咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是151-160 订阅
排序:
A Highly Secure C2C-PAKE Cross-domain Protocol
A Highly Secure C2C-PAKE Cross-domain Protocol
收藏 引用
2021 International Conference on Network Communication and Information Security, ICNCIS 2021
作者: Wang, Xiangyang Gu, Chunxiang Lu, Siqi Chen, Xi Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
This paper studies the password-based strong authentication key exchange protocol in the cross-domain scenario, and gives an end-to-end highly secure C2C-PAKE protocol, in which the server shares a password with the c... 详细信息
来源: 评论
Frontiers in high entropy alloys and high entropy functional materials
收藏 引用
Rare Metals 2024年 第10期43卷 4639-4776页
作者: Wen-Tao Zhang Xue-Qian Wang Feng-Qi Zhang Xiao-Ya Cui Bing-Bing Fan Jia-Ming Guo Zhi-Min Guo Rui Huang Wen Huang Xu-Bo Li Meng-Ru Li Yan Ma Zhi-Hua Shen Yong-Gang Sun De-Zhuang Wang Fei-Yang Wang Li-Qiang Wang Nan Wang Tian-Li Wang Wei Wang Xiao-Yang Wang Yi-Han Wang Fu-Jie Yu Yu-Zhen Yin Ling-Kun Zhang Yi Zhang Jian-Yang Zhang Qi Zhao Yu-Ping Zhao Xin-Dong Zhu Yasir Sohail Ya-Nan Chen Tao Feng Qi-Long Gao Hai-Yan He Yong-Jiang Huang Zeng-Bao Jiao Hua Ji Yao Jiang Qiang Li Xiao-Ming Li Wei-Bing Liao Huai-Jun Lin Hui Liu Qi Liu Qing-Feng Liu Wei-Di Liu Xiong-Jun Liu Yang Lu Yi-Ping Lu Wen Ma Xue-Fei Miao Jie Pan Qing Wang Hong-Hui Wu Yuan Wu Tao Yang Wei-Ming Yang Qian Yu Jin-Yu Zhang Zhi-Gang Chen Liang Mao Yang Ren Bao-Long Shen Xun-Li Wang Zhe Jia He Zhu Zhen-Duo Wu Si Lan School of Materials Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China Jiangsu Key Laboratory for Advanced Metallic Materials School of Materials Science and EngineeringSoutheast UniversityNanjing 211189China Department of Physics City University of Hong KongHongKong 999077China School of Materials Science and Engineering Tianjin UniversityTianjin 300072China School of Physics and Microelectronics Zhengzhou UniversityZhengzhou 450001China Department of Mechanical Engineering Research Institute for Advanced ManufacturingThe Hong Kong Polytechnic UniversityHong Kong 100872China Center of Electron Microscopy and State Key Laboratory of Silicon Materials School of Materials Science and EngineeringZhejiang UniversityHangzhou 310027China Key Laboratory of Solidification Control and Digital Preparation Technology(Liaoning Province) School of Materials Science and EngineeringDalian University of TechnologyDalian 116024China Institute of Advanced Wear&Corrosion Resistance and Functional Materials Jinan UniversityGuangzhou 510632China School of Mechanics and Civil Engineering China University of Mining and TechnologyXuzhou 221116China School of Physical Sciences Great Bay UniversityDongguan 523000China School of Materials Science and Engineering Harbin Institute of TechnologyHarbin 150001China State Key Laboratory of Materials-Oriented Chemical Engineering College of Chemical EngineeringNanjing Tech UniversityNanjing 211816China Beijing Advanced Innovation Center for Materials Genome Engineering Research Institute for Carbon NeutralityUniversity of Science and Technology BeijingBeijing 100083China Department of Mechanical Engineering The University of Hong KongHong Kong 999077China School of Computing Macquarie UniversitySydney 2113Australia Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province College of Physics and Optoelectronic EngineeringShenzhen UniversityShenzhen 518060China State Key Laborato
Owing to their exceptional properties,high-entropy alloys(HEAs)and high-entropy materials have emerged as promising research areas and shown diverse ***,the recent advances in the field are comprehensively reviewed,or... 详细信息
来源: 评论
Adaptive Datum Points Location Optimization Method for Flexible Workpieces based on Centroid Characteristics  18
Adaptive Datum Points Location Optimization Method for Flexi...
