咨询与建议

限定检索结果

文献类型

  • 1,105 篇 期刊文献
  • 885 篇 会议
  • 1 册 图书

馆藏范围

  • 1,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,291 篇 工学
    • 700 篇 计算机科学与技术...
    • 570 篇 软件工程
    • 185 篇 电子科学与技术(可...
    • 176 篇 信息与通信工程
    • 174 篇 电气工程
    • 123 篇 控制科学与工程
    • 123 篇 化学工程与技术
    • 117 篇 材料科学与工程(可...
    • 95 篇 生物工程
    • 85 篇 光学工程
    • 79 篇 网络空间安全
    • 68 篇 机械工程
    • 59 篇 仪器科学与技术
    • 56 篇 核科学与技术
    • 55 篇 力学(可授工学、理...
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
  • 1,019 篇 理学
    • 554 篇 物理学
    • 388 篇 数学
    • 126 篇 统计学(可授理学、...
    • 121 篇 化学
    • 116 篇 生物学
    • 79 篇 地球物理学
    • 60 篇 系统科学
  • 219 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 85 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 40 篇 医学
    • 33 篇 临床医学
  • 38 篇 法学
    • 32 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 41 篇 feature extracti...
  • 36 篇 semantics
  • 35 篇 deep learning
  • 30 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 24 篇 cryptography
  • 23 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 computational mo...
  • 17 篇 data models
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 620 篇 state key labora...
  • 110 篇 university of sc...
  • 100 篇 university of ch...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 99 篇 state key labora...
  • 96 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 key laboratory f...
  • 86 篇 school of physic...
  • 83 篇 center for astro...
  • 82 篇 college of physi...
  • 81 篇 school of physic...
  • 80 篇 institute of fro...
  • 80 篇 moscow institute...
  • 79 篇 school of physic...
  • 79 篇 national space s...
  • 77 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.
  • 62 篇 mao j.r.

