咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 771 篇 期刊文献

馆藏范围

  • 1,580 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,014 篇 工学
    • 625 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 151 篇 信息与通信工程
    • 133 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 99 篇 控制科学与工程
    • 86 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 74 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 742 篇 理学
    • 421 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 85 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 deep neural netw...
  • 11 篇 computer archite...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,487 篇 英文
  • 58 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathemsatical Engineering and Advanced Computing"
1580 条 记 录,以下是711-720 订阅
排序:
A new static vulnerabilities analysis algorithm for PHP codes  3
A new static vulnerabilities analysis algorithm for PHP code...
收藏 引用
3rd Annual International Conference on Network and Information Systems for Computers, ICNISC 2017
作者: Yan, Xue-Xiong Ma, Heng-Tai Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Beijing China
as for detecting taint-style vulnerabilities in PHP codes, this paper introduces function calling control vulnerability, which is a new kind of taint-style vulnerabilities in PHP codes without sensitive function, and ... 详细信息
来源: 评论
SmartGift: Learning to Generate Practical Inputs for Testing Smart Contracts
SmartGift: Learning to Generate Practical Inputs for Testing...
收藏 引用
International Conference on Software Maintenance (ICSM)
作者: Teng Zhou Kui Liu Li Li Zhe Liu Jacques Klein Tegawendé F. Bissyandé Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Monash University Melbourne Australia Interdisciplinary Centre for Security Reliability and Trust (SnT) University of Luxembourg Luxembourg
With the boom of Initial Coin Offerings (ICO) in the financial markets, smart contracts have gained rapid popularity among consumers. Smart contract vulnerabilities however made them a prime target to malicious attack...
来源: 评论
Multi-Variant Execution Research of Software Diversity
Multi-Variant Execution Research of Software Diversity
收藏 引用
2019 International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2019
作者: Liu, Zhenwu Zhang, Zheng Zhang, Jiexin Liu, Hao State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University ZhengZhou HeNan450001 China
As more and more software products are threatened by malicious reverse analysis, along with software products are pirated, tampered with and so on, it is of great significance to study software security protection tec... 详细信息
来源: 评论
Robust second-order correlation of twin parametric beams generated by amplified spontaneous parametric down-conversion
收藏 引用
Chinese Optics Letters 2020年 第12期18卷 63-67页
作者: Kunpeng Jia Xiaohan Wang Xinjie LV Ping Xu Zhenlin Wang ZhiWei Wuang Gang Zhao Yan-Xiao Gong Zhenda Xie Shining Zhu National Laboratory of Solid State Microstructures School of PhysicsSchool of Electronic Science and EngineeringCollege of Engineering and Applied Sciencesand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210093China Institute for Quantum Information and State Key Laboratory of High Performance Computing.College of Computing National University of Defense TechnologyChangsha 410073China Mesoscopic Optics and Quantum Electronics Laboratory University of California Los AngelesCciliforniaCA 90095USA
We report an observation of the second-order correlation between twin beams generated by amplified spontaneous parametric down-conversion operating above threshold with kilowatt-level peak power, from a periodically p... 详细信息
来源: 评论
Double JPEG Compression Detection Based on Markov Model  18th
Double JPEG Compression Detection Based on Markov Model
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wang, Jinwei Huang, Wei Luo, Xiangyang Shi, Yung-Qing Nanjing University of Information Science and Technology Nanjing210044 China Department of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu210044 China Shanxi Key Laboratory of Network and System Security Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China State Key Laboratory of Information Security Institute Information Engineering Chinese Academy of Sciences Beijing100093 China Department of Electrical Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
