咨询与建议

限定检索结果

文献类型

  • 1,077 篇 期刊文献
  • 878 篇 会议
  • 3 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,242 篇 工学
    • 691 篇 计算机科学与技术...
    • 564 篇 软件工程
    • 174 篇 电子科学与技术(可...
    • 167 篇 信息与通信工程
    • 165 篇 电气工程
    • 121 篇 化学工程与技术
    • 118 篇 控制科学与工程
    • 102 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 80 篇 网络空间安全
    • 66 篇 机械工程
    • 58 篇 仪器科学与技术
    • 53 篇 力学(可授工学、理...
    • 48 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 核科学与技术
    • 34 篇 冶金工程
  • 1,003 篇 理学
    • 548 篇 物理学
    • 380 篇 数学
    • 121 篇 统计学(可授理学、...
    • 118 篇 化学
    • 113 篇 生物学
    • 78 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 32 篇 临床医学
  • 38 篇 法学
    • 31 篇 社会学
  • 17 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 616 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 93 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 75 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 66 篇 dai h.l.
  • 64 篇 li xin
  • 64 篇 guo y.q.
  • 64 篇 liu b.
  • 63 篇 bao y.w.
  • 62 篇 hu h.b.
  • 61 篇 min z.
  • 58 篇 liu h.d.

语言

  • 1,865 篇 英文
  • 51 篇 其他
  • 45 篇 中文
检索条件"机构=State Key of Laboratory of Mathematical Engineering and Advanced Computing"
1958 条 记 录,以下是41-50 订阅
排序:
An efficient quantum meet-in-the-middle attack against NTRU-2005
收藏 引用
Chinese Science Bulletin 2013年 第28期58卷 3514-3518页
作者: WANG Hong MA Zhi MA ChuanGui State Key Laboratory of Mathematical Engineering and Advanced Computing
NTRU is one of the most widely used public-key cryptosystems and its security has been an active research *** paper proposes a new way to find NTRU-2005 private *** algorithm is based on meet-in-the-middle attack and ... 详细信息
来源: 评论
Research Progress of Reverse Monte Carlo and Its Application in Josephson Junction Barrier Layer
收藏 引用
Computer Modeling in engineering & Sciences 2023年 第12期137卷 2077-2109页
作者: Junling Qiu Huihui Sun Shuya Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China
As indispensable components of superconducting circuit-based quantum computers,Josephson junctions determine how well superconducting qubits *** Monte Carlo(RMC)can be used to recreate Josephson junction’s atomic str... 详细信息
来源: 评论
Replace2Self: Self-Supervised Denoising based on Voxel Replacing and Image Mixing for Diffusion MRI
收藏 引用
IEEE Transactions on Medical Imaging 2025年 PP卷 PP页
作者: Wu, Linhai Wang, Lihui Deng, Zeyu Zhu, Yuemin Wei, Hongjiang Guizhou University Key Laboratory of Advanced Medical Imaging and Intelligent Computing of Guizhou Province Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education State Key Laboratory of Public Big Data College of Computer Science and Technology 550025 China Univ Lyon INSA Lyon CNRS Inserm CREATIS UMR 5220 LyonF-69621 France Shanghai Jiao Tong University School of Biomedical Engineering Shanghai200030 China
Low signal to noise ratio (SNR) remains one of the limitations of diffusion weighted (DW) imaging. How to suppress the influence of noise on the subsequent analysis about the tissue microstructure is still challenging... 详细信息
来源: 评论
Dynamic evolution of collective emotions in social networks: a case study of Sina weibo
收藏 引用
Science China(Information Sciences) 2013年 第7期56卷 150-167页
作者: XIONG XiaoBing ZHOU Gang HUANG YongZhong CHEN HaiYong XU Ke State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Software Development Environment Beihang University
Emotion is a fundamental object of human existence and determined by a complex set of factors. With the rapid development of online social networks (OSNs), more and more people would like to express their emotion in O... 详细信息
来源: 评论
Revocable Broadcast Encryption with Constant Ciphertext and Private key Size
收藏 引用
Chinese Journal of Electronics 2019年 第4期28卷 690-697页
作者: JIA Hongyong CHEN Yue YANG Kuiwu GUO Yuanbo WANG Zhiwei Zhengzhou University State Key Laboratory of Mathematical Engineering and Advanced Computing Nanjing University of Post and Communications
In a revocable broadcast encryption scheme, the group manager can flexibly set revoked users who cannot decrypt the ciphertext. Many applications of the revocable broadcast encryption have been found in the secure clo... 详细信息
来源: 评论
An advanced Automatic Construction Method of ROP
收藏 引用
Wuhan University Journal of Natural Sciences 2015年 第2期20卷 119-128页
作者: OUYANG Yongji WANG Qingxian PENG Jianshan ZENG Jie State Key Laboratory of Mathematical Engineering and Advanced Computing
Automatic return oriented programming (ROP) technology can effectively improve the efficiency of ROP constructed, but the existing research results still have some shortcomings including needing more address space, ... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1223-1243页
作者: Yuancong Chai Yuefei Zhu Wei Lin Ding Li State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou450001China
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged... 详细信息
来源: 评论
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model
收藏 引用
Science China(Information Sciences) 2017年 第7期60卷 130-143页
作者: Fushan WEI Jianfeng MA Ruijie ZHANG Chuangui MA Xuan WANG State Key Laboratory of Integrated Service Networks Xidian University State Key Laboratory of Mathematical Engineering and Advanced Computing The PLA Information Engineering University Engineering University of CAPF
With the assistance of an authentication server, a gateway-oriented password-authenticated key exchange(GPAKE) protocol can establish a common session key shared between a client and a gateway. Unfortunately, a GPAKE ... 详细信息
来源: 评论
Method based on GSCPN for network vulnerability analysis
Journal of Software
收藏 引用
Journal of Software 2013年 第8期8卷 2032-2038页
作者: Gao, Xiang Zhu, Yue-Fei Fei, Jin-Long Han, Tao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China
With the development of network security research, network attack modeling and analysis techniques have been paid more and more attention. A generalized stochastic colored Petri Net (GSCPN) Model is proposed. To each ... 详细信息
来源: 评论