咨询与建议

限定检索结果

文献类型

  • 1,084 篇 期刊文献
  • 881 篇 会议
  • 1 册 图书

馆藏范围

  • 1,966 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,254 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 169 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 103 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,010 篇 理学
    • 552 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 34 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 612 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,865 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State Key laboratory of Mathematical Engineering and Advanced Computing"
1966 条 记 录,以下是351-360 订阅
排序:
Memory Error Detection Based on Dynamic Binary Translation  20
Memory Error Detection Based on Dynamic Binary Translation
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Xu, Hang Ren, Wei Liu, Zimian Chen, Jiajun Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall... 详细信息
来源: 评论
Stability Analysis of a Rumor Propagation Model in Complex Networks with Holling II Type Functional Response  6
Stability Analysis of a Rumor Propagation Model in Complex N...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Yu, Ze Zhou, Gang Luo, Junyong Zhang, Mengli Huang, Ningbo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ... 详细信息
来源: 评论
Moving Target Defense Decision-Making Method: A Dynamic Markov Differential Game Model  7
Moving Target Defense Decision-Making Method: A Dynamic Mark...
收藏 引用
7th ACM Workshop on Moving Target Defense, MTD 2020
作者: Zhang, Hengwei Tan, Jinglei Liu, Xiaohu Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ... 详细信息
来源: 评论
Software supply chain analysis based on function similarity  4
Software supply chain analysis based on function similarity
收藏 引用
2020 4th International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2020
作者: Sun, Wenjie Shan, Zheng Liu, Fudong Li, Xingwei Qiao, Meng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen... 详细信息
来源: 评论
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud  7th
Security-as-a-Service with Cyberspace Mimic Defense Technolo...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Wang, Junchao Pang, Jianmin Wei, Jin State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Data Science Fudan University Shanghai China
Users usually focus on the application-level requirements which are quite friendly and direct to them. However, there are no existing tools automating the application-level requirements to infrastructure provisioning ... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zhaorui Ma Shicheng Zhang Yiheng Chang Qinglei Zhou Xinhao Hu Xia Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou University of Light Industry Zhengzhou China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
Street-Level IP Geolocation Algorithm Based on Landmarks Clustering
收藏 引用
Computers, Materials & Continua 2021年 第3期66卷 3345-3361页
作者: Fan Zhang Fenlin Liu Rui Xu Xiangyang Luo Shichang Ding Hechan Tian PLA Strategic Support Force Information Engineering University Zhengzhou450001China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Cyberspace Security Key Laboratory of Sichuan Province Chengdu610000China China Electronic Technology Cyber Security Co. Ltd.Chengdu610000China University of Goettingen Goettingen37075Germany
Existing IP geolocation algorithms based on delay similarity often rely on the principle that geographically adjacent IPs have similar ***,this principle is often invalid in real Internet environment,which leads to un... 详细信息
来源: 评论
Analysis of Instantaneous Angular Speed Accuracy Considering Encoder Errors
Analysis of Instantaneous Angular Speed Accuracy Considering...
收藏 引用
International Conference on Automation and computing (ICAC)
作者: Yuanhao Liu Fengshou Gu Qiang Zeng State Key Laboratory of Mechanical Transmissions for Advanced Equipment Chongqing University Chongqing China School of Computing and Engineering University of Huddersfield Huddersfield UK
Instantaneous Angular Speed (IAS) is closely related to the dynamic behavior of rotating machinery and plays a crucial role in diagnosing faults. However, the measurement of the IAS is subject to various errors inevit... 详细信息
来源: 评论
Population-Based Meta-Heuristic Optimization Algorithm Booster: An Evolutionary and Learning Competition Scheme
收藏 引用
Neurocomputing 2025年 643卷
作者: Wang, Jun Dong, Junyu Zhou, Huiyu Dong, Xinghui State Key Laboratory of Physical Oceanography and Faculty of Information Science and Engineering Ocean University of China China School of Computing and Mathematical Sciences University of Leicester United Kingdom
In a Population-Based Meta-Heuristic Optimization Algorithm (PMOA), individuals in the population will constantly generate new promising individuals, to form new populations. Although the population continuously chang... 详细信息
来源: 评论