咨询与建议

限定检索结果

文献类型

  • 1,103 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,268 篇 工学
    • 705 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 179 篇 电子科学与技术(可...
    • 174 篇 信息与通信工程
    • 170 篇 电气工程
    • 125 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 104 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 91 篇 光学工程
    • 79 篇 网络空间安全
    • 71 篇 机械工程
    • 61 篇 仪器科学与技术
    • 57 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 44 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 1,014 篇 理学
    • 553 篇 物理学
    • 383 篇 数学
    • 121 篇 统计学(可授理学、...
    • 120 篇 化学
    • 115 篇 生物学
    • 79 篇 地球物理学
    • 59 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 39 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 network security
  • 29 篇 training
  • 28 篇 cosmic rays
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 106 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 university of ch...
  • 93 篇 yunnan observato...
  • 87 篇 department of ph...
  • 83 篇 school of physic...
  • 82 篇 key laboratory f...
  • 80 篇 center for astro...
  • 79 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 moscow institute...
  • 76 篇 school of physic...
  • 76 篇 national space s...
  • 74 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 72 篇 danzengluobu
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 68 篇 li cheng
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 66 篇 liu b.
  • 65 篇 hu h.b.
  • 62 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,858 篇 英文
  • 89 篇 其他
  • 45 篇 中文
检索条件"机构=State key of Laboratory of Mathematical Engineering And Advanced Computing"
1989 条 记 录,以下是611-620 订阅
排序:
Research on Performance Optimization for Sparse Matrix-Vector Multiplication in Multi/Many-core Architecture
Research on Performance Optimization for Sparse Matrix-Vecto...
收藏 引用
Information Technology and Computer Application (ITCA), International Conference on
作者: Qihan Wang Mingliang Li Jianming Pang Di Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing zhengzhou China
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu... 详细信息
来源: 评论
An Efficient Sieve Algorithm with Evolutionary Technique
An Efficient Sieve Algorithm with Evolutionary Technique
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Zedong Sun Chunxiang Gu Yonghui Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Sieve algorithm plays an important role in solving the shortest vector problem, which is one of the most representative hard lattice problems. In this paper, we propose an efficient sieve algorithm with evolutionary t... 详细信息
来源: 评论
Recurrent Neural Network Based Binary Code Vulnerability Detection  19
Recurrent Neural Network Based Binary Code Vulnerability Det...
收藏 引用
Proceedings of the 2019 2nd International Conference on Algorithms, computing and Artificial Intelligence
作者: Jianyun Zheng Jianmin Pang Xiaochuan Zhang Xin Zhou MingLiang Li Jun Wang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network (RNN) ... 详细信息
来源: 评论
The Analysis of HTTPS Privacy Protection Based on Malicious Code Injection
The Analysis of HTTPS Privacy Protection Based on Malicious ...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Zeyan Liu Jianshan Pen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou China
HTTPS protocol is utilized to protect personal privacy in network communication by man-in-the-middle attacks. However, after the browser is attacked, this protection mechanism will be destroyed. This paper analyzes th... 详细信息
来源: 评论
Stability Analysis of a Rumor Propagation Model in Complex Networks with Holling II Type Functional Response
Stability Analysis of a Rumor Propagation Model in Complex N...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Ze Yu Gang Zhou Junyong Luo Mengli Zhang Ningbo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In this paper, we propose a SH2I2 rumor propagation model considering self-learning mechanism and echo chamber situation with Holling type II functional response in homogeneous and heterogeneous networks. Firstly, we ... 详细信息
来源: 评论
The various graphs in graph computing  1
收藏 引用
22nd Annual Conference on Computer engineering and Technology, NCCET 2018
作者: Sun, Rujun Zhang, Lufei State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
The world is full of relationships, and graph is the most evident representation for them. With the increasing of data scale, graphs become larger and have encountered a new world of analyzing. What can we learn from ... 详细信息
来源: 评论
Deep Learning based Recommedation System: A Review of Recent Works
Deep Learning based Recommedation System: A Review of Recent...
收藏 引用
IEEE Information Technology and Mechatronics engineering Conference (ITOEC)
作者: Meiling Wang Xiaonan Liu Lina Jing State key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The research upsurge of recommendation system and deep learning makes the deep learning based recommendation system become an inevitable trend. Through the introduction of the latest research of deep learning based re... 详细信息
来源: 评论
FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virtual Execution
FIRMNANO: Toward IoT Firmware Fuzzing Through Augmented Virt...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Zhijie Gui Hui Shu Ju Yang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Considering that the deployment of IoT devices is becoming more and more widespread, the security analysis of the firmware of these devices is extremely important. However, a large number of devices now have vulnerabi... 详细信息
来源: 评论
Anti-reconnaissance Model of Host Fingerprint Based on Virtual Node
Anti-reconnaissance Model of Host Fingerprint Based on Virtu...
收藏 引用
作者: Tao Zhang Bin Lu Ding Li Kang He Yuefei Zhu State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University
Aiming at the problem of insufficient defense ability of fingerprint detection,the anti-reconnaissance model of host fingerprint based on virtual node is *** model constructs periodically reconfigurable virtual nodes,... 详细信息
来源: 评论
Network Topology Change Detection Based on Statistical Process Control  20
Network Topology Change Detection Based on Statistical Proce...
收藏 引用
4th High Performance computing and Cluster Technologies Conference, HPCCT 2020 and the 3rd International Conference on Big Data and Artificial Intelligence, BDAI 2020
作者: Liu, Yan Liu, Lian Yan, Yu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Investigation Technology Center PLCMC Beijing China First Affiliated Hospital of Chongqing Medical University Chongqing China
Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the tradition... 详细信息
来源: 评论