咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,582 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,016 篇 工学
    • 627 篇 计算机科学与技术...
    • 503 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 127 篇 电气工程
    • 102 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 76 篇 网络空间安全
    • 75 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 744 篇 理学
    • 422 篇 物理学
    • 251 篇 数学
    • 95 篇 生物学
    • 91 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 16 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,485 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=State Key Laboratory of Mathmatical Engineering and Advanced Computing"
1582 条 记 录,以下是301-310 订阅
排序:
Semivortex solitons and their excited states in spin-orbit-coupled binary bosonic condensates
收藏 引用
Physical Review E 2024年 第6期109卷 064201-064201页
作者: Haiming Deng Jinqing Li Zhaopin Chen Yaohui Liu Dong Liu Chunzhi Jiang Chao Kong Boris A. Malomed School of Physics and Electronic-Electrical Engineering Microelectronics and Optoelectronics Technology Key Laboratory of Hunan Higher Education Hunan Engineering Research Center of Advanced Embedded Computing and Intelligent Medical Systems Physics Department and Solid-State Institute Department of Physical Electronics School of Electrical Engineering Faculty of Engineering Instituto de Alta Investigación
It is known that two-dimensional two-component fundamental solitons of the semivortex (SV) type, with vorticities (s+,s−)=(0,1) in their components, are stable ground states (GSs) in the spin-orbit-coupled (SOC) binar... 详细信息
来源: 评论
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon via exploiting mitigations  23
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon v...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Tingting Yin Zicong Gao Zhenghang Xiao Zheyu Ma Min Zheng Chao Zhang Tsinghua University and Ant Group State Key Laboratory of Mathematical Engineering and Advanced Computing Hunan University Tsinghua University Ant Group Tsinghua University and Zhongguancun Laboratory
macOS drivers, i.e., Kernel EXTensions (kext), are attractive attack targets for adversaries. However, automatically discovering vulnerabilities in kexts is extremely challenging because kexts are mostly closed-source...
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Ma, Zhaorui Zhang, Shicheng Chang, Yiheng Zhou, Qinglei Hu, Xinhao Li, Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450052 China Zhengzhou University of Light Industry Zhengzhou450002 China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
A review of cryptographic algorithm recognition technology for binary code
A review of cryptographic algorithm recognition technology f...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Zhao, Chenxia Kang, Fei Yang, Ju Shu, Hui Zhengzhou University Zhengzhou Henan450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback  2
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
2nd International Conference on Computer Communication and Network Security, CCNS 2021
作者: Yuwen, Shao Zheng, Zhang Bingzheng, Li Xinsheng, Ji State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering Technological RD Center Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection against Multipath Routing
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2155-2171页
作者: Zhao, Ziming Li, Zhaoxuan Xie, Xiaofei Liu, Zhipeng Li, Tingting Yu, Jiongchi Zhang, Fan Chen, Binbin School of Software Technology Zhejiang University Ningbo315100 China College of Computer Science and Technology Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Scientific and Technological Innovation Center 311200 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province 310027 China Jiaxing Research Institute Zhejiang University 314000 China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou450001 China Singapore State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security UCAS Beijing100049 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore Advanced Digital Sciences Center Singapore138632 Singapore Singapore University of Technology and Design SingaporeB96049 Singapore
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to adva... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  22
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer engineering
作者: Zejun Wu Li Lu Qiong Jia Zhihao Chen State Key Laboratory of Mathematical Engineering and advanced Computing China National Local Joint Engineering Laboratory of Network Space Security Technology China Beijing Institute of Computer Technology and Application China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection  39
RaCMC: Residual-Aware Compensation Network with Multi-Granul...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yu, Xinquan Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 Macao
Multimodal fake news detection aims to automatically identify real or fake news, thereby mitigating the adverse effects caused by such misinformation. Although prevailing approaches have demonstrated their effectivene... 详细信息
来源: 评论
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 249-251页
作者: Ting CHEN Xinghua LI Qingfeng CHENG School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist... 详细信息
来源: 评论
Interaction-Aware Cut-In Trajectory Prediction and Risk Assessment in Mixed Traffic
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第10期9卷 1752-1762页
作者: Xianglei Zhu Wen Hu Zejian Deng Jinwei Zhang Fengqing Hu Rui Zhou Keqiu Li Fei-Yue Wang the College of Intelligence and Computing Tianjin UniversityTianjin 300350 the China Automotive Technology and Research Center Co.Ltd. Tianjin 300300China the State Key Laboratory of Advanced Design and Manufacturing for Vehicle Body College of Mechanical and Vehicle EngineeringHunan UniversityChangsha 410082China the Department of Mechanical and Mechatronics Engineering University of WaterlooWaterlooON N2L3G1Canada the School of Mechanical Engineering Beijing Institute of TechnologyBeijing 100081China the Macao University of Science and Technology MacaoChina the Waytous Inc. Qingdao 266000China IEEE the State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China
Accurately predicting the trajectories of surrounding vehicles and assessing the collision risks are essential to avoid side and rear-end collisions caused by *** improve the safety of autonomous vehicles in the mixed... 详细信息
来源: 评论