咨询与建议

限定检索结果

文献类型

  • 1,886 篇 期刊文献
  • 924 篇 会议

馆藏范围

  • 2,810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,697 篇 理学
    • 991 篇 物理学
    • 600 篇 数学
    • 175 篇 化学
    • 173 篇 统计学(可授理学、...
    • 131 篇 生物学
    • 96 篇 系统科学
    • 92 篇 地球物理学
    • 73 篇 天文学
  • 1,652 篇 工学
    • 812 篇 计算机科学与技术...
    • 654 篇 软件工程
    • 222 篇 电子科学与技术(可...
    • 211 篇 信息与通信工程
    • 196 篇 电气工程
    • 167 篇 材料科学与工程(可...
    • 162 篇 化学工程与技术
    • 161 篇 控制科学与工程
    • 135 篇 核科学与技术
    • 120 篇 光学工程
    • 105 篇 生物工程
    • 84 篇 力学(可授工学、理...
    • 80 篇 机械工程
    • 79 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 60 篇 生物医学工程(可授...
    • 58 篇 冶金工程
  • 251 篇 管理学
    • 171 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 52 篇 医学
    • 46 篇 临床医学
  • 41 篇 法学
  • 22 篇 经济学
  • 18 篇 农学
  • 15 篇 军事学
  • 9 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 51 篇 hadron colliders
  • 40 篇 machine learning
  • 38 篇 higgs bosons
  • 37 篇 feature extracti...
  • 36 篇 deep learning
  • 36 篇 branching fracti...
  • 35 篇 lepton colliders
  • 32 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 particle decays
  • 27 篇 particle data an...
  • 26 篇 training
  • 26 篇 nuclear structur...
  • 25 篇 relativistic hea...
  • 25 篇 security
  • 23 篇 supersymmetric m...
  • 23 篇 software
  • 23 篇 extensions of hi...
  • 23 篇 hadronic decays

机构

  • 540 篇 state key labora...
  • 264 篇 department of mo...
  • 239 篇 faculty of scien...
  • 238 篇 department for p...
  • 236 篇 west university ...
  • 232 篇 department of ph...
  • 226 篇 department of ph...
  • 222 篇 infn e laborator...
  • 221 篇 kirchhoff-instit...
  • 219 篇 department of ph...
  • 219 篇 department of ph...
  • 207 篇 department physi...
  • 203 篇 research center ...
  • 200 篇 fakultät für phy...
  • 197 篇 institute of phy...
  • 194 篇 graduate school ...
  • 194 篇 institute of phy...
  • 181 篇 department of ph...
  • 179 篇 instituto de fís...
  • 174 篇 faculté des scie...

作者

  • 185 篇 d. calvet
  • 173 篇 j. m. izen
  • 171 篇 c. alexa
  • 171 篇 g. bella
  • 171 篇 c. amelung
  • 170 篇 n. orlando
  • 169 篇 j. strandberg
  • 168 篇 y. tayalati
  • 168 篇 g. spigo
  • 168 篇 v. chiarella
  • 168 篇 f. siegert
  • 164 篇 a. dimitrievska
  • 164 篇 f. deliot
  • 160 篇 r. ströhmer
  • 156 篇 m. rijssenbeek
  • 155 篇 s. jin
  • 155 篇 g. gaudio
  • 154 篇 y. abulaiti
  • 153 篇 y. tu
  • 153 篇 w. j. fawcett

