咨询与建议

限定检索结果

文献类型

  • 812 篇 会议
  • 796 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,609 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,045 篇 工学
    • 632 篇 计算机科学与技术...
    • 515 篇 软件工程
    • 158 篇 信息与通信工程
    • 137 篇 电子科学与技术(可...
    • 129 篇 电气工程
    • 104 篇 控制科学与工程
    • 89 篇 化学工程与技术
    • 81 篇 网络空间安全
    • 80 篇 材料科学与工程(可...
    • 80 篇 生物工程
    • 70 篇 光学工程
    • 56 篇 机械工程
    • 51 篇 仪器科学与技术
    • 45 篇 生物医学工程(可授...
    • 36 篇 动力工程及工程热...
    • 28 篇 力学(可授工学、理...
    • 28 篇 冶金工程
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
  • 758 篇 理学
    • 426 篇 物理学
    • 254 篇 数学
    • 97 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 89 篇 化学
    • 74 篇 地球物理学
    • 40 篇 系统科学
  • 191 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 32 篇 法学
    • 26 篇 社会学
  • 31 篇 医学
  • 16 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 deep learning
  • 31 篇 semantics
  • 28 篇 cosmic rays
  • 28 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 25 篇 software
  • 24 篇 machine learning
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 computational mo...
  • 19 篇 cryptography
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 633 篇 state key labora...
  • 109 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 82 篇 school of physic...
  • 82 篇 moscow institute...
  • 82 篇 school of astron...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 81 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 79 篇 fang j.
  • 79 篇 feng c.f.
  • 79 篇 jiang k.
  • 78 篇 bastieri d.
  • 77 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 71 篇 guo y.q.
  • 70 篇 chen m.j.
  • 70 篇 bao y.w.
  • 69 篇 li cheng
  • 69 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 li xin
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 1,482 篇 英文
  • 93 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1609 条 记 录,以下是211-220 订阅
Towards Open-world Generalized Deepfake Detection: General Feature Extraction via Unsupervised Domain Adaptation
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Midou Yin, Qilin Lu, Wei Luo, Xiangyang School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of generative artificial intelligence, new forgery methods are rapidly emerging. Social platforms are flooded with vast amounts of unlabeled synthetic data and authentic data, making it increasing... 详细信息
来源: 评论
LENSER: A Channel state Information Based Indoor Localization Scheme for Malicious Devices
LENSER: A Channel State Information Based Indoor Localizatio...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Yongqiang Ma Xiangyang Luo Ruixiang Li Shaoyong Du Wenyan Liu Key Laboratory of Cyberspace Situation Awareness of Henan Province State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to e...
来源: 评论
Survey on the Improvement and Application of HHL Algorithm
Survey on the Improvement and Application of HHL Algorithm
收藏 引用
2022 International Conference on Computer Modelling and Big Data Analytics, CMBDA 2022
作者: Liu, Xiaonan Xie, Haoshan Liu, Zhengyu Zhao, Chenyan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University ZhengZhou450000 China School of Computer and Artificial Intelligence ZhengZhou University ZhengZhou450000 China
Quantum computing is a new computing mode that follows the laws of quantum mechanics to control quantum information units for computation. In terms of computational efficiency, due to the existence of quantum mechanic... 详细信息
来源: 评论
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution
收藏 引用
China Communications 2021年 第8期18卷 85-95页
作者: Bingzheng Li Zheng Zhang Xiaomei Wang Sheng Qu Jiangxing Wu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China China National Digital Switching System Engineering and Technological R&D Center Zhengzhou 450002China
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and... 详细信息
来源: 评论
DRTaint: A Dynamic Taint Analysis Framework Supporting Correlation Analysis between Data Regions
DRTaint: A Dynamic Taint Analysis Framework Supporting Corre...
收藏 引用
2021 International Conference on Computer Network Security and Software engineering, CNSSE 2021
作者: Yang, Pan Kang, Fei Zhao, Yuntian Shu, Hui State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Taint analysis is a common technology for software analysis, which is widely used in the region of information security. Aiming at the problem that the existing binary program dynamic taint analysis framework does not... 详细信息
来源: 评论
Metalenses phase characterization by multidistance phase retrieval
收藏 引用
Light(Science & Applications) 2024年 第9期13卷 1898-1907页
作者: Bowen Liu Jialuo Cheng Maoxiong Zhao Jin Yao Xiaoyuan Liu Shaohu Chen Lei Shi Din Ping Tsai Zihan Geng Mu Ku Chen State Key Laboratory of Surface Physics Key Laboratory of Micro-and Nano-Photonic Structures(Ministry of Education)and Department of PhysicsFudan University200433 ShanghaiChina Department of Electrical Engineering City University of Hong KongKowloonHong Kong SARChina State Key Laboratory of Terahertz and Millimeter Waves City University of Hong KongKowloonHong Kong SARChina Institute for Nanoelectronic Devices and Quantum Computing Fudan University200438 ShanghaiChina Collaborative Innovation Center of Advanced Microstructures Nanjing University210093 NanjingJiangsuChina Shanghai Research Center for Quantum Sciences 201315 ShanghaiChina Centre for Biosystems Neuroscienceand NanotechnologyCity University of Hong KongKowloonHong Kong SARChina Institute of Data and Information Tsinghua Shenzhen International Graduate SchoolTsinghua University518071 ShenzhenGuangdongChina
Metalens,characterized by their unique functions and distinctive physical properties,have gained significant attention for their potential *** further optimize the performance of metalens,it is necessary to characteri... 详细信息
来源: 评论
A Regional Network Topology Construction Algorithm Based on Sampling Measurement  5
A Regional Network Topology Construction Algorithm Based on ...
收藏 引用
2021 5th International Workshop on advanced Algorithms and Control engineering, IWAACE 2021
作者: Tao, Zhiyuan Liu, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan450001 China
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ... 详细信息
来源: 评论
A software upgrade security analysis method based on program analysis
A software upgrade security analysis method based on program...
收藏 引用
2021 IEEE International Conference on Computer Science, Electronic Information engineering and Intelligent Control Technology, CEI 2021
作者: Lv, Xiaoshao Shu, Hui Kang, Fei Huang, Yuyao State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi... 详细信息
来源: 评论
A survey of offensive security research on PLCs
A survey of offensive security research on PLCs
收藏 引用
2021 International Conference on Computer, Communication, Control, Automation and Robotics, CCCAR 2021
作者: Ma, Rongkuan Wei, Qiang Wang, Qingxian State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS... 详细信息
来源: 评论
FirmVulSeeker—BERT and Siamese Network-Based Vulnerability Search for Embedded Device Firmware Images
收藏 引用
Journal on Internet of Things 2022年 第1期4卷 1-20页
作者: Yingchao Yu Shuitao Gan Xiaojun Qin State Key Laboratory of Mathematical Engineering and Advanced Computing WuxiJiangsu214083China
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine... 详细信息
来源: 评论