咨询与建议

限定检索结果

文献类型

  • 811 篇 会议
  • 779 篇 期刊文献

馆藏范围

  • 1,590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,035 篇 工学
    • 623 篇 计算机科学与技术...
    • 504 篇 软件工程
    • 150 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 125 篇 电气工程
    • 101 篇 控制科学与工程
    • 87 篇 化学工程与技术
    • 80 篇 生物工程
    • 79 篇 材料科学与工程(可...
    • 77 篇 网络空间安全
    • 64 篇 光学工程
    • 52 篇 机械工程
    • 50 篇 核科学与技术
    • 49 篇 仪器科学与技术
    • 41 篇 生物医学工程(可授...
    • 35 篇 动力工程及工程热...
    • 26 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 750 篇 理学
    • 423 篇 物理学
    • 253 篇 数学
    • 96 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 86 篇 化学
    • 73 篇 地球物理学
    • 39 篇 系统科学
  • 186 篇 管理学
    • 121 篇 管理科学与工程(可...
    • 71 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 25 篇 security
  • 25 篇 training
  • 24 篇 machine learning
  • 24 篇 software
  • 20 篇 malware
  • 20 篇 gamma rays
  • 19 篇 cryptography
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 629 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,458 篇 英文
  • 98 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1590 条 记 录,以下是551-560 订阅
排序:
NiCoP nanoleaves array for electrocatalytic alkaline H2 evolution and overall water splitting
收藏 引用
Journal of Energy Chemistry 2020年 第11期29卷 395-401页
作者: Lei Chen Yaohao Song Yi Liu Liang Xu Jiaqian Qin Yongpeng Lei Yougen Tang State Key Laboratory of Powder Metallurgy Hunan Provincial Key Laboratory of Chemical Power SourcesCollege of Chemistry and Chemical EngineeringCentral South UniversityChangsha 410083HunanChina Energy Materials Computing Center Jiangxi University of Science and TechnologyNanchang 330013JiangxiChina Research Unit of Advanced Materials for Energy Storage Metallurgy and Materials Science Research InstituteChulalongkorn UniversityBangkok 10330Thailand
The development of non-precious, high-efficient and durable electrocatalysts for H2 evolution in alkaline media is highly desirable. Herein we report NiCoP nanoleaves array vertically grown on Ni foam for H2 evolution... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network  2
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
2019 2nd International Symposium on Big Data and Applied Statistics, ISBDAS 2019
作者: Lu, Shoupu Li, Qingbao Zhu, Xinbing State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Province Zhengzhou450001 China Henan University of Economics and Law Henan Province Zhengzhou450000 China
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac... 详细信息
来源: 评论
Parallelizing Neural Network Models Effectively on GPU by Implementing Reductions Atomically  22
Parallelizing Neural Network Models Effectively on GPU by Im...
收藏 引用
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques
作者: Jie Zhao Cédric Bastoul Yanzhi Yi Jiahui Hu Wang Nie Renwei Zhang Zhen Geng Chong Li Thibaut Tachon Zhiliang Gan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Huawei Technologies France SASU Paris France Huawei Technologies Co. Ltd. Beijing China Huawei Technologies Co. Ltd. Hangzhou China Huawei Technologies Co. Ltd. Shenzhen China
Due to the missing of a good orchestration of loop transformations, existing optimizing compilers for deploying neural networks on GPU either parallelize reductions ineffectively or miss the fusion opportunities with ... 详细信息
来源: 评论
A Malware Similarity Analysis Method Based on Network Control Structure Graph
A Malware Similarity Analysis Method Based on Network Contro...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Duanyi Wang Hui Shu Fei Kang Wenjuan Bu State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan China
Recently, graph-based malware similarity analysis has been widely used in the field of malware detection. However, the wide application of code obfuscation, polymorphism, and deformation changes the structure of malic... 详细信息
来源: 评论
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
Computer Communication and Network Security (CCNS), International Conference on
作者: Shao Yuwen Zhang Zheng Li Bingzheng Ji Xinsheng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China R&D Center National Digital Switching System Engineering & Technological Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
Malware Detection Method based on Control Flow Analysis  2019
Malware Detection Method based on Control Flow Analysis
收藏 引用
Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City
