咨询与建议

限定检索结果

文献类型

  • 4,622 篇 期刊文献
  • 1,850 篇 会议
  • 3 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,909 篇 工学
    • 1,587 篇 计算机科学与技术...
    • 1,226 篇 软件工程
    • 509 篇 电子科学与技术(可...
    • 484 篇 化学工程与技术
    • 468 篇 电气工程
    • 454 篇 信息与通信工程
    • 371 篇 控制科学与工程
    • 352 篇 材料科学与工程(可...
    • 341 篇 力学(可授工学、理...
    • 267 篇 光学工程
    • 243 篇 生物工程
    • 241 篇 机械工程
    • 241 篇 动力工程及工程热...
    • 217 篇 核科学与技术
    • 204 篇 仪器科学与技术
    • 187 篇 冶金工程
    • 148 篇 土木工程
    • 147 篇 生物医学工程(可授...
    • 138 篇 水利工程
    • 117 篇 网络空间安全
  • 3,831 篇 理学
    • 2,315 篇 物理学
    • 1,381 篇 数学
    • 502 篇 化学
    • 391 篇 统计学(可授理学、...
    • 323 篇 生物学
    • 215 篇 系统科学
    • 162 篇 地球物理学
  • 529 篇 管理学
    • 379 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 142 篇 医学
  • 88 篇 农学
  • 68 篇 法学
  • 53 篇 经济学
  • 24 篇 军事学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 244 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 62 篇 deep learning
  • 61 篇 feature extracti...
  • 60 篇 relativistic hea...
  • 55 篇 semantics
  • 53 篇 w & z bosons
  • 53 篇 training
  • 52 篇 computational mo...
  • 51 篇 particle product...
  • 50 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 36 篇 quark & gluon je...
  • 35 篇 hadrons
  • 35 篇 security

机构

  • 1,030 篇 yerevan physics ...
  • 916 篇 centro brasileir...
  • 890 篇 charles universi...
  • 887 篇 university of de...
  • 887 篇 department of ph...
  • 872 篇 institute rudjer...
  • 865 篇 university of so...
  • 856 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 849 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 837 篇 indian institute...
  • 837 篇 university of cy...
  • 829 篇 institute of hig...
  • 827 篇 infn laboratori ...
  • 821 篇 national and kap...
  • 817 篇 universidad san ...
  • 808 篇 rwth aachen univ...
  • 806 篇 ghent university...

作者

  • 631 篇 waltenberger w.
  • 622 篇 lowette s.
  • 569 篇 tavernier s.
  • 542 篇 adam w.
  • 540 篇 lemaitre v.
  • 540 篇 schieck j.
  • 539 篇 skovpen k.
  • 538 篇 tytgat m.
  • 532 篇 sznajder a.
  • 529 篇 tumasyan a.
  • 527 篇 jeitler m.
  • 523 篇 vannerom d.
  • 522 篇 delaere c.
  • 518 篇 giammanco a.
  • 507 篇 carvalho w.
  • 502 篇 van mechelen p.
  • 502 篇 delcourt m.
  • 500 篇 alves g.a.
  • 496 篇 chinellato j.
  • 494 篇 wulz c.-e.