语言

  • 1,798 篇 英文
  • 152 篇 其他
  • 45 篇 中文
检索条件"机构=State key of Laboratory of Mathematical Engineering And Advanced Computing"
1991 条 记 录,以下是941-950 订阅
排序:
Influence of Small-Size Contaminations on Thin Film Structural Properties
收藏 引用
Chinese Physics Letters 2019年 第3期36卷 82-85页
作者: F.V.Grigoriev V.B.Sulimov Jinlong Zhang Xinbin Cheng Zhanshan Wang A.V.Tikhonravov Research Computing Center M.V.Lomonosov Moscow State University MOE Key Laboratory of Advanced Micro-Structured Materials Institute of Precision Optical Engineering School of Physics Science and EngineeringTongji University IFSA Collaborative Innovation Center Shanghai Jiao Tong University
An approach for studying the influence of nano-particles on the structural properties of deposited thin films is proposed. It is based on the molecular dynamic modeling of the deposition process in the presence of con... 详细信息
来源: 评论
Current switching of the antiferromagnetic Néel vector in Pd/CoO/MgO(001)
收藏 引用
Physical Review B 2022年 第21期106卷 214405-214405页
作者: M. Yang Q. Li T. Wang B. Hong C. Klewe Z. Li X. Huang P. Shafer F. Zhang C. Hwang W. S. Yan R. Ramesh W. S. Zhao Y. Z. Wu Xixiang Zhang Z. Q. Qiu Institute of Physical Science and Information Technology Anhui University Hefei Anhui 230601 China National Synchrotron Radiation Laboratory University of Science and Technology of China Hefei Anhui 230029 China Department of Physics University of California Berkeley California 94720 USA Fert Beijing Research Institute School of Integrated Circuit Science and Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China Advanced Light Source Lawrence Berkeley National Laboratory Berkeley California 94720 USA Department of Materials Science and Engineering University of California Berkeley California 94720 USA Korea Research Institute of Standards and Science Yuseong Daejeon 305-340 Korea Department of Physics State Key Laboratory of Surface Physics Fudan University Shanghai 200433 China Physical Science and Engineering Division King Abdullah University of Science and Technology Thuwal 23955-6900 Saudi Arabia
Recently, the electrical switching of antiferromagnetic (AFM) order has been intensively investigated because of its application potential in data storage technology. Herein, we report the current switching of the AFM... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
作者: Shoupu Lu Qingbao Li Xinbing Zhu State Key laboratory of Mathematical Engineering and Advanced Computing Henan University of Economics and Law
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac... 详细信息
来源: 评论
A Novel Timing-based Network Covert Channel Detection Method
A Novel Timing-based Network Covert Channel Detection Method
收藏 引用
作者: Shoupu Lu Zhifeng Chen Guangxin Fu Qingbao Li State Key laboratory of Mathematical Engineering and Advanced Computing Henan University of Economics and Law
Network stealth events are endless,and covert timing channel is one of the most difficult means to *** order to further improve the detection rate of covert timing channel,several typical network covert timing channel... 详细信息
来源: 评论
Orbital Magneto-Nonlinear Anomalous Hall Effect in Kagome Magnet Fe3Sn2
收藏 引用
Physical Review Letters 2024年 第10期132卷 106601-106601页
作者: Lujunyu Wang Jiaojiao Zhu Haiyun Chen Hui Wang Jinjin Liu Yue-Xin Huang Bingyan Jiang Jiaji Zhao Hengjie Shi Guang Tian Haoyu Wang Yugui Yao Dapeng Yu Zhiwei Wang Cong Xiao Shengyuan A. Yang Xiaosong Wu State Key Laboratory for Artificial Microstructure and Mesoscopic Physics Frontiers Science Center for Nano-optoelectronics Peking University Beijing 100871 China Research Laboratory for Quantum Materials Singapore University of Technology and Design Singapore 487372 Singapore Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University Singapore 637371 Singapore Centre for Quantum Physics Key Laboratory of Advanced Optoelectronic Quantum