作者: Peng Shan Qingbao Li Ping Zhang Yanyang Gu State Key Laboratory of Mathematical Engineering and Advanced Computing China
With the rapid development of computer technology and the iteration of malware, numerous computer malware detection methods have been proposed, among which malware detection based on machine learning has become an imp... 详细信息
来源: 评论
High-Ni Low-Co High-Capacity Li-Rich Cathode Materials Via Adjusting Li2mno3 Content and Li/Ni Mixing Structures
SSRN
收藏 引用
SSRN 2023年
作者: Wu, Zhen Zou, Kunyang Dai, Xin Zhang, Yu-Han Zhang, Xudong Wang, Hao Hou, Zhufeng Ma, Lijing Liu, Yan Chen, Yuanzhen Guo, Shengwu Liu, Yongning State Key Laboratory for Mechanical Behavior of Materials Xi’an Jiaotong University Xi’an710049 China Qingdao Industrial Energy Storage Research Institute Qingdao Institute of Bioenergy and Bioprocess Technology Chinese Academy of Sciences Qingdao266101 China Center for High Performance Computing Network Information Center Xi’an Jiaotong University Xi’an710049 China Hefei Advanced Computing Center Operation Management Corp Ltd Hefei230088 China State Key Laboratory of Structural Chemistry Fujian Institute of Research the Structure of Matter Chinese Academy of Sciences Fuzhou350002 China International Research Center for Renewable Energy State Key Laboratory of Multiphase Flow in Power Engineering Xi’an Jiaotong University Xi’an710049 China
Li-rich layered oxides (LLOs) are considered as the promising cathode materials for next-generation high energy density lithium-ion batteries (LIBs). However, severe voltage fade and capacity decay hinder their commer... 详细信息
来源: 评论
One-step implementation of Rydberg nonadiabatic noncyclic geometric quantum computation in decoherence-free subspaces
收藏 引用
Physical Review A 2022年 第6期105卷 062602-062602页
作者: Li-Na Sun F.-Q. Guo Zheng Shan M. Feng L.-L. Yan Shi-Lei Su School of Physics and Microelectronics Key Laboratory of Materials Physics of Ministry of Education Zhengzhou University Zhengzhou 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001 China State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics Wuhan Institute of Physics and Mathematics Innovation Academy of Precision Measurement Science and Technology Chinese Academy of Sciences Wuhan 430071 China Department of Physics Zhejiang Normal University Jinhua 321004 China Research Center for Quantum Precision Measurement Guangzhou Institute of Industry Technology Guangzhou 511458 China
Quantum gates constructed by geometric phase are naturally robust to control errors due to the global nature of the geometric evolution path. Therefore, how to cope with the inevitable decoherence errors is worthy of ... 详细信息
来源: 评论
Malware detection method based on control flow analysis  7
Malware detection method based on control flow analysis
收藏 引用
7th International Conference on Information Technology: IoT and Smart City, ICIT 2019
作者: Shan, Peng Li, Qingbao Zhang, Ping Gu, Yanyang State Key Laboratory Mathematical Engineering and Advanced Computing China
With the rapid development of computer technology and the iteration of malware, numerous computer malware detection methods have been proposed, among which malware detection based on machine learning has become an imp... 详细信息
来源: 评论
Highly efficient oxygen evolution and stable water splitting by coupling NiFe LDH with metal phosphides
收藏 引用
Science China Materials 2021年 第7期64卷 1662-1670页
作者: Chengye Song Yi Liu Yuchao Wang Shuaihao Tang Wenkui Li Qian Li Jian Zeng Lei Chen Hongcheng Peng Yongpeng Lei State Key Laboratory of Powder Metallurgy Central South UniversityChangsha 410083China School of Materials and Mechanical Engineering Jiangxi Key Laboratory of Surface EngineeringJiangxi Science and Technology Normal UniversityNanchang 330013China Hunan Provincial Key Laboratory of Chemical Power Sources College of Chemistry and Chemical EngineeringCentral South UniversityChangsha 410083China School of Material Science and Engineering Central South University of Forestry and TechnologyChangsha 410004China Energy Materials Computing Center Jiangxi University of Science and TechnologyNanchang 330013China State Key Laboratory of Advanced Chemical Power Sources Guizhou Meiling Power Sources Co.Ltd.Zunyi 563003China
It is a great challenge to develop highly active oxygen evolution reaction(OER)electrocatalysts with superior *** this study,a NiFe layered double hydroxidedecorated phosphide(NiFe LDH@CoP/NiP_(3))was constructed to d... 详细信息
来源: 评论