咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,018 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 103 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 77 篇 网络空间安全
    • 76 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 53 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,487 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1584 条 记 录,以下是221-230 订阅
排序:
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Shun-Hang Li Gang Zhou Zhi-Bo Li Ji-Cang Lu Ning-Bo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod...
来源: 评论
A Selection Strategy for Network Security Defense Based on a Time Game Model
A Selection Strategy for Network Security Defense Based on a...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Sun, Pengyu Zhang, Hengwei Ma, Junqiang Li, Chenwei Mi, Yan Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net... 详细信息
来源: 评论
Effect of thickness variations of lithium niobate on insulator waveguide on the frequency spectrum of spontaneous parametric down-conversion
收藏 引用
Chinese Physics B 2021年 第11期30卷 268-273页
作者: Guang-Tai Xue Xiao-Hui Tian Chi Zhang Zhenda Xie Ping Xu Yan-Xiao Gong Shi-Ning Zhu National Laboratory of Solid State Microstructures School of PhysicsSchool of Electronic Science and EngineeringCollege of Engineering and Applied Sciencesand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210093China Institute for Quantum Information and State Key Laboratory of High Performance Computing College of ComputingNational University of Defense TechnologyChangsha 410073China
We study the effect of waveguide thickness variations on the frequency spectrum of spontaneous parametric downconversion in the periodically-poled lithium niobate on insulator(LNOI)*** analyze several variation models... 详细信息
来源: 评论
Feature Rotation Invariance Learning for Point Cloud Analysis  10
Feature Rotation Invariance Learning for Point Cloud Analysi...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Shi, Lu Cao, Qi Zhang, Guoqing Yi, Jin Huang, Yansen Cen, Yigang Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer Science and Technology Visual Intellgence +X International Cooperation Joint Laboratory of Moe Beijing100044 China University of Glasgow The School of Computing Science 567739 Singapore Beijing Jiaotong University With the Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education The State Key Laboratory of Advanced Rail Autonomous Operation The School of Computer and Information Technology Beijing100044 China Guizhou University Guizhou Lianjian Civil Engineering Quality Testing Monitoring Center Co. Ltd The College of Civil Engineering Guizhou550025 China
While deep learning has significantly advanced point cloud analysis, extracting effective features from their disordered structure remains challenging. Existing approaches often rely on complex network architectures o... 详细信息
来源: 评论
Timing Strategy for Active Detection of APT Attack Based on FlipIt Model and Q-learning Method
Timing Strategy for Active Detection of APT Attack Based on ...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Liu, Zhilin Zhang, Hengwei Sun, Pengyu Mi, Yan Zhang, Xiaoning Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr... 详细信息
来源: 评论
Network Attack Intention Recognition Based on Signaling Game Model and Netlogo Simulation
Network Attack Intention Recognition Based on Signaling Game...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Zhang, Xiaoning Zhang, Hengwei Li, Chenwei Sun, Pengyu Liu, Zhilin Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes... 详细信息
来源: 评论
On the Cycle Structure of Some Nonlinear Feedback Shift Registers
收藏 引用
Chinese Journal of Electronics 2025年 第4期23卷 801-804页
作者: Zhongxiao Wang Hong Xu Wenfeng Qi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers (NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can ... 详细信息
来源: 评论
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning  16th
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Lear...
收藏 引用
16th International Conference on Information Security and Cryptology, Inscrypt 2020
作者: Su, Heng-Chuan Zhu, Xuan-Yong Ming, Duan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
In CRYPTO 2019, Gohr uses the residual network technology of artificial intelligence to build a differential distinguisher, and attacks the reduced-round Speck32/64. We tried this method to recover the keys for ten-ro... 详细信息
来源: 评论
New advanced computing Architecture for Cryptography Design and Analysis by D-Wave Quantum Annealer
收藏 引用
Tsinghua Science and Technology 2022年 第4期27卷 751-759页
作者: Xiangmin Ji Baonan Wang Feng Hu Chao Wang Huanguo Zhang College of Computer Information Science Fujian Agriculture and Forestry UniversityFuzhou 350002China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China College of Computer Science and Technology Shanghai University of Electric PowerShanghai 200090China International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai UniversityShanghai 200444 State Key Laboratory of Cryptology Beijing 100878China laboratory of Specialty Fiber Optics and Optical Access Networks Joint International Research Laboratory of Specialty Fiber Optics and Advanced CommunicationShanghai UniversityShanghai 200444 State Key Laboratory of Cryptology Beijing 100878and also with Center for Quantum ComputingPeng Cheng LaboratoryShenzhen 518000China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072
Universal quantum computers are far from achieving practical *** D-Wave quantum computer is initially designed for combinatorial ***,exploring the potential applications of the D-Wave device in the field of cryptograp... 详细信息
来源: 评论
Coarse-to-Fine Proposal Refinement Framework for Audio Temporal Forgery Detection and Localization  24
Coarse-to-Fine Proposal Refinement Framework for Audio Tempo...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wu, Junyan Lu, Wei Luo, Xiangyang Yang, Rui Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Alibaba Group Hangzhou China School of Cyber Science and Engineering Wuhan University Wuhan China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus Shenzhen China
Recently, a novel form of audio partial forgery has posed challenges to its forensics, requiring advanced countermeasures to detect subtle forgery manipulations within long-duration audio. However, existing countermea... 详细信息
来源: 评论