咨询与建议

限定检索结果

文献类型

  • 4,605 篇 期刊文献
  • 1,850 篇 会议
  • 3 册 图书

馆藏范围

  • 6,458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,896 篇 工学
    • 1,584 篇 计算机科学与技术...
    • 1,233 篇 软件工程
    • 503 篇 电子科学与技术(可...
    • 484 篇 化学工程与技术
    • 470 篇 电气工程
    • 454 篇 信息与通信工程
    • 362 篇 控制科学与工程
    • 353 篇 材料科学与工程(可...
    • 341 篇 力学(可授工学、理...
    • 266 篇 光学工程
    • 243 篇 生物工程
    • 241 篇 动力工程及工程热...
    • 240 篇 机械工程
    • 217 篇 核科学与技术
    • 203 篇 仪器科学与技术
    • 187 篇 冶金工程
    • 148 篇 土木工程
    • 147 篇 生物医学工程(可授...
    • 137 篇 水利工程
    • 117 篇 网络空间安全
  • 3,827 篇 理学
    • 2,312 篇 物理学
    • 1,386 篇 数学
    • 499 篇 化学
    • 394 篇 统计学(可授理学、...
    • 323 篇 生物学
    • 215 篇 系统科学
    • 161 篇 地球物理学
  • 529 篇 管理学
    • 379 篇 管理科学与工程(可...
    • 171 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 140 篇 医学
  • 87 篇 农学
  • 69 篇 法学
  • 53 篇 经济学
  • 24 篇 军事学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 244 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 61 篇 deep learning
  • 60 篇 relativistic hea...
  • 60 篇 feature extracti...
  • 55 篇 semantics
  • 53 篇 w & z bosons
  • 52 篇 computational mo...
  • 52 篇 training
  • 51 篇 particle product...
  • 50 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 36 篇 quark & gluon je...
  • 35 篇 hadrons
  • 35 篇 security

机构

  • 1,030 篇 yerevan physics ...
  • 916 篇 centro brasileir...
  • 890 篇 charles universi...
  • 887 篇 university of de...
  • 887 篇 department of ph...
  • 872 篇 institute rudjer...
  • 865 篇 university of so...
  • 856 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 849 篇 infn sezione di ...
  • 847 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 838 篇 indian institute...
  • 837 篇 university of cy...
  • 829 篇 institute of hig...
  • 827 篇 infn laboratori ...
  • 821 篇 national and kap...
  • 817 篇 universidad san ...
  • 808 篇 rwth aachen univ...
  • 806 篇 ghent university...

作者

  • 631 篇 waltenberger w.
  • 622 篇 lowette s.
  • 569 篇 tavernier s.
  • 542 篇 adam w.
  • 540 篇 lemaitre v.
  • 540 篇 schieck j.
  • 539 篇 skovpen k.
  • 538 篇 tytgat m.
  • 532 篇 sznajder a.
  • 530 篇 tumasyan a.
  • 527 篇 jeitler m.
  • 523 篇 vannerom d.
  • 523 篇 delaere c.
  • 518 篇 giammanco a.
  • 507 篇 carvalho w.
  • 502 篇 van mechelen p.
  • 502 篇 delcourt m.
  • 500 篇 alves g.a.
  • 496 篇 chinellato j.
  • 494 篇 wulz c.-e.

