咨询与建议

限定检索结果

文献类型

  • 814 篇 会议
  • 784 篇 期刊文献

馆藏范围

  • 1,598 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 630 篇 计算机科学与技术...
    • 508 篇 软件工程
    • 154 篇 信息与通信工程
    • 134 篇 电子科学与技术(可...
    • 128 篇 电气工程
    • 104 篇 控制科学与工程
    • 88 篇 化学工程与技术
    • 81 篇 生物工程
    • 78 篇 材料科学与工程(可...
    • 78 篇 网络空间安全
    • 70 篇 光学工程
    • 54 篇 机械工程
    • 49 篇 仪器科学与技术
    • 42 篇 生物医学工程(可授...
    • 37 篇 动力工程及工程热...
    • 28 篇 核科学与技术
    • 27 篇 力学(可授工学、理...
    • 26 篇 冶金工程
    • 26 篇 安全科学与工程
  • 754 篇 理学
    • 425 篇 物理学
    • 252 篇 数学
    • 96 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 86 篇 化学
    • 75 篇 地球物理学
    • 39 篇 系统科学
  • 188 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 30 篇 法学
    • 25 篇 社会学
  • 27 篇 医学
  • 15 篇 经济学
  • 14 篇 军事学
  • 11 篇 农学
  • 8 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 36 篇 feature extracti...
  • 32 篇 deep learning
  • 30 篇 semantics
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 26 篇 training
  • 25 篇 machine learning
  • 25 篇 security
  • 25 篇 software
  • 20 篇 malware
  • 19 篇 cryptography
  • 19 篇 gamma rays
  • 17 篇 computational mo...
  • 16 篇 data models
  • 15 篇 algorithm design...
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 network topology
  • 12 篇 optimization
  • 11 篇 gravitational wa...

机构

  • 632 篇 state key labora...
  • 108 篇 university of sc...
  • 100 篇 hebei normal uni...
  • 100 篇 state key labora...
  • 99 篇 tianfu cosmic ra...
  • 97 篇 yunnan observato...
  • 94 篇 university of ch...
  • 89 篇 key laboratory f...
  • 86 篇 department of ph...
  • 86 篇 school of physic...
  • 85 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 school of physic...
  • 83 篇 moscow institute...
  • 83 篇 school of astron...
  • 82 篇 national space s...
  • 81 篇 institute of fro...
  • 81 篇 school of physic...
  • 70 篇 department of en...
  • 68 篇 national astrono...

作者

  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 77 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li cheng
  • 69 篇 chen m.j.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 65 篇 li xin
  • 63 篇 min z.
  • 62 篇 liu h.d.

