咨询与建议

限定检索结果

文献类型

  • 4,666 篇 期刊文献
  • 1,858 篇 会议
  • 3 册 图书

馆藏范围

  • 6,527 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,931 篇 工学
    • 1,593 篇 计算机科学与技术...
    • 1,232 篇 软件工程
    • 506 篇 电子科学与技术(可...
    • 487 篇 化学工程与技术
    • 471 篇 电气工程
    • 459 篇 信息与通信工程
    • 365 篇 控制科学与工程
    • 357 篇 材料科学与工程(可...
    • 350 篇 力学(可授工学、理...
    • 265 篇 光学工程
    • 250 篇 机械工程
    • 246 篇 动力工程及工程热...
    • 245 篇 生物工程
    • 216 篇 核科学与技术
    • 201 篇 仪器科学与技术
    • 185 篇 冶金工程
    • 150 篇 生物医学工程(可授...
    • 148 篇 土木工程
    • 140 篇 水利工程
    • 118 篇 网络空间安全
  • 3,854 篇 理学
    • 2,324 篇 物理学
    • 1,386 篇 数学
    • 502 篇 化学
    • 394 篇 统计学(可授理学、...
    • 326 篇 生物学
    • 215 篇 系统科学
    • 166 篇 地球物理学
  • 531 篇 管理学
    • 381 篇 管理科学与工程(可...
    • 172 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 140 篇 医学
  • 89 篇 农学
  • 69 篇 法学
  • 55 篇 经济学
  • 25 篇 军事学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 245 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 71 篇 machine learning
  • 62 篇 deep learning
  • 60 篇 relativistic hea...
  • 59 篇 feature extracti...
  • 54 篇 semantics
  • 53 篇 w & z bosons
  • 52 篇 computational mo...
  • 51 篇 particle product...
  • 50 篇 optimization
  • 49 篇 training
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 36 篇 security
  • 35 篇 hadrons
  • 35 篇 data models
  • 35 篇 quark & gluon je...

机构

  • 1,038 篇 yerevan physics ...
  • 920 篇 centro brasileir...
  • 893 篇 charles universi...
  • 890 篇 university of de...
  • 887 篇 department of ph...
  • 872 篇 institute rudjer...
  • 865 篇 university of so...
  • 862 篇 infn sezione di ...
  • 857 篇 irfu cea univers...
  • 857 篇 helsinki institu...
  • 857 篇 infn sezione di ...
  • 847 篇 university of sp...
  • 843 篇 indian institute...
  • 839 篇 university of cy...
  • 836 篇 infn laboratori ...
  • 830 篇 national and kap...
  • 829 篇 institute of hig...
  • 819 篇 academy of scien...
  • 819 篇 universidad san ...
  • 811 篇 rwth aachen univ...

作者

  • 635 篇 waltenberger w.
  • 627 篇 lowette s.
  • 572 篇 tavernier s.
  • 544 篇 adam w.
  • 543 篇 lemaitre v.
  • 543 篇 schieck j.
  • 542 篇 skovpen k.
  • 540 篇 tytgat m.
  • 535 篇 sznajder a.
  • 532 篇 tumasyan a.
  • 530 篇 jeitler m.
  • 527 篇 delaere c.
  • 526 篇 vannerom d.
  • 519 篇 giammanco a.
  • 508 篇 carvalho w.
  • 503 篇 alves g.a.
  • 499 篇 van mechelen p.
  • 499 篇 delcourt m.
  • 495 篇 chinellato j.
  • 492 篇 wulz c.-e.

