咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是211-220 订阅
排序:
Metalenses phase characterization by multidistance phase retrieval
收藏 引用
Light(Science & Applications) 2024年 第9期13卷 1898-1907页
作者: Bowen Liu Jialuo Cheng Maoxiong Zhao Jin Yao Xiaoyuan Liu Shaohu Chen Lei Shi Din Ping Tsai Zihan Geng Mu Ku Chen State Key Laboratory of Surface Physics Key Laboratory of Micro-and Nano-Photonic Structures(Ministry of Education)and Department of PhysicsFudan University200433 ShanghaiChina Department of Electrical Engineering City University of Hong KongKowloonHong Kong SARChina State Key Laboratory of Terahertz and Millimeter Waves City University of Hong KongKowloonHong Kong SARChina Institute for Nanoelectronic Devices and Quantum Computing Fudan University200438 ShanghaiChina Collaborative Innovation Center of Advanced Microstructures Nanjing University210093 NanjingJiangsuChina Shanghai Research Center for Quantum Sciences 201315 ShanghaiChina Centre for Biosystems Neuroscienceand NanotechnologyCity University of Hong KongKowloonHong Kong SARChina Institute of Data and Information Tsinghua Shenzhen International Graduate SchoolTsinghua University518071 ShenzhenGuangdongChina
Metalens,characterized by their unique functions and distinctive physical properties,have gained significant attention for their potential *** further optimize the performance of metalens,it is necessary to characteri... 详细信息
来源: 评论
DRTaint: A Dynamic Taint Analysis Framework Supporting Correlation Analysis between Data Regions
DRTaint: A Dynamic Taint Analysis Framework Supporting Corre...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Yang, Pan Kang, Fei Zhao, Yuntian Shu, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Taint analysis is a common technology for software analysis, which is widely used in the region of information security. Aiming at the problem that the existing binary program dynamic taint analysis framework does not... 详细信息
来源: 评论
A Regional Network Topology Construction Algorithm Based on Sampling Measurement  5
A Regional Network Topology Construction Algorithm Based on ...
收藏 引用
2021 5th International Workshop on advanced Algorithms and Control engineering, IWAACE 2021
作者: Tao, Zhiyuan Liu, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ... 详细信息
来源: 评论
A software upgrade security analysis method based on program analysis
A software upgrade security analysis method based on program...
收藏 引用
2021 IEEE International Conference on Computer Science, Electronic Information engineering and Intelligent Control Technology, CEI 2021
作者: Lv, Xiaoshao Shu, Hui Kang, Fei Huang, Yuyao State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi... 详细信息
来源: 评论
A survey of offensive security research on PLCs
A survey of offensive security research on PLCs
收藏 引用
2021 International Conference on Computer, Communication, Control, Automation and Robotics, CCCAR 2021
作者: Ma, Rongkuan Wei, Qiang Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS... 详细信息
来源: 评论
FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images
收藏 引用
Journal on Internet of Things 2022年 第1期4卷 1-20页
作者: Yingchao Yu Shuitao Gan Xiaojun Qin State Key Laboratory of Mathematical Engineering and Advanced Computing WuxiJiangsu214083China
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine... 详细信息
来源: 评论
Research on IoT malware based on the ATT&CK model  11
Research on IoT malware based on the ATT&CK model
收藏 引用
2021 11th International Workshop on Computer Science and engineering, WCSE 2021
作者: Hao, Bo Kang, Fei Yang, Ju Xiong, Xiaobing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
The security of the IoT has become a hot research area in cyberspace security, among which the malware is a major threat. Based on the ATT&CK model, this paper studies the composition and behavior of IoT malware, ... 详细信息
来源: 评论
Fw-fuzz: A code coverage-guided fuzzing framework for network protocols on firmware
Fw-fuzz: A code coverage-guided fuzzing framework for networ...
收藏 引用
作者: Gao, Zicong Dong, Weiyu Chang, Rui Wang, Yisen Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China College of Computer Science and Technology Zhejiang University Hangzhou China
Fuzzing is an effective approach to detect software vulnerabilities utilizing changeable generated inputs. However, fuzzing the network protocol on the firmware of IoT devices is limited by inefficiency of test case g... 详细信息
来源: 评论
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Bo Zhang, Hengwei Wang, Jindong Yang, Yulong Lin, Chenhao Shen, Chao Zhao, Zhengyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China
Transferable adversarial examples cause practical security risks since they can mislead a target model without knowing its internal knowledge. A conventional recipe for maximizing transferability is to keep only the o...
来源: 评论
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Shun-Hang Li Gang Zhou Zhi-Bo Li Ji-Cang Lu Ning-Bo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod...
来源: 评论