咨询与建议

限定检索结果

文献类型

  • 1,080 篇 期刊文献
  • 880 篇 会议
  • 1 册 图书

馆藏范围

  • 1,961 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,251 篇 工学
    • 699 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 178 篇 电子科学与技术(可...
    • 172 篇 信息与通信工程
    • 167 篇 电气工程
    • 120 篇 控制科学与工程
    • 120 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 69 篇 机械工程
    • 59 篇 仪器科学与技术
    • 54 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,008 篇 理学
    • 550 篇 物理学
    • 385 篇 数学
    • 123 篇 统计学(可授理学、...
    • 118 篇 化学
    • 114 篇 生物学
    • 77 篇 地球物理学
    • 59 篇 系统科学
  • 218 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 32 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 33 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 21 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 611 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 93 篇 university of ch...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 72 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,860 篇 英文
  • 60 篇 其他
  • 44 篇 中文
检索条件"机构=State key Laboratory of Mathematical Engineering and Advanced Computing"
1961 条 记 录,以下是231-240 订阅
排序:
Vulnerability Sample Analysis Based on Dynamic Binary Platform
Vulnerability Sample Analysis Based on Dynamic Binary Platfo...
收藏 引用
2021 International Conference on Aviation Safety and Information Technology, ICASIT 2021
作者: Bu, Wenjuan Kang, Fei Zhao, Yuntian Xu, Jianbo State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Henan Zhengzhou450000 China
Based on the existing vulnerability exploitation detection technology, this paper analyzes the buffer overflow vulnerability exploitation process, and detects vulnerability triggering, protection mechanism bypassing a... 详细信息
来源: 评论
Open Set Recognition for Encrypted Traffic using Intra-class Partition and Boundary Sample Generation  5
Open Set Recognition for Encrypted Traffic using Intra-class...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Li, Xue Fei, Jinlong Qi, Zan Lv, Zhuo Jiang, Heng PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China PLA Information Engineering University National Digital Switching System Engineering Technological Research Center Zhengzhou China
Existing deep learning-based encrypted traffic recognition methods can achieve high precision identification performance while protecting user privacy, but almost all of them focus on closed sets, in which training da... 详细信息
来源: 评论
Duen: Dynamic Ensemble Handling Class Imbalance in Network Intrusion Detection
SSRN
收藏 引用
SSRN 2023年
作者: Ren, Huajuan Tang, Yonghe Dong, Weiyu Ren, Shuai Jiang, Liehui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou China
Network intrusion detection is an important technology for maintaining cybersecurity. The inherent difficulties co-existing in network traffic datasets, such as class imbalance, class overlapping, and noises, limit de... 详细信息
来源: 评论
First-principles investigation of microscopic mechanisms underlying hole mobilities in diamond, silicon, and germanium
收藏 引用
Physical Review B 2024年 第15期110卷 155203页
作者: Qiao-Lin Yang Fan-Chen Meng Wu Li Zhi Wang Hui-Xiong Deng Su-Huai Wei Fan-long Ning Jun-Wei Luo School of Physics and Zhejiang Key Laboratory of Micro-Nano Quantum Chips and Quantum Control State Key Laboratory of Superlattices and Microstructures Research Computing and Data Eastern Institute for Advanced Study Center of Materials Science and Optoelectronics Engineering State Key Laboratory of Silicon and Advanced Semiconductor Materials
Silicon (Si) dominates the semiconductor industry but currently suffers from significant hole mobility degradation in advanced transistors due to its abnormally low hole mobility (505cm2/Vs), compared to its group IV ... 详细信息
来源: 评论
Performance Verification of Smith Predictor Control Using IMC Scheme via Chemical Reaction Networks and DNA Strand Displacement Reaction  9
Performance Verification of Smith Predictor Control Using IM...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Yao, Jingwang Lv, Hui Xiao, Yijun Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China Northeastern University State Key Laboratory of Synthetical Automation for Process Industries Shenyang110004 China
Biochemical process control is often achieved through feedback control strategies for theoretical analysis and optimization of biochemical reaction processes. Here, the design improves the robustness of the biochemica... 详细信息
来源: 评论
SoK: A Survey on Redundant Execution Technology
SoK: A Survey on Redundant Execution Technology
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zijing Liu Zheng Zhang Ruicheng Xi Pengzhe Zhu Bolin Ma State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Redundant execution technology is one of the effective ways to improve the safety and reliability of computer systems. By rationally configuring redundant resources, adding components with the same function, using the... 详细信息
来源: 评论
Clause-level Relationship-aware Math Word Problems Solver
收藏 引用
Machine Intelligence Research 2022年 第5期19卷 425-438页
作者: Chang-Yang Wu Xin Lin Zhen-Ya Huang Yu Yin Jia-Yu Liu Qi Liu Gang Zhou Anhui Province Key Laboratory of Big Data Analysis and Application School of Data ScienceUniversity of Science and Technology of ChinaHefei 230026China Institute of Artificial Intelligence Hefei Comprehensive National Science CenterHefei 230088China Laboratory of Mathematical Engineering and Advanced Computing Information Engineering UniversityZhengzhou 450001China
Automatically solving math word problems,which involves comprehension,cognition,and reasoning,is a crucial issue in artificial intelligence *** math word problem solvers mainly work on word-level relationship extracti... 详细信息
来源: 评论
A Software/Hardware Co-design Local Irregular Sparsity Method for Accelerating CNNs on FPGA  22
A Software/Hardware Co-design Local Irregular Sparsity Metho...
收藏 引用
Workshop Proceedings of the 51st International Conference on Parallel Processing
作者: Jiangwei Shang Zhan Zhang Chuanyou Li Kun Zhang Lei Qian Hongwei Liu Harbin Institute of Technology China Southeast University China State Key Laboratory of Mathematical Engineering and Advanced Computing China
Convolutional neural networks (CNNs) have been widely used in different areas. The success of CNNs comes with a huge amount of parameters and computations, and nowaday CNNs still keep moving toward larger structures. ... 详细信息
来源: 评论
A Relation-Oriented Method for Joint Entity and Relation Extraction Based on Neural Network  21
A Relation-Oriented Method for Joint Entity and Relation Ext...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Hu, Hongwei Yin, Meijuan Liu, Xiaonan Key Laboratory of Cyberspace Situation Awareness of Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Entity and relation extraction is a basic task of information extraction in natural language processing. At present, Entity and relation extraction based on artificial intelligence has been widely studied, but most me... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
International Conference on Communications, Information System and Computer engineering (CISCE)
作者: Zhe Xiong Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论