咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State Key-Laboratory of Mathematical Engineering and Advanced Computing"
1989 条 记 录,以下是621-630 订阅
排序:
Thinking and Practice of Online Teaching under COVID-19 Epidemic
Thinking and Practice of Online Teaching under COVID-19 Epid...
收藏 引用
IEEE International Conference on Computer Science and Educational Informatization (CSEI)
作者: Zhang Ping Liu Fudong Shan Zheng State Key Laboratory of Mathematical Engineering and Advanced computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Embedding Attribute and Relation Information for Person Entity Alignment
Embedding Attribute and Relation Information for Person Enti...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Can Wang Xiaonan Liu Meijuan Yin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ... 详细信息
来源: 评论
Software Deployment Strategy Based on Performance and Heterogeneity
Software Deployment Strategy Based on Performance and Hetero...
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Hao Liu Zheng Zhang Zhenwu Liu Gaofei Zhang Yufeng Zhao State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the current cyberspace field, the positions of offensive and defensive parties are extremely imbalanced. Aiming at the weakness of web virtual hosting in this paper, we combine software diversity technology to buil... 详细信息
来源: 评论
Dynamic Array Double-Access Attack in Ethereum
Dynamic Array Double-Access Attack in Ethereum
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Xiangyang Chang Junhu Zhu Shibin Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu... 详细信息
来源: 评论
Optimal Strategy Selection of Dynamic Protocol Stack Based on Game Theory
Optimal Strategy Selection of Dynamic Protocol Stack Based o...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Zhengke He Bin Lu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Mobile target defense technology not only protects system security, but also increases the cost of system operation. How to reduce the defense cost as much as possible while achieving the defense function is a current... 详细信息
来源: 评论
A Software Upgrade Security Analysis Method on Network Traffic Classification using Deep Learning
A Software Upgrade Security Analysis Method on Network Traff...
收藏 引用
Urban engineering and Management Science (ICUEMS), International Conference on
作者: Bing Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论
Recommendation of cyber attack method based on knowledge graph
Recommendation of cyber attack method based on knowledge gra...
收藏 引用
Computer engineering and Intelligent Control (ICCEIC) International Conference on
作者: Yunjia Ou Tianyang Zhou Junhu Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The lack of correlation between the new cyber attack intelligence and the knowledge database makes it difficult for the recommendation system to recommend effective cyber attack knowledge in terms of the new security ... 详细信息
来源: 评论
Topology-Aware Software Assignment in Networked Systems  2
Topology-Aware Software Assignment in Networked Systems
收藏 引用
2019 2nd International Conference on advanced Algorithms and Control engineering, ICAACE 2019
作者: Wang, Junchao Liu, Hao Liu, Zhenwu Zhang, Zheng Pang, Jianmin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Cyberspace mimic defense has been proven to be a revolutionary defense technology that "changes the rules of the game" to ensure the security of cyberspace. However, the software diversity inherent in mimic ... 详细信息
来源: 评论
Clustering and Routing Optimization Algorithm for Heterogeneous Wireless Sensor Networks
Clustering and Routing Optimization Algorithm for Heterogene...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Ling Chen Wenwen Liu Daofu Gong Yan Chen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Wireless sensor network (WSN) is the cutting-edge technology of modern monitoring technology. There is a direct relationship between the length of its lifetime and its performance. Efficient and reasonable clustering ... 详细信息
来源: 评论
Unknown Traffic Identification Based on Deep Adaptation Networks
Unknown Traffic Identification Based on Deep Adaptation Netw...
收藏 引用
IEEE Conference on ALocal Computer Networks Workshops (LCN Workshops)
作者: Ziji Yang Wei Lin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Network traffic classification has become an important basis for computer networks. However, the emergence of new applications, which generate unknown traffic constantly, has brought new challenges. The most critical ... 详细信息
来源: 评论