咨询与建议

限定检索结果

文献类型

  • 4,622 篇 期刊文献
  • 1,850 篇 会议
  • 3 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,909 篇 工学
    • 1,587 篇 计算机科学与技术...
    • 1,226 篇 软件工程
    • 509 篇 电子科学与技术(可...
    • 484 篇 化学工程与技术
    • 468 篇 电气工程
    • 454 篇 信息与通信工程
    • 371 篇 控制科学与工程
    • 352 篇 材料科学与工程(可...
    • 341 篇 力学(可授工学、理...
    • 267 篇 光学工程
    • 243 篇 生物工程
    • 241 篇 机械工程
    • 241 篇 动力工程及工程热...
    • 217 篇 核科学与技术
    • 204 篇 仪器科学与技术
    • 187 篇 冶金工程
    • 148 篇 土木工程
    • 147 篇 生物医学工程(可授...
    • 138 篇 水利工程
    • 117 篇 网络空间安全
  • 3,831 篇 理学
    • 2,315 篇 物理学
    • 1,381 篇 数学
    • 502 篇 化学
    • 391 篇 统计学(可授理学、...
    • 323 篇 生物学
    • 215 篇 系统科学
    • 162 篇 地球物理学
  • 529 篇 管理学
    • 379 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 142 篇 医学
  • 88 篇 农学
  • 68 篇 法学
  • 53 篇 经济学
  • 24 篇 军事学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 244 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 62 篇 deep learning
  • 61 篇 feature extracti...
  • 60 篇 relativistic hea...
  • 55 篇 semantics
  • 53 篇 w & z bosons
  • 53 篇 training
  • 52 篇 computational mo...
  • 51 篇 particle product...
  • 50 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 36 篇 quark & gluon je...
  • 35 篇 hadrons
  • 35 篇 security

机构

  • 1,030 篇 yerevan physics ...
  • 916 篇 centro brasileir...
  • 890 篇 charles universi...
  • 887 篇 university of de...
  • 887 篇 department of ph...
  • 872 篇 institute rudjer...
  • 865 篇 university of so...
  • 856 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 849 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 837 篇 indian institute...
  • 837 篇 university of cy...
  • 829 篇 institute of hig...
  • 827 篇 infn laboratori ...
  • 821 篇 national and kap...
  • 817 篇 universidad san ...
  • 808 篇 rwth aachen univ...
  • 806 篇 ghent university...

作者

  • 631 篇 waltenberger w.
  • 622 篇 lowette s.
  • 569 篇 tavernier s.
  • 542 篇 adam w.
  • 540 篇 lemaitre v.
  • 540 篇 schieck j.
  • 539 篇 skovpen k.
  • 538 篇 tytgat m.
  • 532 篇 sznajder a.
  • 529 篇 tumasyan a.
  • 527 篇 jeitler m.
  • 523 篇 vannerom d.
  • 522 篇 delaere c.
  • 518 篇 giammanco a.
  • 507 篇 carvalho w.
  • 502 篇 van mechelen p.
  • 502 篇 delcourt m.
  • 500 篇 alves g.a.
  • 496 篇 chinellato j.
  • 494 篇 wulz c.-e.