语言

  • 2,644 篇 英文
  • 107 篇 其他
  • 60 篇 中文
检索条件"机构=State key laboratory of mathematics engineering and advanced computing"
2810 条 记 录,以下是81-90 订阅
排序:
Disentangling Ensemble Models on Adversarial Generalization in Image Classification  5
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
5th International Conference on Electronic engineering and Informatics, EEI 2023
作者: Li, Chenwei Pan, Mengyuan Yang, Bo Zhang, Hengwei Henan Key Laboratory of Information Security State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp... 详细信息
来源: 评论
Honeypot Detection Method Based on Anomalous Requests Response Differences  23
Honeypot Detection Method Based on Anomalous Requests Respon...
收藏 引用
6th International Conference on Electronics, Communications and Control engineering, ICECC 2023
作者: Chen, Xingyu Lu, Bin Sun, Rongbo Jiang, Mi State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University China Cyber Security College Information Engineering University China
Honeypot detection is a popular technology in the current cyber security, which can be used to check the disguise and protection level of deployed honeypots. To address the problem of low detection accuracy of existin... 详细信息
来源: 评论
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论
Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge computing Environments
收藏 引用
Tsinghua Science and Technology 2023年 第1期28卷 93-104页
作者: Huanhuan Xu Jingya Zhou Wenqi Wei Baolei Cheng School of Computer Science and Technology Soochow UniversitySuzhou 215006China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China School of Computer Science Georgia Institute of TechnologyAtlantaGA 30332USA
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n... 详细信息
来源: 评论
Impacts of spatially inconsistent permafrost degradation on streamflow in the Lena River Basin
收藏 引用
Science China(Technological Sciences) 2024年 第11期67卷 3559-3570页
作者: XUE ZeHuan WANG YiChu ZHAO Yi LI DongDeng BORTHWICK Alistair George Liam The Key Laboratory of Water and Sediment Sciences Ministry of EducationCollege of Environmental Sciences and EngineeringPeking UniversityBeijing 100871China College of Water Sciences Beijing Normal UniversityBeijing 100875China State Key Laboratory of Hydraulics and Mountain River Engineering Sichuan UniversityChengdu 610065China State Environmental Protection Key Laboratory of All Materials Fluxes in River Ecosystems Peking UniversityBeijing 100871China School of Engineering The University of EdinburghEdinburgh EH93JLUnited Kingdom School of Engineering Computing and MathematicsUniversity of PlymouthPlymouth PL48AAUnited Kingdom
Although permafrost degradation contributes significantly to hydrological change in cold regions, gaps remain in our understanding of streamflow variation induced by degrading permafrost in different river basins. We ... 详细信息
来源: 评论
Numerical analysis of the performance of a three-bladed vertical-axis turbine with active pitch control using a coupled unsteady Reynolds-averaged Navier-Stokes and actuator line model
收藏 引用
Journal of Hydrodynamics 2023年 第3期35卷 516-532页
作者: Rui-wen Zhao Angus C.W.Creech Ye Li Vengatesan Venugopal Alistair G.L.Borthwick Laboratory of Multi-function Towing Tank State Key Laboratory of Ocean EngineeringSchool of Naval ArchitectureOcean and Civil EngineeringShanghai Jiao Tong UniversityShanghai 200240China School of Engineering and Physical Sciences Heriot-Watt UniversityEdinburghUK School of Engineering The University of EdinburghEdinburghUK School of Engineering Computing and MathematicsUniversity of PlymouthPlymouthUK
In this paper,we present a numerical model of a vertical-axis turbine(VAT)with active-pitch torque *** model is based upon the Wind and Tidal Turbine Embedded Simulator(WATTES)and WATTES-V turbine realisations in conj... 详细信息
来源: 评论
Research on key Techniques for Reverse engineering of Deep Learning Models for x86 Executable Files  24
Research on Key Techniques for Reverse Engineering of Deep L...
收藏 引用
2024 7th International Conference on Computer Information Science and Artificial Intelligence, CISAI 2024
作者: Shi, Meng Lin, Wei Deng, Wenbo College of Cyberspace Security Information Engineering University Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Department of Cyberspace Security Henan Zhengzhou China
In recent years, with the continuous development of machine learning and deep learning, their related applications have gradually appeared in our field of vision, showing explosive growth. A deep learning compiler opt... 详细信息
来源: 评论
Probing the interlayer mechanical coupling of 2D layered materials-A review
收藏 引用
Progress in Natural Science:Materials International 2022年 第5期32卷 528-537页
作者: Yinghui Sun Yufei Sun Rongming Wang Kai Liu Beijing Advanced Innovation Center for Materials Genome Engineering Beijing Key Laboratory for Magneto-Photoelectrical Composite and Interface Science School of Mathematics and Physics University of Science and Technology Beijing State Key Laboratory of New Ceramics and Fine Processing School of Materials Science and Engineering Tsinghua University Key Laboratory of Advanced Materials of Ministry of Education School of Materials Science and Engineering Tsinghua University
Two-dimensional(2D) layered materials are assembled through the intralayer covalent bonds and interlayer van der Waals(vdWs) interactions. The relatively weak interlayer vdWs interactions result in the weak interlayer... 详细信息
来源: 评论
A survey of proactive defense in industrial control system
A survey of proactive defense in industrial control system
收藏 引用
2022 International Conference on Electronic Information Technology, EIT 2022
作者: Liu, Ke Wu, Qianqiong Geng, Yangyang Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de... 详细信息
来源: 评论
Research on Cascading Failures of Power Grid
Research on Cascading Failures of Power Grid
收藏 引用
2021 International Conference on Applied mathematics, Modeling and Computer Simulation, AMMCS 2021
作者: Wang, Hongmin Wei, Qiang Xie, Yaobin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole country. Blackouts are almost always caused by cascading failures. This paper first analyzes th... 详细信息
来源: 评论