咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,018 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 103 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 77 篇 网络空间安全
    • 76 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 53 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,487 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1584 条 记 录,以下是191-200 订阅
排序:
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Qiankun Pi Jicang Lu Yepeng Sun Qinlong Fan Xukun Zhou Shouxin Shang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
OpenMP automatic translation framework for Sunway TaihuLight  3
OpenMP automatic translation framework for Sunway TaihuLight
收藏 引用
3rd IEEE International Conference on Communications, Information System and Computer engineering, CISCE 2021
作者: Li, Mingliang Pang, Jianmin Yue, Feng Wang, Qihan State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China
The Sunway processor is a unique heterogeneous many-core processor used by Sunway TaihuLight supercomputer. However, developing parallel programs on the Sunway processor is still complex. In this paper, a source-to-so... 详细信息
来源: 评论
Network Device Identification Based on MAC Boundary Inference  7th
Network Device Identification Based on MAC Boundary Inferenc...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Guo, Xinmiao Li, Xiangnan Li, Ruixiang Wang, Xiuting Luo, Xiangyang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Network device is an important part of cyberspace, and accurate identification of network device is the basis of network management and security analysis. The current identification method based on MAC address is rely... 详细信息
来源: 评论
Research on key Technology of Industrial Network Boundary Protection based on Endogenous Security  4
Research on Key Technology of Industrial Network Boundary Pr...
收藏 引用
4th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Yu, Fei Wei, Qiang Geng, Yangyang Wang, Yunchao State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deploy... 详细信息
来源: 评论
IPv6 Landmark Mining Based on Domain Name Screening and IPv4-IPv6 Connection  21
IPv6 Landmark Mining Based on Domain Name Screening and IPv4...
收藏 引用
5th International Conference on Electronic Information Technology and Computer engineering, EITCE 2021
作者: Liu, Minghao Sun, Yuchen Liu, Chong Zu, Shuodi Zhang, Fan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Existing IP landmark mining technologies mainly focus on IPv4, and less attention is paid to the association between IPv4 and IPv6. The current IPv6 network has fewer reliable landmarks with limited accuracy, while th... 详细信息
来源: 评论
Anti-obfuscation Binary Code Clone Detection Based on Software Gene  7th
Anti-obfuscation Binary Code Clone Detection Based on Softwa...
收藏 引用
7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021
作者: Tang, Ke Liu, Fudong Shan, Zheng Zhang, Chunyan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin... 详细信息
来源: 评论
Tuning 2D magnetism in Fe3+XGeTe2 films by element doping
收藏 引用
National Science Review 2022年 第6期9卷 163-170页
作者: Shanshan Liu Zihan Li Ke Yang Enze Zhang Awadhesh Narayan Xiaoqian Zhang Jiayi Zhu Wenqing Liu Zhiming Liao Masaki Kudo Takaaki Toriyama Yunkun Yang Qiang Li Linfeng Ai Ce Huang Jiabao Sun Xiaojiao Guo Wenzhong Bao Qingsong Deng Yanhui Chen Lifeng Yin Jian Shen Xiaodong Han Syo Matsumura Jin Zou Yongbing Xu Xiaodong Xu Hua Wu Faxian Xiu State Key Laboratory of Surface Physics and Department of Physics Fudan University Institute for Nanoelectronic Devices and Quantum Computing Fudan University College of Science University of Shanghai for Science and Technology Laboratory for Computational Physical Sciences(MOE) Fudan University Solid State and Structural Chemistry Unit Indian Institute of Science School of Electronic Science and Engineering Nanjing University Department of Physics University of Washington Department of Electronic Engineering Royal Holloway University of London Materials Engineering The University of Queensland Beijing Key Laboratory of Microstructure and Property of Advanced Materials Institute of Microstructure and Property of Advanced Materials Beijing University of Technology The Ultramicroscopy Research Center Kyushu University State Key Laboratory of ASIC and System School of Microelectronics Fudan University Collaborative Innovation Center of Advanced Microstructures Department of Applied Quantum Physics and Nuclear Engineering Kyushu University Centre for Microscopy and Microanalysis The University of Queensland Shanghai Research Center for Quantum Sciences
Two-dimensional(2D) ferromagnetic materials have been discovered with tunable magnetism and orbital-driven nodal-line features. Controlling the 2D magnetism in exfoliated nanoflakes via electric/magnetic fields enab... 详细信息
来源: 评论
Multi Association Semantics-Based User Matching Algorithm Without Prior Knowledge
Multi Association Semantics-Based User Matching Algorithm Wi...
收藏 引用
International Conference on Image, Vision and Intelligent Systems, ICIVIS 2021
作者: Jiang, Qiuyan Gong, Daofu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
Cross-network user matching is one of the basic issues for realizing social network data integration. Existing research based on structure features provides a good matching method for nodes with high-degree, but ignor... 详细信息
来源: 评论
Directed Association-based User Identification Algorithm  2
Directed Association-based User Identification Algorithm
收藏 引用
2nd International Conference on Computer, Big Data and Artificial Intelligence, ICCBDAI 2021
作者: Jiang, Qiuyan Gong, Daofu Liu, Fenlin State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China College of Science and Information Qingdao Agricultural University Qingdao266001 China
This paper studies the social network with directed association semantics, and proposes an unsupervised user identification algorithm (DAUM-P). The algorithm construct a user associations graph based on multiple types... 详细信息
来源: 评论
Malicious Traffic Detection Model Refactor Method Based on Adaptive Sample Generation  5
Malicious Traffic Detection Model Refactor Method Based on A...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Jiao, Liang Fei, Jinlong Zhao, Min State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Tianjin University of Science and Technology School of Electronic Information and Automation Tianjin China
As machine learning models are widely used in malicious traffic detection, model security has become an important research topic. Aiming at the problems that the model refactor attack methods need a large amount of pr... 详细信息
来源: 评论