咨询与建议

限定检索结果

文献类型

  • 1,879 篇 期刊文献
  • 924 篇 会议

馆藏范围

  • 2,803 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,691 篇 理学
    • 987 篇 物理学
    • 602 篇 数学
    • 174 篇 统计学(可授理学、...
    • 172 篇 化学
    • 130 篇 生物学
    • 96 篇 系统科学
    • 91 篇 地球物理学
    • 71 篇 天文学
  • 1,649 篇 工学
    • 811 篇 计算机科学与技术...
    • 657 篇 软件工程
    • 223 篇 电子科学与技术(可...
    • 212 篇 信息与通信工程
    • 196 篇 电气工程
    • 165 篇 材料科学与工程(可...
    • 160 篇 化学工程与技术
    • 157 篇 控制科学与工程
    • 135 篇 核科学与技术
    • 120 篇 光学工程
    • 104 篇 生物工程
    • 83 篇 力学(可授工学、理...
    • 79 篇 机械工程
    • 79 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 64 篇 仪器科学与技术
    • 59 篇 生物医学工程(可授...
    • 58 篇 冶金工程
  • 252 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 88 篇 图书情报与档案管...
    • 46 篇 工商管理
  • 50 篇 医学
    • 45 篇 临床医学
  • 41 篇 法学
  • 22 篇 经济学
  • 18 篇 农学
  • 15 篇 军事学
  • 9 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 51 篇 hadron colliders
  • 39 篇 machine learning
  • 38 篇 higgs bosons
  • 37 篇 feature extracti...
  • 36 篇 deep learning
  • 36 篇 branching fracti...
  • 35 篇 lepton colliders
  • 32 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 particle decays
  • 27 篇 particle data an...
  • 26 篇 training
  • 26 篇 nuclear structur...
  • 25 篇 relativistic hea...
  • 25 篇 security
  • 23 篇 supersymmetric m...
  • 23 篇 software
  • 23 篇 extensions of hi...
  • 23 篇 hadronic decays

机构

  • 540 篇 state key labora...
  • 264 篇 department of mo...
  • 239 篇 faculty of scien...
  • 238 篇 department for p...
  • 236 篇 west university ...
  • 232 篇 department of ph...
  • 226 篇 department of ph...
  • 222 篇 infn e laborator...
  • 221 篇 kirchhoff-instit...
  • 219 篇 department of ph...
  • 219 篇 department of ph...
  • 207 篇 department physi...
  • 203 篇 research center ...
  • 200 篇 fakultät für phy...
  • 197 篇 institute of phy...
  • 194 篇 graduate school ...
  • 194 篇 institute of phy...
  • 181 篇 department of ph...
  • 179 篇 instituto de fís...
  • 173 篇 faculté des scie...

作者

  • 185 篇 d. calvet
  • 173 篇 j. m. izen
  • 171 篇 c. alexa
  • 171 篇 g. bella
  • 171 篇 c. amelung
  • 170 篇 n. orlando
  • 169 篇 j. strandberg
  • 168 篇 y. tayalati
  • 168 篇 g. spigo
  • 168 篇 v. chiarella
  • 168 篇 f. siegert
  • 164 篇 a. dimitrievska
  • 164 篇 f. deliot
  • 160 篇 r. ströhmer
  • 156 篇 m. rijssenbeek
  • 155 篇 s. jin
  • 155 篇 g. gaudio
  • 154 篇 y. abulaiti
  • 153 篇 y. tu
  • 153 篇 w. j. fawcett