语言

  • 5,990 篇 英文
  • 305 篇 其他
  • 152 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=The State Key Laboratory of Scientific and Engineering Computing"
6458 条 记 录,以下是381-390 订阅
排序:
Research on Cross-site Scripting Attack Detection Technology Based on Few-shot Learning
Research on Cross-site Scripting Attack Detection Technology...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Dongzhe Lu Long Liu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the intensification of informatization and mobility, various web security threats are emerging. Cross-site scripting (XSS) attack is the most common type of web attack. Most traditional detection methods have bee... 详细信息
来源: 评论
Crop Enclave Interface for SGX Programs
Crop Enclave Interface for SGX Programs
收藏 引用
IEEE International Conference on Joint Cloud computing (JCC)
作者: Yaqi Fan Zhifeng Chen Qingbao Li Wenbo Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Existing memory attacks against SGX use the enclave interface, such as ECALLs and OCALLs, to inject malicious data into the enclave’s trusted memory to trigger memory corruption vulnerabilities therein. Therefore, en...
来源: 评论
A Survey of Security Analysis on Industrial Control Devices via Rehosting
A Survey of Security Analysis on Industrial Control Devices ...
收藏 引用
Information Technology,Big Data and Artificial Intelligence (ICIBA), International Conference on IEEE International Conference on
作者: Houzhi Liu Rongkuan Ma Qiang Wei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
At present, the network security of embedded devices has received more and more attention. However, the existing dynamic analysis tools can’t performance in embedded devices as common softwares. The main reason is th...
来源: 评论
A NONLINEAR LEAST-SQUARES CONVEXITY ENFORCING C0 INTERIOR PENALTY METHOD FOR THE MONGE–AMPÈRE EQUATION ON STRICTLY CONVEX SMOOTH PLANAR DOMAINS
收藏 引用
Communications of the American Mathematical Society 2024年 第14期4卷 607-640页
作者: Brenner, Susanne C. Sung, Li-Yeng Tan, Zhiyu Zhang, Hongchao Department of Mathematics and Center for Computation and Technology Louisiana State University Baton Rouge 70803 LA United States Center for Computation and Technology Louisiana State University Baton Rouge LA United States School of Mathematical Sciences and Fujian Provincial Key Laboratory on Mathemati­cal Modeling and High Performance Scientific Computing Xiamen University Fujian 361005 China
We construct a nonlinear least-squares finite element method for com­puting the smooth convex solutions of the Dirichlet boundary value problem of the Monge-Ampère equation on strictly convex smooth domains ... 详细信息
来源: 评论
Cross-Network User Matching Based on Association Strength  11th
Cross-Network User Matching Based on Association Strength
收藏 引用
11th International Conference on Computer engineering and Networks, CENet2021
作者: Jiang, Qiuyan Gong, Daofu Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China Qingdao Agricultural University Qingdao266001 China
Cross-network user matching is the one of the fundamental problems in social network fusion and analysis. This paper proposes an unsupervised algorithm based on association strength to address this problem. Specifical... 详细信息
来源: 评论
ALEmu: A Framework for Application-layer Programs Emulation of Embedded Devices
ALEmu: A Framework for Application-layer Programs Emulation ...
收藏 引用
International Conference on Computer engineering and Applications (ICCEA)
作者: Heng He Xiaobing Xiong Yuntian Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ...
来源: 评论
Vulnerability model and attack path prediction of the UEFI firmware platform based on risk propagation  11
Vulnerability model and attack path prediction of the UEFI f...
收藏 引用
2021 11th International Workshop on Computer Science and engineering, WCSE 2021
作者: Jiao, Weihua Li, Qingbao Chen, Zhifeng Cao, Fei State Key Laboratory of Mathematical Engineering and Advanced Computing China
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper systematically analyzes the Security mechanisms of UEFI platform firmware. Then the vulnerability factors of UEFI firmware are describe... 详细信息
来源: 评论
Feature-based identification method of MCU firmware IO interface
Feature-based identification method of MCU firmware IO inter...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Yuanbo Sun Weiyu Dong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ... 详细信息
来源: 评论
LOW-FREQUENCY BANDGAP BROADENING OF INERTIAL AMPLIFICATION METAMATERIALS  29
LOW-FREQUENCY BANDGAP BROADENING OF INERTIAL AMPLIFICATION M...
收藏 引用
29th International Congress on Sound and Vibration, ICSV 2023
作者: Sun, Yonghang Xi, Chenyang Zheng, Hui State Key Laboratory of Mechanical System and Vibration School of Mechanical Engineering Shanghai Jiao Tong University Shanghai200240 China Institute of High Performance Computing A*STAR 138632 Singapore
The recent development of inertial amplification (IA) metamaterial provides a new venue for insulating low-frequency vibration and noise. It is different from conventional manners that over-rely on the structural dens... 详细信息
来源: 评论
Pixel+ and Pixel++: compact and efficient forward-secure multi-signatures for PoS blockchain consensus  24
Pixel+ and Pixel++: compact and efficient forward-secure mul...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Jianghong Wei Guohua Tian Ding Wang Fuchun Guo Willy Susilo Xiaofeng Chen State Key Laboratory of Integrated Service Networks (ISN) Xidian University and State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Integrated Service Networks (ISN) Xidian University College of Cyber Science Nankai University School of Computing and Information Technology University of Wollongong
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se...
来源: 评论