收藏 引用
18th CIRP Conference on Computer Aided Tolerancing, CAT 2024
作者: Luo, Jia Cao, Yanlong Liu, Fan Zhi, Junnan Yang, Jiangxin Li, Tukun Fu, Hongsheng Key Laboratory of Advanced Manufacturing Technology of Zhejiang Province College of Mechanical Engineering Zhejiang University Hangzhou310027 China State Key Laboratory of Fluid Power and Mechatronic Systems College of Mechanical Engineering Zhejiang University Hangzhou310027 China School of Computing and Engineering University of Huddersfield HuddersfieldHD1 3DH United Kingdom
This paper proposes a method for adapting the layout of flexible workpieces of various shapes, in order to reduce the difficulty of location design for personalized shapes. Different from the previous location design ... 详细信息
来源: 评论
A New Noise-Tolerant Dual-Neural-Network Scheme for Robust Kinematic Control of Robotic Arms With Unknown Models
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1778-1791页
作者: Ning Tan Peng Yu Zhiyan Zhong Fenglei Ni IEEE the School of Computer Science and Engineering&Key Laboratory of Machine Intelligence and Advanced Computing Ministry of EducationSun Yat-sen UniversityGuangzhou 510006China the School of Automation Guangdong Polytechnic Normal UniversityGuangzhou 510665China the State Key Laboratory of Robotics and Systems Harbin Institute of Technology(HIT)Harbin 150080China
Taking advantage of their inherent dexterity,robotic arms are competent in completing many tasks *** a result of the modeling complexity and kinematic uncertainty of robotic arms,model-free control paradigm has been p... 详细信息
来源: 评论
Misleading Image Classification with Multi-shearing and Random Padding  22
Misleading Image Classification with Multi-shearing and Rand...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer engineering
作者: Chenwei Li Zheming Li Bo Yang Hengwei Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security China
Neural networks are vulnerable when input data is applied with human-imperceptible perturbations, which is called adversarial examples. When used in image classification models, adversarial examples mislead neural net... 详细信息
来源: 评论
Domain knowledge discovery from abstracts of scientific literature on Nickel-based single crystal superalloys
收藏 引用
Science China(Technological Sciences) 2023年 第6期66卷 1815-1830页
作者: LIU Yue DING Lin YANG ZhengWei GE XianYuan LIU DaHui LIU Wei YU Tao AVDEEV Maxim SHI SiQi School of Computer Engineering and Science Shanghai UniversityShanghai 200444China Shanghai Engineering Research Center of Intelligent Computing System Shanghai 200444China State Key Laboratory of Advanced Special Steel&Shanghai Key Laboratory of Advanced Ferrometallurgy&School of Materials Science and Engineering Shanghai UniversityShanghai 200444China Materials Genome Institute Shanghai UniversityShanghai 200444China Institute of Functional Materials Central Iron&Steel Research InstituteBeijing 100081China Australian Nuclear Science and Technology Organisation Locked Bag 2001Kirrawee DC NSW 2232Australia School of Chemistry The University of SydneySydney 2006Australia Zhejiang Laboratory Hangzhou 311100China
Despite the huge accumulation of scientific literature,it is inefficient and laborious to manually search it for useful information to investigate structure-activity ***,we propose an efficient text-mining framework f... 详细信息
来源: 评论
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system
A malware detection method using satisfiability modulo theor...
收藏 引用
作者: Xie, Yaobin Chang, Rui Jiang, Liehui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Nowadays programmable logic controllers (PLCs) are suffering increasing cyberattacks. Attackers could reprogram PLCs to inject malware that would cause physical damages and economic losses. These PLC malwares are high... 详细信息
来源: 评论
LLMEmbed: Rethinking Lightweight LLM's Genuine Function in Text Classification
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Chun Zhang, Hongguang Zhao, Kainan Ju, Xinghai Yang, Lin Systems Engineering Institute AMS Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the booming of Large Language Models (LLMs), prompt-learning has become a promising method mainly researched in various research areas. Recently, many attempts based on prompt-learning have been made to improve t... 详细信息
来源: 评论
Improvement and optimization of consensus algorithm based on PBFT  4
Improvement and optimization of consensus algorithm based on...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Zhao, Liang Li, Bin Zhou, Qinglei Chen, Xiaojie Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
This paper proposes an improved consensus algorithm based on PBFT(EBCR-PBFT). Firstly, The Modified Random Select(MRS) function is used to perform preliminary screening of network nodes, so as to solve the problem of ... 详细信息
来源: 评论
SoK: A Survey on Redundant Execution Technology
SoK: A Survey on Redundant Execution Technology
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe Ma, Bolin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the... 详细信息
来源: 评论