咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是241-250 订阅
排序:
Analysis of Instantaneous Angular Speed Accuracy Considering Encoder Errors
Analysis of Instantaneous Angular Speed Accuracy Considering...
收藏 引用
International Conference on Automation and computing (ICAC)
作者: Yuanhao Liu Fengshou Gu Qiang Zeng State Key Laboratory of Mechanical Transmissions for Advanced Equipment Chongqing University Chongqing China School of Computing and Engineering University of Huddersfield Huddersfield UK
Instantaneous Angular Speed (IAS) is closely related to the dynamic behavior of rotating machinery and plays a crucial role in diagnosing faults. However, the measurement of the IAS is subject to various errors inevit... 详细信息
来源: 评论
A Relation-Oriented Method for Joint Entity and Relation Extraction Based on Neural Network  21
A Relation-Oriented Method for Joint Entity and Relation Ext...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Hu, Hongwei Yin, Meijuan Liu, Xiaonan Key Laboratory of Cyberspace Situation Awareness of Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Entity and relation extraction is a basic task of information extraction in natural language processing. At present, Entity and relation extraction based on artificial intelligence has been widely studied, but most me... 详细信息
来源: 评论
An accurate identification method for network devices based on spatial attention mechanism
收藏 引用
Security and Safety 2023年 第2期2卷 13-29页
作者: Xiuting Wang Ruixiang Li Shaoyong Du Xiangyang Luo Henan Polytechnic Institute Nanyang 473000China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou 450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Institute of Information Engineering State Key Laboratory of Information SecurityBeijing 100093China
With the metaverse being the development direction of the next generation Internet,the popularity of intelligent devices,and the maturity of various emerging technologies,more and more intelligent devices try to conne... 详细信息
来源: 评论
Mechanistic investigation of highly bendable magnesium alloy sheet fabricated by short-process manufacturing
收藏 引用
Journal of Magnesium and Alloys 2024年 第10期12卷 4289-4310页
作者: Shiwei Xu Peijie Xiao Xiaofan Wu John Holmes Frédéric Mompiou Zhenyu Xiao Chen Jin Tianjiao Li Kuaishe Wang Zhuoran Zeng College of Mechanical and Vehicle Engineering Hunan UniversityChangsha 410082China State Key Laboratory of Advanced Design and Manufacturing Technology for Vehicle Hunan UniversityChangsha 410082China Suzhou Research Institute of Hunan University Suzhou 215131China College of Engineering Computing and CyberneticAustralian National UniversityACT 2601Australia CEMES-CNRS Universitéde Toulouse29 rue J.MarvigToulouse 31055France Qinghai Salt Lake Teli Magnesium Co. Ltd.Xining 810000China International Joint Laboratory for Light Alloys(Ministry of Education) College of Materials Science and EngineeringChongqing UniversityChongqing 400044China School of Metallurgical Engineering Xi’an University of Architecture&TechnologyXi’an 710055China College of Materials Science and Engineering Hunan UniversityChangsha 410082China
In this study,a commercial magnesium alloy AZ31(Mg-3Al-1Zn-0.3Mn)sheet through a short manufacturing process was found to be ductile and highly formable in *** possessing a strong basal texture,the short-processed she... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  6
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
6th International Conference on Electronic Information Technology and Computer engineering, EITCE 2022
作者: Wu, Zejun Lu, Li Jia, Qiong Chen, Zhihao State Key Laboratory of Mathematical Engineering and advanced Computing Zheng zhou China National Local Joint Engineering Laboratory of Network Space Security Technology Zheng zhou China Beijing Institute of Computer Technology and Application BeiJing China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Adversarial Example Attacks Against Intelligent Malware Detection: A Survey
Adversarial Example Attacks Against Intelligent Malware Dete...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xuyan Qi Yonghe Tang Huanwei Wang Tieming Liu Jing Jing State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin... 详细信息
来源: 评论
Controllable Majorana vortex states in iron-based superconducting nanowires
收藏 引用
National Science Review 2022年 第9期9卷 195-203页
作者: Chuang Li Xun-Jiang Luo Li Chen Dong E.Liu Fu-Chun Zhang Xin Liu School of Physics and Institute for Quantum Science and Engineering Huazhong University of Science and Technology Wuhan National High Magnetic Field Center and Hubei Key Laboratory of Gravitation and Quantum Physics State Key Laboratory of Low Dimensional Quantum Physics Department of Physics Tsinghua University Kavli Institute for Theoretical Sciences and CAS Center for Excellence in Topological Quantum Computing University of Chinese Academy of Sciences Collaborative Innovation Center of Advanced Microstructures Nanjing University
To reve al the non-Abelian braiding statistics of Major ana zero modes(MZMs),it is crucial to design a Majorana platform,in which MZMs can be easily manipulated in a broad topological nontrivial parameter *** is also ... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
International Conference on Communications, Information System and Computer engineering (CISCE)
作者: Zhe Xiong Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
MDFA: A Malware Detection Framework Based on Attention Mechanism with Bi-LSTM
MDFA: A Malware Detection Framework Based on Attention Mecha...
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Xuyan Qi Huanwei Wang Yonghe Tang Wei Liu Jiangtao Xie State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
As the existing malware intelligent detection methods have shortcomings and low accuracy of manual feature extraction and feature processing, a Malware Detection Framework with Attention mechanism based on Bi-directio... 详细信息
来源: 评论
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection
arXiv
收藏 引用
arXiv 2024年
作者: Song, Chengyu Ma, Linru Zheng, Jianming Liao, Jinzhi Kuang, Hongyu Yang, Lin Systems Engineering Institute Academy of Military Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China National University of Defense Technology National Key Laboratory of Information Systems Engineering Changsha China
Log-based insider threat detection (ITD) detects malicious user activities by auditing log entries. Recently, Large Language Models (LLMs) with strong common sense knowledge are emerging in the domain of ITD. Neverthe... 详细信息
来源: 评论