Architecture and Measurement (MOE) School of Physics Beijing Institute of Technology Beijing 100081 China School of Sciences Great Bay University Dongguan 523000 China Beijing Key Lab of Nanophotonics and Ultrafine Optoelectronic Systems Beijing Institute of Technology Beijing 100081 China Material Science Center Yangtze Delta Region Academy of Beijing Institute of Technology Jiaxing China Shenzhen Institute for Quantum Science and Engineering Southern University of Science and Technology Shenzhen 518055 China Institute of Applied Physics and Materials Engineering University of Macau Taipa Macau China Department of Physics The University of Hong Kong Hong Kong China HKU-UCAS Joint Institute of Theoretical and Computational Physics at Hong Kong China Collaborative Innovation Center of Quantum Matter Beijing 100871 China Peking University Yangtze Delta Institute of Optoelectronics Nantong 226010 Jiangsu China
It has been theoretically predicted that perturbation of the Berry curvature by electromagnetic fields gives rise to intrinsic nonlinear anomalous Hall effects that are independent of scattering. Two types of nonlinea... 详细信息
来源: 评论
Pdf Exploitable malware analysis based on exploit genes  12
Pdf Exploitable malware analysis based on exploit genes
收藏 引用
12th IEEE International Conference on Anti-Counterfeiting, Security, and Identification, ASID 2018
作者: Zhou, Xin Pang, Jianmin Liu, Fudong Wang, Jun Yue, Feng Liu, Xiaonan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of social networks, as a low-cost, high-efficiency entail attack method, most of the attack vectors were embedded in email attachments, and exploited vulnerability on Adobe and Office software.... 详细信息
来源: 评论
The research on application of software diversity in cyberspace security  4
The research on application of software diversity in cybersp...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Zhang, Jiexin Pang, Jianmin Zhang, Zheng Liu, Zhenwu State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
Nowadays, the cyberspace security situation is unoptimistic. Widespread vulnerabilities and backdoors are the main factors of insecurity in cyberspace. Furthermore, the software monoculture makes the attack have an ex... 详细信息
来源: 评论
LHAASO-KM2A detector simulation using Geant4
收藏 引用
Radiation Detection Technology and Methods 2024年 第3期8卷 1437-1447页
作者: Zhen Cao F.Aharonian Q.An Axikegu Y.X.Bai Y.W.Bao D.Bastieri X.J.Bi Y.J.Bi J.T.Cai Q.Cao W.Y.Cao Zhe Cao J.Chang J.F.Chang A.M.Chen E.S.Chen Liang Chen Lin Chen Long Chen M.J.Chen M.L.Chen Q.H.Chen S.H.Chen S.Z.Chen T.L.Chen Y.Chen N.Cheng Y.D.Cheng M.Y.Cui S.W.Cui X.H.Cui Y.D.Cui B.Z.Dai H.L.Dai Z.G.Dai Danzengluobu X.Q.Dong K.K.Duan J.H.Fan Y.Z.Fan J.Fang K.Fang C.F.Feng L.Feng S.H.Feng X.T.Feng Y.L.Feng S.Gabici B.Gao C.D.Gao L.Q.Gao Q.Gao W.Gao W.K.Gao M.M.Ge L.S.Geng G.Giacinti G.H.Gong Q.B.Gou M.H.Gu F.L.Guo X.L.Guo Y.Q.Guo Y.Y.Guo Y.A.Han H.H.He H.N.He J.Y.He X.B.He Y.He Y.K.Hor B.W.Hou C.Hou X.Hou H.B.Hu Q.Hu S.C.Hu D.H.Huang T.Q.Huang W.J.Huang X.T.Huang X.Y.Huang Y.Huang Z.C.Huang X.L.Ji H.Y.Jia K.Jia K.Jiang X.W.Jiang Z.J.Jiang M.Jin M.M.Kang T.Ke D.Kuleshov K.Kurinov B.B.Li Cheng Li Cong Li D.Li F.Li H.B.Li H.C.Li H.Y.Li J.Li Jian Li Jie Li K.Li W.L.Li W.L.Li X.R.Li Xin Li Y.Z.Li Zhe Li Zhuo Li E.W.Liang Y.F.Liang S.J.Lin B.Liu C.Liu D.Liu H.Liu H.D.Liu J.Liu J.L.Liu J.Y.Liu M.Y.Liu R.Y.Liu S.M.Liu W.Liu Y.Liu Y.N.Liu R.Lu Q.Luo H.K.Lv B.Q.Ma L.L.Ma X.H.Ma J.R.Mao Z.Min W.Mitthumsiri H.J.Mu Y.C.Nan A.Neronov Z.W.Ou B.Y.Pang P.Pattarakijwanich Z.Y.Pei M.Y.Qi Y.Q.Qi B.Q.Qiao J.J.Qin D.Ruffolo A.Sáiz D.Semikoz C.Y.Shao L.Shao O.Shchegolev X.D.Sheng F.W.Shu H.C.Song Yu.V.Stenkin V.Stepanov Y.Su Q.N.Sun X.N.Sun Z.B.Sun P.H.T.Tam Q.W.Tang Z.B.Tang W.W.Tian C.Wang C.B.Wang G.W.Wang H.G.Wang H.H.Wang J.C.Wang K.Wang L.P.Wang L.Y.Wang P.H.Wang R.Wang W.Wang X.G.Wang X.Y.Wang Y.Wang Y.D.Wang