSe for Efficient and Stable Regular/Inverted Perovskite Solar Cells by Enhanced Electron Extraction
收藏 引用
Energy & Environmental Materials 2023年 第5期6卷 440-448页
作者: Xin Li Guibin Shen Xin Ren Ng Zhiyong Liu Yun Meng Yongwei Zhang Cheng Mu Zhi Gen Yu Fen Lin Solar Energy Research Institute of Singapore(SERIS) National University of SingaporeSingapore 117574Singapore Key Laboratory of Advanced Light Conversion Materials and Biophotonics Department of ChemistryRenmin University of ChinaBeijing 100872China State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Materials Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore Shandong Provincial Engineering and Technical Center of Light Manipulation and Shandong Provincial Key Laboratory of Optics and Photonic Devices School of Physics and ElectronicsShandong Normal UniversityJinan 250014China Institute of High Performance Computing A^(*)STARSingapore 138632Singapore
Electron transport layers(ETLs)are crucial for achieving efficient and stable planar perovskite solar cells(PSCs).Reports on versatile inorganic ETLs using a simple film fabrication method and applicability for both l... 详细信息
来源: 评论
Vulnerability Digging for Software-Defined Network Controller Using Event Flow Graph Analysis
收藏 引用
Security and Communication Networks 2022年 第0期2022卷
作者: Wu, Zehui Zhang, Wenbin Wang, Yunchao Yan, Chenyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software-defined network (SDN) controllers, the core of SDN network architecture, need to deal with network events of the whole network, which has huge program state space and complex logic dependency, with security i... 详细信息
来源: 评论
Robust Watermarking Based on Multi-layer Watermark Feature Fusion
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Wu, Shaowu Lu, Wei Luo, Xiangyang Sun Yat-Sen University School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450002 China
The purpose of robust image watermarking is to embed a watermark into a carrier image in an invisible form and extract the watermark successfully even under noise interference conditions to achieve copyright confirmat... 详细信息
来源: 评论