咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State key of Laboratory of Mathematical Engineering And Advanced Computing"
1989 条 记 录,以下是351-360 订阅
排序:
Malware analysis platform based on software gene for cyberspace security practice teaching  2
Malware analysis platform based on software gene for cybersp...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Liu, Fudong Zhang, Ping Hou, Yifan Wang, Lixin Shan, Zheng Wang, Junchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In recent years, a large number of malware has spread indiscriminately, which causes various significant cyberspace security incidents all over the world. Therefore, malware detection has become one of the important r... 详细信息
来源: 评论
Stability Analysis of a Rumor Propagation Model in Complex Networks with Holling II Type Functional Response  6
Stability Analysis of a Rumor Propagation Model in Complex N...
收藏 引用
6th International Conference on Big Data and Information Analytics, BigDIA 2020
作者: Yu, Ze Zhou, Gang Luo, Junyong Zhang, Mengli Huang, Ningbo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ... 详细信息
来源: 评论
Memory Error Detection Based on Dynamic Binary Translation  20
Memory Error Detection Based on Dynamic Binary Translation
收藏 引用
20th IEEE International Conference on Communication Technology, ICCT 2020
作者: Xu, Hang Ren, Wei Liu, Zimian Chen, Jiajun Zhu, Junhu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic memory error detection technology is widely utilized in locating and mitigating memory-corruption vulnerabilities. High false negative in existing technologies impairs the effectiveness of detection, especiall... 详细信息
来源: 评论
Moving Target Defense Decision-Making Method: A Dynamic Markov Differential Game Model  7
Moving Target Defense Decision-Making Method: A Dynamic Mark...
收藏 引用
7th ACM Workshop on Moving Target Defense, MTD 2020
作者: Zhang, Hengwei Tan, Jinglei Liu, Xiaohu Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Today most of the moving target defense decision-making methods are based on models of a discrete dynamic game. To more accurately study network attack-defense strategies against continuous confrontations, we analyze ... 详细信息
来源: 评论
Software supply chain analysis based on function similarity  4
Software supply chain analysis based on function similarity
收藏 引用
2020 4th International Conference on Electrical, Mechanical and Computer engineering, ICEMCE 2020
作者: Sun, Wenjie Shan, Zheng Liu, Fudong Li, Xingwei Qiao, Meng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen... 详细信息
来源: 评论
Thinking and practice of online teaching under COVID-19 Epidemic  2
Thinking and practice of online teaching under COVID-19 Epid...
收藏 引用
2nd International Conference on Computer Science and Educational Informatization, CSEI 2020
作者: Ping, Zhang Fudong, Liu Zheng, Shan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l... 详细信息
来源: 评论
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud  7th
Security-as-a-Service with Cyberspace Mimic Defense Technolo...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Wang, Junchao Pang, Jianmin Wei, Jin State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Data Science Fudan University Shanghai China
Users usually focus on the application-level requirements which are quite friendly and direct to them. However, there are no existing tools automating the application-level requirements to infrastructure provisioning ... 详细信息
来源: 评论
Attention-aligned mean-teacher learning for unsupervised domain adaptive person re-ID
收藏 引用
Science China Technological Sciences 2025年
作者: You LYU Zhen ZHANG Guoliang KANG Wei WEI Institute of Artificial Intelligence Beihang University Key Laboratory of Mathematics Informatics Behavioral Semantics Ministry of Education Beihang University State Key Laboratory of Software Development Environment and Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang University School of Automation Science and Electrical Engineering Beihang University AVICAS Generic Technology Co. Ltd Zhongguancun Laboratory School of Mathematics Sciences Beihang University
In recent years, artificial intelligence has fueled the development of numerous applications [1, 2]. Person re-identification (re-ID) is a typical artificial intelligence system designed to automatically retrieve imag...
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
advanced computing and Endogenous Security, International Conference on
作者: Zhaorui Ma Shicheng Zhang Yiheng Chang Qinglei Zhou Xinhao Hu Xia Li State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Zhengzhou University of Light Industry Zhengzhou China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论
RaCMC: Residual-Aware Compensation Network with Multi-Granularity Constraints for Fake News Detection  39
RaCMC: Residual-Aware Compensation Network with Multi-Granul...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yu, Xinquan Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou 510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450002 China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science Faculty of Science and Technology University of Macau 999078 Macao
Multimodal fake news detection aims to automatically identify real or fake news, thereby mitigating the adverse effects caused by such misinformation. Although prevailing approaches have demonstrated their effectivene... 详细信息
来源: 评论