咨询与建议

限定检索结果

文献类型

  • 812 篇 会议
  • 796 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,609 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,045 篇 工学
    • 632 篇 计算机科学与技术...
    • 515 篇 软件工程
    • 158 篇 信息与通信工程
    • 137 篇 电子科学与技术(可...
    • 129 篇 电气工程
    • 104 篇 控制科学与工程
    • 89 篇 化学工程与技术
    • 81 篇 网络空间安全
    • 80 篇 材料科学与工程(可...
    • 80 篇 生物工程
    • 70 篇 光学工程
    • 56 篇 机械工程
    • 51 篇 仪器科学与技术
    • 45 篇 生物医学工程(可授...
    • 36 篇 动力工程及工程热...
    • 28 篇 力学(可授工学、理...
    • 28 篇 冶金工程
    • 28 篇 核科学与技术
    • 26 篇 安全科学与工程
  • 758 篇 理学
    • 426 篇 物理学
    • 254 篇 数学
    • 97 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 89 篇 化学
    • 74 篇 地球物理学
    • 40 篇 系统科学
  • 191 篇 管理学
    • 124 篇 管理科学与工程(可...
    • 73 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 32 篇 法学
    • 26 篇 社会学
  • 31 篇 医学
  • 16 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 feature extracti...
  • 32 篇 deep learning
  • 31 篇 semantics
  • 28 篇 cosmic rays
  • 28 篇 network security
  • 28 篇 training
  • 26 篇 security
  • 25 篇 software
  • 24 篇 machine learning
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 computational mo...
  • 19 篇 cryptography
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 633 篇 state key labora...
  • 109 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 82 篇 school of physic...
  • 82 篇 moscow institute...
  • 82 篇 school of astron...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 81 篇 national space s...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 79 篇 fang j.
  • 79 篇 feng c.f.
  • 79 篇 jiang k.
  • 78 篇 bastieri d.
  • 77 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 71 篇 guo y.q.
  • 70 篇 chen m.j.
  • 70 篇 bao y.w.
  • 69 篇 li cheng
  • 69 篇 hu h.b.
  • 68 篇 liu b.
  • 65 篇 li xin
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 1,482 篇 英文
  • 93 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1609 条 记 录,以下是301-310 订阅
排序:
A novel hyperchaotic multistable heterogeneous neural network with hidden attractors and its application in image encryption
收藏 引用
Chinese Journal of Physics 2025年 96卷 851-874页
作者: Zhi Huang Zhen Li Qiao Wang Weijie Tan Xianming Wu College of Big Data and Information Engineering Guizhou University Guiyang 550025 China State Key Laboratory of Public Big Data Guizhou University Guiyang 550025 China Guizhou Key Laboratory of Artificial Intelligence and Brain-inspired Computing College of Mathematics and Big Data Guizhou Education University Guiyang 550018 China State Key Laboratory of Public Big Data Key Laboratory of Advanced Manufacturing Technology of Ministry of Education Guizhou University Guiyang 550025 China School of Mechanical and Electrical Engineering Guizhou Normal University Guiyang 550025 China
By simulating the unique properties of different types of neurons and their interconnecting patterns, heterogeneous neural networks can more accurately reflect the structural and functional characteristics of biologic... 详细信息
来源: 评论
Neural Manifold Learning Based on 40 nm Dual-Mode PCM Compute-in-Memory Chip with Hardware Adaptive Drift Compensation
Neural Manifold Learning Based on 40 nm Dual-Mode PCM Comput...
收藏 引用
2024 IEEE International Electron Devices Meeting, IEDM 2024
作者: Yan, Longhao Li, Yuqi Li, Xi Pan, Zelun Wang, Zeyu Wang, Xile Wang, Bowen Zhan, Zhe Tang, Xiyuan Tao, Yaoyu Ge, Woo-Ping Song, Zhitang Huang, Ru Yang, Yuchao Beijing Advanced Innovation Center for Integrated Circuits School of Integrate Circuits Peking University Beijing China Beijing China Center for Brain Inspired Chips Institute for Artificial Intelligence Peking University Beijing China Guangdong Provincial Key Laboratory of In-Memory Computing Chips School of Electronic and Computer Engineering Peking University Shenzhen China State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences China
Neural manifold learning (NML), as a significant research topic in the field of neuroscience, plays a vital role in the realization of intelligent brain-computer interface (BCI) at the edge. However, traditional edge ... 详细信息
来源: 评论
nnTaint: An Optimized Dynamic Taint Analysis Method Based on Neural Network
nnTaint: An Optimized Dynamic Taint Analysis Method Based on...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Yuming Zhu Weiyu Dong Cyber Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction ... 详细信息
来源: 评论
CinfoFuzz: Fuzzing Method Based on Web Service Correlation Information of Embedded Devices
CinfoFuzz: Fuzzing Method Based on Web Service Correlation I...
