咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 880 篇 会议

馆藏范围

  • 1,957 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,248 篇 工学
    • 696 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,856 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1957 条 记 录,以下是291-300 订阅
排序:
A Cross-Platform Instant Messaging User Association Method Based on Spatio-temporal Trajectory  8th
A Cross-Platform Instant Messaging User Association Method B...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Zhou, Pei Luo, Xiangyang Du, Shaoyong Li, Lingling Yang, Yang Liu, Fenlin School of Cyber Science and Engineering Zhengzhou University Zhengzhou450000 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Intelligent Engineering Zhengzhou University of Aeronautics Zhengzhou450000 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore
The current research on cross-platform instant messaging user association is mainly divided into two categories: based on user attributes and based on user behavior. Methods based on user attributes mainly identify us... 详细信息
来源: 评论
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1307-1324页
作者: Ke Liu Jing-Yi Wang Qiang Wei Zhen-Yong Zhang Jun Sun Rong-Kuan Ma Rui-Long Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China College of Computer Science and Technology Guizhou UniversityGuiyang 550025China School of Information Systems Singapore Management UniversitySingapore 689867Singapore
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ... 详细信息
来源: 评论
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon via exploiting mitigations  23
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon v...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Tingting Yin Zicong Gao Zhenghang Xiao Zheyu Ma Min Zheng Chao Zhang Tsinghua University and Ant Group State Key Laboratory of Mathematical Engineering and Advanced Computing Hunan University Tsinghua University Ant Group Tsinghua University and Zhongguancun Laboratory
macOS drivers, i.e., Kernel EXTensions (kext), are attractive attack targets for adversaries. However, automatically discovering vulnerabilities in kexts is extremely challenging because kexts are mostly closed-source...
来源: 评论
Thermally Evaporated ZnSe for Efficient and Stable Regular/Inverted Perovskite Solar Cells by Enhanced Electron Extraction
收藏 引用
Energy & Environmental Materials 2023年 第5期6卷 440-448页
作者: Xin Li Guibin Shen Xin Ren Ng Zhiyong Liu Yun Meng Yongwei Zhang Cheng Mu Zhi Gen Yu Fen Lin Solar Energy Research Institute of Singapore(SERIS) National University of SingaporeSingapore 117574Singapore Key Laboratory of Advanced Light Conversion Materials and Biophotonics Department of ChemistryRenmin University of ChinaBeijing 100872China State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and TechnologyWuhan 430074China School of Materials Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore Shandong Provincial Engineering and Technical Center of Light Manipulation and Shandong Provincial Key Laboratory of Optics and Photonic Devices School of Physics and ElectronicsShandong Normal UniversityJinan 250014China Institute of High Performance Computing A^(*)STARSingapore 138632Singapore
Electron transport layers(ETLs)are crucial for achieving efficient and stable planar perovskite solar cells(PSCs).Reports on versatile inorganic ETLs using a simple film fabrication method and applicability for both l... 详细信息
来源: 评论
BA-Audit: Blockchain-Based Public Auditing for Aggregated Data Sharing in Edge-Assisted IoT  1
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Liu, Mingxi Lu, Ning Yin, Jingli Cheng, Qingfeng Shi, Wenbo School of Computer Science and Engineering Northeastern University Shenyang China School of Computer Science and Technology Xidian University Xi’an China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou China
With the massive placement of sensors leading to a surge in IoT data, it is wise for system administrators to use data aggregation strategies to collect and share data in edge-assisted IoT scenarios because traditiona... 详细信息
来源: 评论
Similarity Measure for Smart Contract Bytecode Based on CFG Feature Extraction  4
Similarity Measure for Smart Contract Bytecode Based on CFG ...
收藏 引用
4th International Conference on Computer Information Science and Artificial Intelligence, CISAI 2021
作者: Zhu, DI Pang, Jianmin Zhou, Xin Han, Wenjie Zhengzhou University Zhengzhou450002 China Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
As the mainstream of smart contract research, most Ethereum smart contracts do not open their source code, and the bytecode of smart contracts has attracted the attention of researchers. Based on the similarity measur... 详细信息
来源: 评论
Taking Myopic Best Response Against the Hedge Algorithm  42
Taking Myopic Best Response Against the Hedge Algorithm
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Guo, Xinxiang Mu, Yifen School of Mathematical Sciences University of Chinese Academy of Sciences Beijing China Academy of Mathematics and Systems Science The State Key Laboratory of Scientific and Engineering Computing Chinese Academy of Sciences Beijing China Academy of Mathematics and Systems Science The Key Laboratory of Systems and Control Chinese Academy of Sciences Beijing China
With the rapid development of artificial intelligence (AI), the game between the human and machine/AI becomes more and more common. The related theoretical analysis becomes significant and necessary, which however is ... 详细信息
来源: 评论
HHL Analysis and Simulation Verification Based on Origin Quantum Platform  4
HHL Analysis and Simulation Verification Based on Origin Qua...
收藏 引用
2021 4th International Conference on Mechatronics and Computer Technology engineering, MCTE 2021
作者: Liu, Xiaonan Jing, Lina Han, Lin Gao, Jie State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Henan Supercomputing Center Zhengzhou University Zhengzhou450001 China
Solving large-scale linear equations is of great significance in many engineering fields, such as weather forecasting and bioengineering. The classical computer solves the linear equations, no matter adopting the elim... 详细信息
来源: 评论
Image Electronic Evidence Screening Based on Improved SSD  6
Image Electronic Evidence Screening Based on Improved SSD
收藏 引用
6th IEEE International Conference on Intelligent computing and Signal Processing, ICSP 2021
作者: Liu, Yafei Jiang, Liehui Liu, Tieming Zhang, Youwei Zhengzhou University Zhongyuan Network Security Research Institute Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of information technology, electronic evidence plays an increasingly important role in the judicial trial. In Judicial Forensics, it is difficult to extract effective electronic evidence accuratel... 详细信息
来源: 评论
An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment
收藏 引用
Science China(Information Sciences) 2021年 第9期64卷 249-251页
作者: Ting CHEN Xinghua LI Qingfeng CHENG School of Cyber Engineering Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing
Dear editor,Numerous three-party authenticated key exchange(3 PAKE)protocols have been presented, which allow the establishment of a secure session by utilizing a session key shared between two clients with the assist... 详细信息
来源: 评论