In this paper, a feature based on the Markov model in quaternion discrete cosine transform (QDCT) domain is proposed for double JPEG compression detection. Firstly, a given JPEG image is extracted from blocked images ... 详细信息
来源: 评论
GNN-Geo: A Graph Neural Network-based Fine-grained IP geolocation Framework
arXiv
收藏 引用
arXiv 2021年
作者: Ding, Shichang Luo, Xiangyang Wang, Jinwei Fu, Xiaoming State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou276800 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Institute of Computer Science University of Göttingen Göttingen37077 Germany
Rule-based fine-grained IP geolocation methods are hard to generalize in computer networks which do not follow hypothetical rules. Recently, deep learning methods, like multi-layer perceptron (MLP), are tried to incre... 详细信息
来源: 评论
Influence of Small-Size Contaminations on Thin Film Structural Properties
收藏 引用
Chinese Physics Letters 2019年 第3期36卷 82-85页
作者: F.V.Grigoriev V.B.Sulimov Jinlong Zhang Xinbin Cheng Zhanshan Wang A.V.Tikhonravov Research Computing Center M.V.Lomonosov Moscow State University MOE Key Laboratory of Advanced Micro-Structured Materials Institute of Precision Optical Engineering School of Physics Science and EngineeringTongji University IFSA Collaborative Innovation Center Shanghai Jiao Tong University
An approach for studying the influence of nano-particles on the structural properties of deposited thin films is proposed. It is based on the molecular dynamic modeling of the deposition process in the presence of con... 详细信息
来源: 评论
An OFDM based interference reducing scheme with trajectory and resource optimization for UAV-powered IoT Networks
An OFDM based interference reducing scheme with trajectory a...
收藏 引用
General Assembly and Scientific Symposium, URSI
作者: Yuan Gao Jiang Cao Yang Guo Ping Wang Siming Yang Jing Wang Weidang Lu Peiyuan Si Ming Zhao Xiao Wu Academy of Military Science of the PLA China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China College of Information Engineering Zhejiang University of Technology Hangzhou China Beijing National Research Center for Information Science and Technology (BNRist) Tsinghua University Beijing China
The massive and pervasive deployment of sensors for information collecting in IoT networks result to the scarcity of energy. Unmanned aerial vehicle (UAV) enabled wireless power transfer (WPT) is a feasible solution t... 详细信息
来源: 评论
Current switching of the antiferromagnetic Néel vector in Pd/CoO/MgO(001)
收藏 引用
Physical Review B 2022年 第21期106卷 214405-214405页
作者: M. Yang Q. Li T. Wang B. Hong C. Klewe Z. Li X. Huang P. Shafer F. Zhang C. Hwang W. S. Yan R. Ramesh W. S. Zhao Y. Z. Wu Xixiang Zhang Z. Q. Qiu Institute of Physical Science and Information Technology Anhui University Hefei Anhui 230601 China National Synchrotron Radiation Laboratory University of Science and Technology of China Hefei Anhui 230029 China Department of Physics University of California Berkeley California 94720 USA Fert Beijing Research Institute School of Integrated Circuit Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China Advanced Light Source Lawrence Berkeley National Laboratory Berkeley California 94720 USA Department of Materials Science and Engineering University of California Berkeley California 94720 USA Korea Research Institute of Standards and Science Yuseong Daejeon 305-340 Korea Department of Physics State Key Laboratory of Surface Physics Fudan University Shanghai 200433 China Physical Science and Engineering Division King Abdullah University of Science and Technology Thuwal 23955-6900 Saudi Arabia
Recently, the electrical switching of antiferromagnetic (AFM) order has been intensively investigated because of its application potential in data storage technology. Herein, we report the current switching of the AFM... 详细信息
来源: 评论
Efficient stego key recovery based on distribution differences of extracting message bits
Efficient stego key recovery based on distribution differenc...
收藏 引用
作者: Liu, Jiufen Gan, Junjun Wang, Junchao Xu, Che Luo, Xiangyang Zhengzhou Science and Technology Institute Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The extraction of embedded messages, i.e., extraction attacks are the ultimate purpose of steganalysis, with great practical significance to obtain covert communication content and covert communication forensics. For ... 详细信息
来源: 评论