咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 772 篇 期刊文献

馆藏范围

  • 1,581 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,015 篇 工学
    • 626 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,484 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1581 条 记 录,以下是361-370 订阅
排序:
UEFI Trusted computing Vulnerability Analysis Based on state Transition Graph  6
UEFI Trusted Computing Vulnerability Analysis Based on State...
收藏 引用
6th IEEE International Conference on Computer and Communications, ICCC 2020
作者: Gu, Yanyang Zhang, Ping Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the face of increasingly serious firmware attacks, it is of great significance to analyze the vulnerability security of UEFI. This paper first introduces the commonly used trusted authentication mechanisms of UEFI.... 详细信息
来源: 评论
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Software supply chain analysis based on function similarity  4
Software supply chain analysis based on function similarity
收藏 引用
2020 4th International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2020
作者: Sun, Wenjie Shan, Zheng Liu, Fudong Li, Xingwei Qiao, Meng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen... 详细信息
来源: 评论
Full description of dipole orientation in organic light-emitting diodes
收藏 引用
Chinese Optics Letters 2023年 第2期21卷 92-98页
作者: 范灵杰 赵茂雄 楚娇 沈唐尧 郑敏嘉 关放 殷海玮 石磊 资剑 Department of Physics Key Laboratory of Micro-and Nano-Photonic Structures(Ministry of Education)and State Key Laboratory of Surface PhysicsFudan UniversityShanghai 200433China Shanghai Engineering Research Center of Optical Metrology for Nano-fabrication(SERCOM) Shanghai 200433China Institute for Nanoelectronic Devices and Quantum Computing Fudan UniversityShanghai 200438China Collaborative Innovation Center of Advanced Microstructures Nanjing UniversityNanjing 210093China
Considerable progress has been made in organic light-emitting diodes(OLEDs)to achieve high external quantum efficiency,among which dipole orientation has a remarkable *** most cases,the radiation of the dipoles in OLE... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zhaorui Ma Shicheng Zhang Yiheng Chang Qinglei Zhou Xinhao Hu Xia Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou University of Light Industry Zhengzhou China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed Signals on Coprime Array
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed ...
收藏 引用
IEEE advanced Information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Heng Jiang Lichun Li Hailong Zhang Hongyi Pan Xue Li College of Information System Engineering Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The coprime array constructs virtual array to obtain higher degrees of freedom (DOF), but the premise of doing so is that the signals are independent of each other. Once there are coherent signals, the signal model of... 详细信息
来源: 评论
3D-Printed Monolith Metallic Ni-Mo Electrodes for Ultrahigh Current Hydrogen Evolution
收藏 引用
Energy & Environmental Materials 2024年 第5期7卷 224-233页
作者: Yanran Xun Hongmei Jin Yuemeng Li Shixiang Zhou Kaixi Zhang Xi Xu Win Jonhson Shuai Chang Teck Leong Tan Jun Ding Department of Materials Science and Engineering National University of SingaporeSingapore 117574Singapore Institute of High Performance Computing(IHPC) Agency for ScienceTechnology and Research(A^(*)STAR)1 Fusionopolis Way#16-16 ConnexisSingapore 138632Singapore Key Laboratory of Flexible Electronics of Zhejiang Province Ningbo Institute of Northwestern Polytechnical UniversityNingbo 315103China State Key Laboratory of Advanced Welding and Joining Harbin Institute of TechnologyHarbin 150001China
In this work,we reported a series of monolithic 3D-printed Ni-Mo alloy electrodes for highly efficient water splitting at high current density(1500 mA cm^(-2))with excellent stability,which provides a solution to scal... 详细信息
来源: 评论
On the Sharing-Based Model of Steganography  19th
On the Sharing-Based Model of Steganography
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Zhao, Xianfeng Yang, Chunfang Liu, Fenlin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100195 China School of Cyber Security University of Chinese Academy of Sciences Beijing100093 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Steganography has long been considered as a way of hiding the fact of secret communication. However, the fact that a message sender and a receiver communicated with each other is seldom protected. It can be dangerous ... 详细信息
来源: 评论
Hot Spot Locating and Optimization of Calculation Errors in Arithmetic Expressions  7
Hot Spot Locating and Optimization of Calculation Errors in ...
收藏 引用
7th International Symposium on Advances in Electrical, Electronics, and Computer engineering
作者: Jinchen, Xu Yuanyuan, Xia Jiangwei, Hao Hao, Cao State Key Laboratory of Mathematical Engineering and Advanced Computing No. 62 Science Avenue High-Tech Zone Henan Zhengzhou450001 China National Key Laboratory of Science and Technology on Integrated Information Systems Technology Institute of Software Chinese Academy of Sciences No. 4 Zhongguancun South Fourth Street Haidian District Beijing10190 China
Error analysis is an important support for improving the precision of floating-point calculations. However, the floating-point error distribution does not have dominant characteristics, making it difficult to optimize... 详细信息
来源: 评论
Efficient Data Valuation Approximation in Federated Learning: A Sampling-based Approach
arXiv
收藏 引用
arXiv 2025年
作者: Wei, Shuyue Tong, Yongxin Zhou, Zimu He, Tianran Xu, Yi State Key Laboratory of Complex & Critical Software Environment Lab School of Computer Science and Engineering Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University China City University of Hong Kong Hong Kong
Federated learning (FL) has emerged as a prominent distributed learning paradigm to utilize datasets across multiple data providers. In FL, cross-silo data providers often hesitate to share their high-quality dataset ... 详细信息
来源: 评论