Y.J.Wang Z.H.Wang Z.X.Wang Zhen Wang Zheng Wang D.M.Wei J.J.Wei Y.J.Wei T.Wen C.Y.Wu H.R.Wu S.Wu X.F.Wu Y.S.Wu S.Q.Xi J.Xia J.J.Xia G.M.Xiang D.X.Xiao G.Xiao G.G.Xin Y.L.Xin Y.Xing Z.Xiong D.L.Xu R.F.Xu R.X.Xu W.L.Xu L.Xue D.H.Yan J.Z.Yan T.Yan C.W.Yang F.Yang F.F.Yang H.W.Yang J.Y.Yang L.L.Yang M.J.Yang R.Z.Yang S.B.Yang Y.H.Yao Z.G.Yao Y.M.Ye L.Q.Yin N.Yin X.H.You Z.Y.You Y.H.Yu Q.Yuan H.Yue H.D.Zeng T.X.Zeng W.Zeng M.Zha B.B.Zhang F.Zhang H.M.Zhang H.Y.Zhang J.L.Zhang L.X.Zhang Li Zhang P.F.Zhang P.P.Zhang R.Zhang S.B.Zh Key Laboratory of Particle Astrophysics&Experimental Physics Division&Computing Center Institute of High Energy PhysicsChinese Academy of SciencesBeijing100049China University of Chinese Academy of Sciences Beijing100049China TIANFU Cosmic Ray Research Center ChengduSichuanChina Dublin Institute for Advanced Studies 31 Fitzwilliam Place2 DublinIreland Max-Planck-Institute for Nuclear Physics 69029Heidelberg103980Germany State Key Laboratory of Particle Detection and Electronics BeijingChina University of Science and Technology of China Hefei230026AnhuiChina School of Physical Science and Technology&School of Information Science and Technology Southwest Jiaotong UniversityChengdu610031SichuanChina School of Astronomy and Space Science Nanjing UniversityNanjing210023JiangsuChina Center for Astrophysics Guangzhou UniversityGuangzhou510006GuangdongChina Hebei Normal University Shijiazhuang050024HebeiChina Key Laboratory of Dark Matter and Space Astronomy&Key Laboratory of Radio Astronomy Purple Mountain ObservatoryChinese Academy of SciencesNanjing 210023JiangsuChina Tsung-Dao Lee Institute&School of Physics and Astronomy Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory for Research in Galaxies and Cosmology Shanghai Astronomical ObservatoryChinese Academy of SciencesShanghai 200030China Key Laboratory of Cosmic Rays(Tibet University) Ministry of EducationLhasa 850000TibetChina National Astronomical Observatories Chinese Academy of SciencesBeijing 100101China School of Physics and Astronomy(Zhuhai)&School of Physics(Guangzhou)&Sino-French Institute of Nuclear Engineering and Technology(Zhuhai) Sun Yat-sen UniversityGuangzhouZhuhai 510275519000GuangdongChina School of Physics and Astronomy Yunnan UniversityKunming 650091YunnanChina Institute of Frontier and Interdisciplinary Science Shandong UniversityQingdao 266237ShandongChina APC UniversitéParis CitéCNRS/IN2P3CEA/IRFUObservatoire de ParisParis 11975205France Department of Engineering Phys
KM2A is one of the main sub-arrays of LHAASO,working on gamma ray astronomy and cosmic ray physics at energies above 10 *** simulation is the important foundation for estimating detector performance and data *** is a ... 详细信息
来源: 评论
A short text spectrum clustering method based on frequent itemsets  4
A short text spectrum clustering method based on frequent it...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Luo, Nan Zhang, Ping Li, Qingbao Chen, Zhifeng Feng, Peijun Xue, Tianxiao Engineering and Advanced Computing State Key Laboratory of Mathematical Zhengzhou China
Short text datum, which contains a lot of useful information, could be easily found on a wide variety of self-media platform and social communication tools. on It is significant to use datum mining technology to autom... 详细信息
来源: 评论
Target function location based on code coverage analysis  2
Target function location based on code coverage analysis
收藏 引用
2nd International Conference on Material engineering and advanced Manufacturing Technology, MEAMT 2018
作者: Jin, Kaiwen Li, Qingbao Chen, Zhifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan China
How to locate the target function faster and more accurately is a key problem of Automatic Reverse-engineering of Software Programs. In order to solve this problem, a target function location method based on code cove... 详细信息
来源: 评论