咨询与建议

限定检索结果

文献类型

  • 4,622 篇 期刊文献
  • 1,850 篇 会议
  • 3 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,909 篇 工学
    • 1,587 篇 计算机科学与技术...
    • 1,226 篇 软件工程
    • 509 篇 电子科学与技术(可...
    • 484 篇 化学工程与技术
    • 468 篇 电气工程
    • 454 篇 信息与通信工程
    • 371 篇 控制科学与工程
    • 352 篇 材料科学与工程(可...
    • 341 篇 力学(可授工学、理...
    • 267 篇 光学工程
    • 243 篇 生物工程
    • 241 篇 机械工程
    • 241 篇 动力工程及工程热...
    • 217 篇 核科学与技术
    • 204 篇 仪器科学与技术
    • 187 篇 冶金工程
    • 148 篇 土木工程
    • 147 篇 生物医学工程(可授...
    • 138 篇 水利工程
    • 117 篇 网络空间安全
  • 3,831 篇 理学
    • 2,315 篇 物理学
    • 1,381 篇 数学
    • 502 篇 化学
    • 391 篇 统计学(可授理学、...
    • 323 篇 生物学
    • 215 篇 系统科学
    • 162 篇 地球物理学
  • 529 篇 管理学
    • 379 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 142 篇 医学
  • 88 篇 农学
  • 68 篇 法学
  • 53 篇 经济学
  • 24 篇 军事学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 244 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 62 篇 deep learning
  • 61 篇 feature extracti...
  • 60 篇 relativistic hea...
  • 55 篇 semantics
  • 53 篇 w & z bosons
  • 53 篇 training
  • 52 篇 computational mo...
  • 51 篇 particle product...
  • 50 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 36 篇 quark & gluon je...
  • 35 篇 hadrons
  • 35 篇 security

机构

  • 1,030 篇 yerevan physics ...
  • 916 篇 centro brasileir...
  • 890 篇 charles universi...
  • 887 篇 university of de...
  • 887 篇 department of ph...
  • 872 篇 institute rudjer...
  • 865 篇 university of so...
  • 856 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 849 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 837 篇 indian institute...
  • 837 篇 university of cy...
  • 829 篇 institute of hig...
  • 827 篇 infn laboratori ...
  • 821 篇 national and kap...
  • 817 篇 universidad san ...
  • 808 篇 rwth aachen univ...
  • 806 篇 ghent university...

作者

  • 631 篇 waltenberger w.
  • 622 篇 lowette s.
  • 569 篇 tavernier s.
  • 542 篇 adam w.
  • 540 篇 lemaitre v.
  • 540 篇 schieck j.
  • 539 篇 skovpen k.
  • 538 篇 tytgat m.
  • 532 篇 sznajder a.
  • 529 篇 tumasyan a.
  • 527 篇 jeitler m.
  • 523 篇 vannerom d.
  • 522 篇 delaere c.
  • 518 篇 giammanco a.
  • 507 篇 carvalho w.
  • 502 篇 van mechelen p.
  • 502 篇 delcourt m.
  • 500 篇 alves g.a.
  • 496 篇 chinellato j.
  • 494 篇 wulz c.-e.

语言

  • 6,004 篇 英文
  • 315 篇 其他
  • 150 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=The State Key Laboratory of Scientific and Engineering Computing"
6475 条 记 录,以下是151-160 订阅
排序:
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论
Adversarial Example Attacks Against Intelligent Malware Detection: A Survey  4
Adversarial Example Attacks Against Intelligent Malware Dete...
收藏 引用
4th International Conference on Applied Machine Learning, ICAML 2022
作者: Qi, Xuyan Tang, Yonghe Wang, Huanwei Liu, Tieming Jing, Jing State Key Laboratory of Mathematic Engineering and Advanced Computing Zhengzhou China
With the advancement of information technology and the increasing prevalence of the internet, the number of malware has experienced an exponential, and the security threat to users' property and privacy is becomin... 详细信息
来源: 评论
A Malware Classification Method based on Attentive Bidirectional Model  7
A Malware Classification Method based on Attentive Bidirecti...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Gui, Hairen Liu, Fudong Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie... 详细信息
来源: 评论
A review of auxiliary hardware architectures supporting dynamic taint analysis
A review of auxiliary hardware architectures supporting dyna...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Yang, Anfeng Guang, Yan Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running... 详细信息
来源: 评论
A Tree-based Structure Mutation Method for Network Protocol Fuzzing  6
A Tree-based Structure Mutation Method for Network Protocol ...
收藏 引用
2021 6th International Conference on Information Science, Computer Technology and Transportation, ISCTT 2021
作者: Yang, Rui Jing, Jing Qi, Xuyan Zheng, Hongbing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
It is difficult to fuzz the protocol because the format of network protocol is complex and often involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off between the validity of protocol m... 详细信息
来源: 评论
A PV-DM-based feature fusion method for binary malware clustering  4
A PV-DM-based feature fusion method for binary malware clust...
收藏 引用
4th International Conference on Communications, Information System and Computer engineering, CISCE 2022
作者: Gui, Hairen Zhang, Chunyan Huang, Yizhao Liu, Fudong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Utilizing NLP methods in malware classification or clustering applications is a hotspot in malware analysis. Binary malware embedding has become an important direction and basis for malware analysis. Existing binary m... 详细信息
来源: 评论
Massively parallel algorithms for fully dynamic all-pairs shortest paths
收藏 引用
Frontiers of Computer Science 2024年 第4期18卷 201-203页
作者: Chilei WANG Qiang-Sheng HUA Hai JIN Chaodong ZHENG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g... 详细信息
来源: 评论
SWPy: Python Numerical computing Library Optimization for Domestic Many-core Processors  10
SWPy: Python Numerical Computing Library Optimization for Do...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Wang, Qihan Pang, Jianming Yue, Feng Yang, Shudan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The NumPy computational library, the most typical scientific computing library in Python, is generally limited to a single-node or multi-threaded CPU-only execution model. With the increasing size of datasets, the inc... 详细信息
来源: 评论
PFCA: An Intelligent Method of Multidimensional User Profile Construction and Application  7
PFCA: An Intelligent Method of Multidimensional User Profile...
收藏 引用
7th International Conference on Big Data Analytics, ICBDA 2022
作者: Xia, Yi Zhou, Gang Luo, Junyong Lan, Mingjing Chen, Xiaohui Wang, Shiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome... 详细信息
来源: 评论
Multi-protocol comprehensive topology probe technology under non-cooperative conditions
Multi-protocol comprehensive topology probe technology under...
收藏 引用
2022 International Symposium on Computer Applications and Information Systems, ISCAIS 2022
作者: Lu, Xuanting Yang, Qichao Liu, Shengli Yang, Pengfei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ... 详细信息
来源: 评论