咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 773 篇 期刊文献

馆藏范围

  • 1,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,018 篇 工学
    • 626 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 149 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 126 篇 电气工程
    • 103 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 77 篇 网络空间安全
    • 76 篇 材料科学与工程(可...
    • 70 篇 光学工程
    • 53 篇 机械工程
    • 50 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 743 篇 理学
    • 422 篇 物理学
    • 250 篇 数学
    • 95 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 185 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 security
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 626 篇 state key labora...
  • 104 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 tianfu cosmic ra...
  • 93 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 85 篇 key laboratory f...
  • 83 篇 school of physic...
  • 82 篇 center for astro...
  • 81 篇 college of physi...
  • 80 篇 school of physic...
  • 80 篇 moscow institute...
  • 80 篇 school of astron...
  • 79 篇 institute of fro...
  • 79 篇 national space s...
  • 78 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,487 篇 英文
  • 62 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1584 条 记 录,以下是41-50 订阅
排序:
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing  23
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023
作者: Li, Shun-Hang Zhou, Gang Li, Zhi-Bo Lu, Ji-Cang Huang, Ning-Bo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod... 详细信息
来源: 评论
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions  25th
Towards Efficient and Privacy-Preserving Anomaly Detection ...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Song, Yuhan Zhu, Yuefei Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha... 详细信息
来源: 评论
Resolving Anonymous Nodes Based on "Watermelon Patterns" Towards Constructing Router-Level Topology in Mesh Network  29th
Resolving Anonymous Nodes Based on "Watermelon Patterns" Tow...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Li, Ruixiang Feng, Xinzhu Liu, Chong Yuan, Fuxiang Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China Sichuan University Chengdu China
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr... 详细信息
来源: 评论
Accelerating the cryo-EM structure determination in RELION on GPU cluster
收藏 引用
Frontiers of Computer Science 2022年 第3期16卷 21-39页
作者: Xin YOU Hailong YANG Zhongzhi LUAN Depei QIAN Sino-German Joint Software Institute School of Computer Science and EngineeringBeihang UniversityBeijing 100191China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125
The cryo-electron microscopy(cryo-EM)is one of the most powerful technologies available today for structural *** RELION(Regularized Likelihood Optimization)implements a Bayesian algorithm for cryo-EM structure determi... 详细信息
来源: 评论
Packet Modification and Utilization Technology of SOHO Router  2
Packet Modification and Utilization Technology of SOHO Route...
收藏 引用
2nd International Conference on advanced Manufacturing Technology and Manufacturing Systems, ICAMTMS 2023
作者: Gai, Xianzhe Cai, Ruijie Jia, Fan Chen, Hongwei Yang, Pengfei Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing 62 Science Ave. Zhengzhou450001 China
As a gateway to handle all intranet terminal traffic, SOHO router plays an important role in the network. In this paper, we introduced the security threats faced by SOHO routers, and on this basis, we propose a packet... 详细信息
来源: 评论
A Review of Few-Shot Network Traffic Classification Based on Deep Learning
A Review of Few-Shot Network Traffic Classification Based on...
收藏 引用
2023 International Conference on Mechatronics and Intelligent Control, ICMIC 2023
作者: Yang, Kai Wang, Ruo Nan Meng, Qi Meng, Long Qi, Zan Li, Xue Fei, Jin Long State Key Laboratory of Mathematical Engineering And Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China
At present, deep learning has achieved excellent performance in the field of network traffic classification. However, deep learning relies on massive data-driven classification models. When the data set is small, it i... 详细信息
来源: 评论
A review of auxiliary hardware architectures supporting dynamic taint analysis
A review of auxiliary hardware architectures supporting dyna...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Yang, Anfeng Guang, Yan Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running... 详细信息
来源: 评论
A Malware Classification Method based on Attentive Bidirectional Model  7
A Malware Classification Method based on Attentive Bidirecti...
收藏 引用
7th International Conference on Intelligent computing and Signal Processing, ICSP 2022
作者: Gui, Hairen Liu, Fudong Zhang, Chunyan Tang, Ke State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Deep learning techniques have achieved significant improvements in malware analysis application, such as malware detection, malware classification and vulnerability mining. Convolutional neural network (CNN) is applie... 详细信息
来源: 评论
PFCA: An Intelligent Method of Multidimensional User Profile Construction and Application  7
PFCA: An Intelligent Method of Multidimensional User Profile...
收藏 引用
7th International Conference on Big Data Analytics, ICBDA 2022
作者: Xia, Yi Zhou, Gang Luo, Junyong Lan, Mingjing Chen, Xiaohui Wang, Shiyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
User profile plays an important role in analyzing high influencers in the era of big data. For example, the profile can help the political strategists to scrutinize the performance of a candidate or party and overcome... 详细信息
来源: 评论
A Tree-based Structure Mutation Method for Network Protocol Fuzzing  6
A Tree-based Structure Mutation Method for Network Protocol ...
收藏 引用
2021 6th International Conference on Information Science, Computer Technology and Transportation, ISCTT 2021
作者: Yang, Rui Jing, Jing Qi, Xuyan Zheng, Hongbing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
It is difficult to fuzz the protocol because the format of network protocol is complex and often involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off between the validity of protocol m... 详细信息
来源: 评论