语言

  • 6,004 篇 英文
  • 315 篇 其他
  • 150 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=The State Key Laboratory of Scientific and Engineering Computing"
6475 条 记 录,以下是191-200 订阅
排序:
Rotation Model Enhancement for Adversarial Attack
Rotation Model Enhancement for Adversarial Attack
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Li, Zheming Liu, Hao Yang, Bo Li, Chenwei Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Current white-box attack to deep neural networks have achieved considerable success, but not for black-box attack. The main reason is poor transferability, as the adversarial examples are crafted with single deep neur... 详细信息
来源: 评论
Traceability Method of Network Attack Based on Evolutionary Game
Traceability Method of Network Attack Based on Evolutionary ...
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Hengwei Zhang, Xiaoning Sun, Pengyu Liu, Xiaohu Ma, Junqiang Zhang, Yuchen State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China
Cyberspace is vulnerable to continuous malicious attacks. Traceability of network attacks is an effective defense means to curb and counter network attacks. In this paper, the evolutionary game model is used to analyz... 详细信息
来源: 评论
BILSTM-SimAM: An improved algorithm for short-term electric load forecasting based on multi-feature
收藏 引用
Mathematical Biosciences and engineering 2024年 第2期21卷 2323-2343页
作者: Chen, Mingju Qiu, Fuhong Xiong, Xingzhong Chang, Zhengwei Wei, Yang Wu, Jie School of Automation and Information Engineering Sichuan University of Science & Engineering Yibin644002 China Artificial Intelligence Key Laboratory of Sichuan Province Sichuan University of Science & Engineering Yibin644002 China State Grid Sichuan Electric Power Company Electric Power Scientific Research Institute Chengdu644002 China
With the growing number of user-side resources connected to the distribution system, an occasional imbalance between the distribution side and the user side arises, making short-term power load forecasting technology ... 详细信息
来源: 评论
A survey of proactive defense in industrial control system
A survey of proactive defense in industrial control system
收藏 引用
2022 International Conference on Electronic Information Technology, EIT 2022
作者: Liu, Ke Wu, Qianqiong Geng, Yangyang Ma, Rongkuan Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de... 详细信息
来源: 评论
Progress and perspective of high-voltage lithium cobalt oxide in lithium-ion batteries
收藏 引用
Journal of Energy Chemistry 2022年 第11期31卷 283-308,I0008页
作者: Qian Wu Bing Zhang Yingying Lu State Key Laboratory of Chemical Engineering Institute of Pharmaceutical EngineeringCollege of Chemical and Biological EngineeringZhejiang UniversityHangzhou 310027ZhejiangChina ZJU-Hangzhou Global Scientific and Technological Innovation Center Hangzhou 311200ZhejiangChina
Lithium cobalt oxide(LiCoO_(2),LCO)dominates in 3C(computer,communication,and consumer)electronics-based batteries with the merits of extraordinary volumetric and gravimetric energy density,high-voltage plateau,and fa... 详细信息
来源: 评论
Research on Cascading Failures of Power Grid
Research on Cascading Failures of Power Grid
收藏 引用
2021 International Conference on Applied Mathematics, Modeling and Computer Simulation, AMMCS 2021
作者: Wang, Hongmin Wei, Qiang Xie, Yaobin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole country. Blackouts are almost always caused by cascading failures. This paper first analyzes th... 详细信息
来源: 评论
Binary vulnerability mining technology based on neural network feature fusion  5
Binary vulnerability mining technology based on neural netwo...
收藏 引用
5th International Conference on Advanced Electronic Materials, Computers and Software engineering, AEMCSE 2022
作者: Han, Wenjie Pang, Jianmin Zhou, Xin Zhu, Di State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien... 详细信息
来源: 评论
Recommender system based on adaptive threshold filtering GCN
Recommender system based on adaptive threshold filtering GCN
收藏 引用
2022 International Conference on Neural Networks, Information, and Communication engineering, NNICE 2022
作者: Qiao, Meng Gui, Hairen Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Henan450001 China
We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio... 详细信息
来源: 评论
Heterostructured Mn_(3)O_(4)-MnS Multi-Shelled Hollow Spheres for Enhanced Polysulfide Regulation in Lithium-Sulfur Batteries
收藏 引用
Energy & Environmental Materials 2023年 第6期6卷 436-444页
作者: Bin Qin Qun Wang Weiqi Yao Yifei Cai Yuhan Chen Pengcheng Wang Yongchun Zou Xiaohang Zheng Jian Cao Junlei Qi Wei Cai State Key Laboratory of Advanced Welding and Joining Harbin Institute of TechnologyHarbin 150001China College of Chemistry and Chemical Engineering Taiyuan University of TechnologyTaiyuan 030024China State Key Laboratory of Chemical Engineering East China University of Science and TechnologyShanghai 200237China Department of Mechanical Engineering City University of Hong KongHong KongChina Center of Analysis Measurement and Computing Harbin Institute of TechnologyHarbin 150001China School of Materials Science and Engineering Harbin Institute of Technology Harbin 150001China
Constructing heterojunctions and hollow multi-shelled structures can render materials with fascinating physicochemical properties,and have been regarded as two promising strategies to overcome the severe shuttling and... 详细信息
来源: 评论
Analysis of security capability of MVX based on probabilistic attack and defense models  3
Analysis of security capability of MVX based on probabilisti...
收藏 引用
3rd International Conference on Computer Science and Communication Technology, ICCSCT 2022
作者: Liu, Zijing Zhang, Zheng Xi, Ruicheng Zhu, Pengzhe State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition... 详细信息
来源: 评论