收藏 引用
International Conference on Information, Communication and Networks (ICICN)
作者: Qi Feng Weiyu Dong Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop... 详细信息
来源: 评论
Adaptive energy-preserving algorithms for guiding center system
收藏 引用
Plasma Science and Technology 2023年 第4期25卷 11-22页
作者: 朱贝贝 刘健 张嘉炜 祝爱卿 唐贻发 Department of Applied Mathematics School of Mathematics and PhysicsUniversity of Science and Technology BeijingBeijing 100083Peopleʼs Republic of China School of Nuclear Science and Technology University of Science and Technology of ChinaHefei 230026Peopleʼs Republic of China Advanced algorithm Joint Lab Shandong Computer Science CenterQilu University of TechnologyJinan 250014Peopleʼs Republic of China The State Key Laboratory of Scientific and Engineering Computing The Institute of Computational Mathematics and Scientific/Engineering ComputingAcademy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190Peopleʼs Republic of China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049Peopleʼs Republic of China
We develop two types of adaptive energy preserving algorithms based on the averaged vector field for the guiding center dynamics,which plays a key role in magnetized *** adaptive scheme is applied to the Gauss Legendr... 详细信息
来源: 评论
BA-Audit: Blockchain-Based Public Auditing for Aggregated Data Sharing in Edge-Assisted IoT  1
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Liu, Mingxi Lu, Ning Yin, Jingli Cheng, Qingfeng Shi, Wenbo School of Computer Science and Engineering Northeastern University Shenyang China School of Computer Science and Technology Xidian University Xi’an China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou China
With the massive placement of sensors leading to a surge in IoT data, it is wise for system administrators to use data aggregation strategies to collect and share data in edge-assisted IoT scenarios because traditiona... 详细信息
来源: 评论
单原子在铝合金中的扩散迁移行为:可解释机器学习加速第一原理计算方法
收藏 引用
Science China Materials 2024年 第4期67卷 1140-1149页
作者: 黄敬涛 薛景腾 李明伟 程源 来忠红 胡津 周飞 曲囡 刘勇 朱景川 School of Materials Science and Engineering Harbin Institute of TechnologyHarbin 150001China National Key Laboratory for Precision Hot Processing of Metals Harbin Institute of TechnologyHarbin 150001China National Key Laboratory of Science and Technology on Advanced Composites in SpecialEnvironments Harbin Institute of TechnologyHarbin 150001 China Center for Analysis Measurement and ComputingHarbin Institute of TechnologyHarbin 150001China State Key Laboratory for Environment-friendly Energy Materials School of Materials Science and EngineringSouthwest University of Science and TechnologyMianyang 621010China
本文采用机器学习加速第一原理计算的方法,研究了铝基体中单原子的扩散迁移行为.建立铝基体中三十多种单原子扩散迁移行为的小样本数据集,以原子半径、离子半径和第一电离能等固有参数作为输入特征值,合金原子与空位之间的相互作用能以... 详细信息
来源: 评论
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon via exploiting mitigations  23
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon v...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Tingting Yin Zicong Gao Zhenghang Xiao Zheyu Ma Min Zheng Chao Zhang Tsinghua University and Ant Group State Key Laboratory of Mathematical Engineering and Advanced Computing Hunan University Tsinghua University Ant Group Tsinghua University and Zhongguancun Laboratory
macOS drivers, i.e., Kernel EXTensions (kext), are attractive attack targets for adversaries. However, automatically discovering vulnerabilities in kexts is extremely challenging because kexts are mostly closed-source...
来源: 评论
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1307-1324页
作者: Ke Liu Jing-Yi Wang Qiang Wei Zhen-Yong Zhang Jun Sun Rong-Kuan Ma Rui-Long Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China College of Computer Science and Technology Guizhou UniversityGuiyang 550025China School of Information Systems Singapore Management UniversitySingapore 689867Singapore
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ... 详细信息
来源: 评论
An Extraction Method of Network Security Situation Elements Based on Gradient Lifting Decision Tree
An Extraction Method of Network Security Situation Elements ...
收藏 引用
2021 International Conference on advanced computing and Endogenous Security, ICACES 2021
作者: Ma, Zhaorui Zhang, Shicheng Chang, Yiheng Zhou, Qinglei Hu, Xinhao Li, Xia State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450052 China Zhengzhou University of Light Industry Zhengzhou450002 China
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur... 详细信息
来源: 评论