咨询与建议

限定检索结果

文献类型

  • 2,100 篇 期刊文献
  • 1,610 篇 会议
  • 3 册 图书

馆藏范围

  • 3,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,381 篇 工学
    • 1,392 篇 计算机科学与技术...
    • 1,093 篇 软件工程
    • 377 篇 信息与通信工程
    • 343 篇 电子科学与技术(可...
    • 305 篇 电气工程
    • 256 篇 控制科学与工程
    • 202 篇 化学工程与技术
    • 194 篇 生物工程
    • 188 篇 光学工程
    • 168 篇 机械工程
    • 165 篇 材料科学与工程(可...
    • 119 篇 仪器科学与技术
    • 117 篇 动力工程及工程热...
    • 112 篇 网络空间安全
    • 106 篇 生物医学工程(可授...
    • 102 篇 力学(可授工学、理...
    • 64 篇 交通运输工程
    • 62 篇 土木工程
    • 58 篇 安全科学与工程
  • 1,800 篇 理学
    • 849 篇 数学
    • 810 篇 物理学
    • 234 篇 统计学(可授理学、...
    • 229 篇 生物学
    • 198 篇 化学
    • 129 篇 系统科学
    • 91 篇 地球物理学
  • 468 篇 管理学
    • 337 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 98 篇 工商管理
  • 86 篇 医学
    • 74 篇 临床医学
  • 61 篇 法学
  • 42 篇 经济学
  • 22 篇 军事学
  • 21 篇 农学
  • 10 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学

主题

  • 57 篇 feature extracti...
  • 55 篇 semantics
  • 54 篇 deep learning
  • 54 篇 training
  • 52 篇 machine learning
  • 46 篇 computational mo...
  • 45 篇 optimization
  • 37 篇 data models
  • 33 篇 security
  • 31 篇 software
  • 31 篇 cryptography
  • 30 篇 network security
  • 29 篇 robustness
  • 27 篇 cosmic rays
  • 27 篇 algorithm design...
  • 23 篇 deep neural netw...
  • 23 篇 data mining
  • 23 篇 protocols
  • 23 篇 nuclear structur...
  • 22 篇 reinforcement le...

机构

  • 615 篇 state key labora...
  • 154 篇 university of ch...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 91 篇 yunnan observato...
  • 86 篇 department of ph...
  • 83 篇 key laboratory f...
  • 82 篇 school of physic...
  • 80 篇 center for astro...
  • 75 篇 college of physi...
  • 74 篇 state key labora...
  • 73 篇 institute of fro...
  • 72 篇 school of physic...
  • 70 篇 national astrono...
  • 69 篇 school of physic...
  • 67 篇 national space s...
  • 64 篇 moscow institute...
  • 63 篇 state key labora...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 liu d.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 chen m.j.
  • 67 篇 li xin
  • 67 篇 bao y.w.
  • 66 篇 liu b.
  • 64 篇 hu h.b.
  • 64 篇 danzengluobu
  • 62 篇 min z.
  • 61 篇 qin j.j.

语言

  • 3,513 篇 英文
  • 116 篇 其他
  • 88 篇 中文
检索条件"机构=State Key Laboratory of Scientfic/Engineering Computing"
3713 条 记 录,以下是1-10 订阅
排序:
Software Vulnerability Mining and Analysis Based on Deep Learning
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3263-3287页
作者: Shibin Zhao Junhu Zhu Jianshan Peng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
In recent years,the rapid development of computer software has led to numerous security problems,particularly software *** flaws can cause significant harm to users’privacy and *** security defect detection technolog... 详细信息
来源: 评论
Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1223-1243页
作者: Yuancong Chai Yuefei Zhu Wei Lin Ding Li State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou450001China
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged... 详细信息
来源: 评论
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 694-707页
作者: Wangxin FENG Xiangyang LUO Tengyao LI Chunfang YANG State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Cyberspace Situation Awareness of Henan Province
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of net... 详细信息
来源: 评论
IP2vec:an IP node representation model for IP geolocation
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 189-204页
作者: Fan ZHANG Meijuan YIN Fenlin LIU Xiangyang LUO Shuodi ZU State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou 450001China
IP geolocation is essential for the territorial analysis of sensitive network entities,location-based services(LBS)and network fraud *** has important theoretical significance and application ***-based IP geolocation ... 详细信息
来源: 评论
Research Progress of Reverse Monte Carlo and Its Application in Josephson Junction Barrier Layer
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第12期137卷 2077-2109页
作者: Junling Qiu Huihui Sun Shuya Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
As indispensable components of superconducting circuit-based quantum computers,Josephson junctions determine how well superconducting qubits *** Monte Carlo(RMC)can be used to recreate Josephson junction’s atomic str... 详细信息
来源: 评论
LaTLS: A Lattice-Based TLS Proxy Protocol
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 313-321页
作者: ZHANG Xinglong CHENG Qingfeng LI Yuting State Key Laboratory of Mathematical Engineering and Advanced Computing
The function of the Internet proxy is to check and convert the data exchanged between client and server. In fact, the two-party secure communication protocol with good security is turned into an unsafe multiparty prot... 详细信息
来源: 评论
Integrating Neighborhood Geographic Distribution and Social Structure Influence for Social Media User Geolocation
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第9期140卷 2513-2532页
作者: Meng Zhang Xiangyang Luo Ningbo Huang Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
Geolocating social media users aims to discover the real geographical locations of users from their publicly available data,which can support online location-based applications such as disaster alerts and local conten... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
Pre-trained Semantic Interaction based Inductive Graph Neural Networks for Text Classification  31
Pre-trained Semantic Interaction based Inductive Graph Neura...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Shiyu Zhou, Gang Lu, Jicang Chen, Jing Huang, Ningbo State Key Laboratory of Mathematical Engineering and Advanced Computing China
Nowadays, research of Text Classification (TC) based on graph neural networks (GNNs) is on the rise. Both inductive methods and transductive methods have made significant progress. For transductive methods, the semant... 详细信息
来源: 评论
Extracting embedded messages using adaptive steganography based on optimal syndrome-trellis decoding paths
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 455-465页
作者: Jialin Li Xiangyang Luo Yi Zhang Pei Zhang Chunfang Yang Fenlin Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000China
Privacy protection is the key to maintaining the Internet of Things(IoT)communication *** is an important way to achieve covert communication that protects user data *** technology is the key to checking steganography... 详细信息
来源: 评论