语言

  • 5,516 篇 英文
  • 863 篇 其他
  • 155 篇 中文
  • 6 篇 德文
  • 6 篇 法文
检索条件"机构=State Key Laboratory of Scientific Engineering Computing"
6527 条 记 录,以下是51-60 订阅
排序:
Research on Unpredetermined Behavior Recognition Techniques Based on Network Attacks  5
Research on Unpredetermined Behavior Recognition Techniques ...
收藏 引用
5th International Conference on Internet of Things, Automation and Artificial Intelligence, IoTAAI 2023
作者: Xiao, Yuxuan Fei, Jinlong Wang, Junyi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the increasing number of cyber-attack behaviors, it has caused great harm to the contemporary society. Currently, the cyber attack behavior recognition module is usually implemented by adopting a strategy based o... 详细信息
来源: 评论
Dynamic Resampling Based Boosting Random Forest for Network Anomaly Traffic Detection  36th
Dynamic Resampling Based Boosting Random Forest for Network...
收藏 引用
36th International Conference on Industrial, engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2023
作者: Ren, Huajuan Wang, Ruimin Dong, Weiyu Li, Junhao Tang, Yonghe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Network anomaly traffic detection is an important technique for detecting intrusion activities and maintaining cyberspace security. Random forest is widely used in network anomalous traffic detection due to its good d... 详细信息
来源: 评论
Linearized Transformed L1 Galerkin FEMs with Unconditional Convergence for Nonlinear Time Fractional Schr¨odinger Equations
收藏 引用
Numerical Mathematics(Theory,Methods and Applications) 2023年 第2期16卷 348-369页
作者: Wanqiu Yuan Dongfang Li Chengjian Zhang School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China
A linearized transformed L1 Galerkin finite element method(FEM)is presented for numerically solving the multi-dimensional time fractional Schr¨odinger *** optimal error estimates of the fully-discrete scheme are ... 详细信息
来源: 评论
A survey for light field super-resolution
收藏 引用
High-Confidence computing 2024年 第1期4卷 118-129页
作者: Mingyuan Zhao Hao Sheng Da Yang Sizhe Wang Ruixuan Cong Zhenglong Cui Rongshan Chen Tun Wang Shuai Wang Yang Huang Jiahao Shen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Key Laboratory of Data Science and Intelligent Computing International Innovation InstituteBeihang UniversityHangzhou 311115China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati... 详细信息
来源: 评论
A Malware Analysis Method Based on Behavioral Knowledge Graph
A Malware Analysis Method Based on Behavioral Knowledge Grap...
收藏 引用
2022 International Conference on Electronic Information engineering and Computer Science, EIECS 2022
作者: Xu, Lianqiu Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, the rapid development of information technology has continuously brought risks and challenges to network security. How to effectively detect and classify malicious codes and avoid serious damage to in... 详细信息
来源: 评论
Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
收藏 引用
Journal of Computer Science & Technology 2023年 第4期38卷 793-806页
作者: 王翀 陈荣亮 古亮 Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Sangfor Technologies Inc. Shenzhen 518055China Shenzhen Key Laboratory for Exascale Engineering and Scientific Computing Shenzhen 518055China
With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to *** foundation of cloud computing is based on virtual machines where boundaries among the a... 详细信息
来源: 评论
An Improved key Mismatch Attack on Kyber  7
An Improved Key Mismatch Attack on Kyber
收藏 引用
7th International Conference on Cryptography, Security and Privacy, CSP 2023
作者: Wang, Yaru Jiang, Haodong Ma, Zhi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Recently, American National Institute of Standards and Technology (NIST) announced Kyber as the first KEM candidate to be standardized. The security of Kyber is based on the modular learning with errors (MLWE) problem... 详细信息
来源: 评论
ALEmu: A Framework for Application-layer Programs Emulation of Embedded Devices  4
ALEmu: A Framework for Application-layer Programs Emulation ...
收藏 引用
4th International Conference on Computer engineering and Application, ICCEA 2023
作者: He, Heng Xiong, Xiaobing Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ... 详细信息
来源: 评论
An Intrusion Detection Feature Selection Method Based on Improved Mutual Information  6
An Intrusion Detection Feature Selection Method Based on Imp...
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Qi, Zan Fei, Jinlong Wang, Jue Li, Xue State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u... 详细信息
来源: 评论
Critical Variable Guided Mutation for Directed Greybox Fuzzing
Critical Variable Guided Mutation for Directed Greybox Fuzzi...
收藏 引用
2023 IEEE International Conference on Control, Electronics and Computer Technology, ICCECT 2023
作者: He, Yubo Liu, Long The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Directed greybox fuzzing directs fuzzers to specified code areas and has gained great achievements in 1-day vulnerability detection. However, existing directed graybox fuzzers fail to generate the crash sample even if... 详细信息
来源: 评论