语言

  • 2,640 篇 英文
  • 104 篇 其他
  • 61 篇 中文
检索条件"机构=State key laboratory of mathematics engineering and advanced computing"
2803 条 记 录,以下是31-40 订阅
排序:
Research on Intrusion Tolerance System Based on Behavioral Baseline and Defense-in-Depth Architecture
Research on Intrusion Tolerance System Based on Behavioral B...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Meng, Qi Wang, Xuemeng Yang, Kai Meng, Long Wang, Jiancheng Fei, Jinlong State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
Tolerance technology is the third-generation network security technology commonly used in the world. It is derived from the category of information survival and endogenous security technology. A scholar from Carnegie ... 详细信息
来源: 评论
An anonymous authentication and secure data transmission scheme for the Internet of Things based on blockchain
收藏 引用
Frontiers of Computer Science 2024年 第3期18卷 183-197页
作者: Xingxing CHEN Qingfeng CHENG Weidong YANG Xiangyang LUO State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China Henan Key Laboratory of Grain Photoelectric Detection and Control Henan University of TechnologyZhengzhou 450001China Henan Province Key Laboratory of Cyberspace Situation Awareness Zhengzhou Institute of Information Science and TechnologyZhengzhou 450001China
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of ***,i... 详细信息
来源: 评论
IPDF: Directed Fuzzer for Input Parsing Program
IPDF: Directed Fuzzer for Input Parsing Program
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: He, Yubo Liu, Long State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Directed greybox fuzzing aims to test specific code and has made many advances in several areas. However, most vulnerabilities of input parsing programs are triggered in the particular state of the program, so existin... 详细信息
来源: 评论
A Survey of Security Analysis on Industrial Control Devices via Rehosting  3
A Survey of Security Analysis on Industrial Control Devices ...
收藏 引用
3rd IEEE International Conference on Information Technology, Big Data and Artificial Intelligence, ICIBA 2023
作者: Liu, Houzhi Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
At present, the network security of embedded devices has received more and more attention. However, the existing dynamic analysis tools can't performance in embedded devices as common softwares. The main reason is... 详细信息
来源: 评论
Social Media User Geolocation Based on Large Language Models  2nd
Social Media User Geolocation Based on Large Language Model...
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Zhang, Meng Luo, Xiangyang Huang, Ningbo Key Laboratory of Cyberspace Situation Awareness of Henan Province Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
In the digital age, social media platforms have amassed a wealth of user-generated content, which contains valuable geographic information. However, the irregularities and noise in user-generated text, have led to sub... 详细信息
来源: 评论
A Network Deception Defense Mechanism Based on Virtual Topology Generation
A Network Deception Defense Mechanism Based on Virtual Topol...
收藏 引用
2023 International Conference on Intelligent Systems, Communications, and Computer Networks, ISCCN 2023
作者: Wang, Binghui Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
To address the problem that traditional network defense techniques are difficult to cope with scanning attacks launched by internal attackers, this paper proposes a Virtual Network Topology Deception Defense mechanism... 详细信息
来源: 评论
Methods for solving equations with errors based on the HHL algorithm
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第4期29卷 9-20页
作者: LüLihui Wang Hong Ma Zhi Duan Qianheng Fei Yangyang Meng Xiangdong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Di... 详细信息
来源: 评论
IP-geolocater:a more reliable IP geolocation algorithm based on router error training
收藏 引用
Frontiers of Computer Science 2022年 第1期16卷 101-111页
作者: Shuodi ZU Xiangyang LUO Fan ZHANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Zhengzhou Science and Technology Institute Zhengzhou450001China
Location based services(LBS)are widely utilized,and determining the location of users’IP is the foundation for *** by unstable delay and insufficient landmarks,the existing geolocation algorithms have problems such a... 详细信息
来源: 评论
SOLVING OPTIMIZATION PROBLEMS OVER THE STIEFEL MANIFOLD BY SMOOTH EXACT PENALTY FUNCTIONS
收藏 引用
Journal of Computational mathematics 2024年 第5期42卷 1246-1276页
作者: Nachuan Xiao Xin Liu The Institute of Operations Research and Analytics National University of SingaporeSingapore State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems ScienceChinese Academy of Sciencesand University of Chinese Academy of SciencesChina
In this paper,we present a novel penalty model called ExPen for optimization over the Stiefel *** from existing penalty functions for orthogonality constraints,ExPen adopts a smooth penalty function without using any ... 详细信息
来源: 评论
The amorphization strategies of two-dimensional transition metal oxide/(oxy)hydroxide nanomaterials for enhanced electrocatalytic water splitting
收藏 引用
稀有金属(英文版) 2025年 第2期44卷 822-840页
作者: Si-Bin Duan Yu-Qing Wang Rui Cao Yi-Fei Sun Wen Zhang Rong-Ming Wang Beijing Key Laboratory for Magneto-Photoelectrical Composite and Interface Science The State Key Laboratory for Advanced Metals and MaterialsSchool of Mathematics and PhysicsUniversity of Science and Technology BeijingBeijing 100083China Department of Chemical& Materials Engineering The University of AucklandAuckland 1142New Zealand
Amorphous two-dimensional transition metal oxide/(oxy)hydroxide(2D TMO/TMHO)nanomaterials(NMs)have the properties of both 2D and amorphous materials,displaying outstanding physicochemical ***,they demonstrate consider... 详细信息
来源: 评论