语言

  • 6,004 篇 英文
  • 315 篇 其他
  • 150 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=The State Key Laboratory of Scientific and Engineering Computing"
6475 条 记 录,以下是331-340 订阅
排序:
Defense Against Adversarial Attacks via Adversarial Noise Denoising Networks in Image Recognition
Defense Against Adversarial Attacks via Adversarial Noise De...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Li, Chengxuan Yang, Zhou Xiao, Yang Liu, Haozhao Zhang, Yuning Pei, Qingqi Xidian University State Key Laboratory of Integrated Services Networks Xi'an China School of Telecommunications Engineering Xidian University Xi'an China School of Cyber Engineering Xidian University Xi'an China Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an China
Deep learning-based image recognition technology has significantly advanced the development of modern industrial intelligence. However, the issue of image adversarial examples that follows has gradually garnered the a... 详细信息
来源: 评论
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division  5
A Modeling Method of Cyberspace Security Structure Based on ...
收藏 引用
5th IEEE International Conference on Computer and Communication engineering Technology, CCET 2022
作者: Zhu, Yuwen Yu, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Security Institute of Information Engineering Beijing100000 China
As the cyberspace structure becomes more and more complex, the problems of dynamic network space topology, complex composition structure, large spanning space scale, and a high degree of self-organization are becoming... 详细信息
来源: 评论
Nitrogen removal from summer to winter in a field pilot-scale multistage constructed wetland-pond system
收藏 引用
Journal of Environmental Sciences 2022年 第1期34卷 249-262页
作者: Tao Wang Liping Xiao Hongbin Lu Shaoyong Lu Jiaxin Li Xiaochun Guo Xiaoliang Zhao National Engineering Laboratory for Lake Pollution Control and Ecological Restoration State Environmental Protection Scientific Observation and Research Station for Lake Dongtinghu(SEPSORSLD)State Environmental Protection Key Laboratory for Lake Pollution ControlState Key Laboratory of Environmental Criteria and Risk AssessmentChinese Research Academy of Environmental SciencesBeijing 100012China School of Environmental and Municipal Engineering Qingdao University of TechnologyQingdao 266033China College of Environmental Science and Engineering Liaoning Technical UniversityFuxin 123000China College of Water Sciences Beijing Normal UniversityBeying 100875China
A pilot-scale multistage constructed wetland-pond(MCWP)system with a"pre-ecological oxidation pond,two-stage horizontal subsurface flow constructed wetland(HSCW)and surface flow constructed wetland(SFCW)as the co... 详细信息
来源: 评论
Exploitability Analysis of Public Component Library Vulnerabilities Based on Taint Analysis  7
Exploitability Analysis of Public Component Library Vulnerab...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Yuan, Huijie Wang, Yunchao Zong, Guoxiao Lv, Zhuo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Grid Electric Power Research Institute Zhengzhou China
The reuse of public component libraries has contributed to the field of computer science because of its low implementation time and high production efficiency. However, the vulnerabilities in libraries can be more ser... 详细信息
来源: 评论
Graph Low-Rank Non-Negative Matrix Factorization with Auto-Encoders for Fault Detection  14
Graph Low-Rank Non-Negative Matrix Factorization with Auto-E...
收藏 引用
14th International Conference on Information Science and Technology, ICIST 2024
作者: Liu, Yabing Yu, Shanshan Guo, Wei Leung, Man-Fai School of Electronic and Information Engineering Southwest University Chongqing China South-Central Minzu University State Ethnic Affairs Commission Key Laboratory of Cyber-Physical Fusion Intelligent Computing Wuhan430074 China School of Computing and Information Science Anglia Ruskin University Faculty of Science and Engineering Cambridge United Kingdom
Fault detection is the process of detecting and diagnosing faults or abnormalities in a system by analyzing its operational data. However, with the complexity of modern industrial processes, some faults are difficult ... 详细信息
来源: 评论
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing  2
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing
收藏 引用
2nd International Conference on Consumer Electronics and Computer engineering, ICCECE 2022
作者: Zhang, Hao Dong, Weiyu Jiang, Liehui School of Cyber Science and Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the mainstream web application automated vulnerability detection methods. Because of its black box characteristics, it can be used to detect vulnerabilities without knowing the source code of the tar... 详细信息
来源: 评论
A Honeywords Generation Method Based on Deep Learning and Rule-Based Password Attack  4th
A Honeywords Generation Method Based on Deep Learning and Ru...
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Yang, Kunyu Hu, Xuexian Zhang, Qihui Wei, Jianghong Liu, Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guilin University of Electronic Technology Guilin China
Honeywords is a simple and efficient method that can help the authentication server to detect password leaks. The indistinguishability between generated honeywords and real passwords is the key to the honeywords gener... 详细信息
来源: 评论
A riemannian exponential augmented lagrangian method for computing the projection robust Wasserstein distance  23
A riemannian exponential augmented lagrangian method for com...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Bo Jiang Ya-Feng Liu Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing China State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing China
Projection robust Wasserstein (PRW) distance is recently proposed to efficiently mitigate the curse of dimensionality in the classical Wasserstein distance. In this paper, by equivalently reformulating the computation...
来源: 评论
A Highly Secure C2C-PAKE Cross-domain Protocol
A Highly Secure C2C-PAKE Cross-domain Protocol
收藏 引用
2021 International Conference on Network Communication and Information Security, ICNCIS 2021
作者: Wang, Xiangyang Gu, Chunxiang Lu, Siqi Chen, Xi Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
This paper studies the password-based strong authentication key exchange protocol in the cross-domain scenario, and gives an end-to-end highly secure C2C-PAKE protocol, in which the server shares a password with the c... 详细信息
来源: 评论
Guest Editorial Enabling Technologies and Systems for Industry 5.0: From Foundation Models to Foundation Intelligence
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2024年 第11期54卷 6496-6499页
作者: Tang, Ying Tian, Yonglin Lin, Yilun Lv, Chen Fanti, Maria Pia Rowan University Department of Electrical and Computer Engineering GlassboroNJ08028 United States Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Beijing100190 China Institute of Automation Chinese Academy of Sciences Beijing100190 China Shanghai AI Laboratory Urban Computing Laboratory Shanghai200232 China Nanyang Technological University School of Mechanical and Aerospace Engineering Jurong West639798 Singapore Polytechnic University of Bari Department of Electrical and Information Engineering Bari70126 Italy
来源: 评论