语言

  • 1,415 篇 英文
  • 149 篇 其他
  • 38 篇 中文
检索条件"机构=the State Key Laboratory of Mathematic Engineering and Advanced Computing"
1598 条 记 录,以下是831-840 订阅
排序:
Disorder-induced pronounced magnetoresistive hysteresis in Josephson junctions
收藏 引用
Physical Review B 2025年 第13期111卷 134513-134513页
作者: Yu Wu Daiqiang Huang Huanyu Zhang Anita Guarino Rosalba Fittipaldi Chao Ma Wenjie Hu Chang Niu Zhen Wang Weichao Yu Yuriy Yerin Antonio Vecchione Yang Liu Mario Cuoco Hangwen Guo Jian Shen State Key Laboratory of Surface Physics and Institute for Nanoelectronic Devices and Quantum Computing Fudan University Shanghai 200433 People's Republic of China Department of Physics Fudan University Shanghai 200433 People's Republic of China Shanghai Aerospace Control Technology Institute Shanghai 201109 People's Republic of China International Center for Quantum Materials Peking University Beijing 100871 People's Republic of China CNR-SPIN c/o Universitá di Salerno I-84084 Fisciano (SA) Italy College of Materials Science and Engineering Hunan University Changsha 410082 People's Republic of China Department of Physics University of Science and Technology of China Hefei Anhui 230026 Peoples Republic of China CNR-SPIN via del Fosso del Cavaliere 100 00133 Roma Italy Hefei National Laboratory Hefei 230088 People's Republic of China Zhangjiang Fudan International Innovation Center Fudan University Shanghai 201210 People's Republic of China Shanghai Research Center for Quantum Sciences Shanghai 201315 People's Republic of China Collaborative Innovation Center of Advanced Microstructures Nanjing 210093 People's Republic of China
The relation between superconductivity and time-reversal symmetry is one of the most fascinating problems in condensed-matter physics. Here we report an anomalous transport behavior in superconducting Josephson juncti... 详细信息
来源: 评论
A Novel Timing-based Network Covert Channel Detection Method
A Novel Timing-based Network Covert Channel Detection Method
收藏 引用
作者: Shoupu Lu Zhifeng Chen Guangxin Fu Qingbao Li State Key laboratory of Mathematical Engineering and Advanced Computing Henan University of Economics and Law
Network stealth events are endless,and covert timing channel is one of the most difficult means to *** order to further improve the detection rate of covert timing channel,several typical network covert timing channel... 详细信息
来源: 评论
Stealthy Malware Detection Based on Deep Neural Network
Stealthy Malware Detection Based on Deep Neural Network
收藏 引用
作者: Shoupu Lu Qingbao Li Xinbing Zhu State Key laboratory of Mathematical Engineering and Advanced Computing Henan University of Economics and Law
Network attacks using advanced local hiding technology have not only increased, but also become a serious threat. However, attacks using these technologies can not be detected through traffic detection, and some attac... 详细信息
来源: 评论
Pdf Exploitable malware analysis based on exploit genes  12
Pdf Exploitable malware analysis based on exploit genes
收藏 引用
12th IEEE International Conference on Anti-Counterfeiting, Security, and Identification, ASID 2018
作者: Zhou, Xin Pang, Jianmin Liu, Fudong Wang, Jun Yue, Feng Liu, Xiaonan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the popularization of social networks, as a low-cost, high-efficiency entail attack method, most of the attack vectors were embedded in email attachments, and exploited vulnerability on Adobe and Office software.... 详细信息
来源: 评论
A short text spectrum clustering method based on frequent itemsets  4
A short text spectrum clustering method based on frequent it...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Luo, Nan Zhang, Ping Li, Qingbao Chen, Zhifeng Feng, Peijun Xue, Tianxiao Engineering and Advanced Computing State Key Laboratory of Mathematical Zhengzhou China
Short text datum, which contains a lot of useful information, could be easily found on a wide variety of self-media platform and social communication tools. on It is significant to use datum mining technology to autom... 详细信息
来源: 评论
The research on application of software diversity in cyberspace security  4
The research on application of software diversity in cybersp...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Zhang, Jiexin Pang, Jianmin Zhang, Zheng Liu, Zhenwu State Key Laboratory of Mathematical Engineering and Advanced Computing ZhengZhou China
Nowadays, the cyberspace security situation is unoptimistic. Widespread vulnerabilities and backdoors are the main factors of insecurity in cyberspace. Furthermore, the software monoculture makes the attack have an ex... 详细信息
来源: 评论
Vulnerability Model and Evaluation of the UEFI Platform Firmware Based on Improved Attack Graphs  9
Vulnerability Model and Evaluation of the UEFI Platform Firm...
收藏 引用
9th IEEE International Conference on Software engineering and Service Science, ICSESS 2018
作者: Cao, Fei Li, Qingbao Chen, Zhifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of... 详细信息
来源: 评论
Target function location based on code coverage analysis  2
Target function location based on code coverage analysis
收藏 引用
2nd International Conference on Material engineering and advanced Manufacturing Technology, MEAMT 2018
作者: Jin, Kaiwen Li, Qingbao Chen, Zhifeng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan China
How to locate the target function faster and more accurately is a key problem of Automatic Reverse-engineering of Software Programs. In order to solve this problem, a target function location method based on code cove... 详细信息
来源: 评论
Signal approximation with Pascal’s triangle and sampling
Signal approximation with Pascal’s triangle and sampling
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Lei Chen Xinghuo Yu Jinhu Lü School of Automation Science and Electrical Engineering State Key Laboratory of Software Development Environment Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China School of Engineering RMIT University Melbourne VIC Australia
This brief explores the approximation properties of a unique basis expansion based on Pascal's triangle, which realizes a sampled-data driven approach between a continuous-time signal and its discrete-time represe... 详细信息
来源: 评论
A review of cryptographic algorithm recognition technology for binary code
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1856卷
作者: Chenxia Zhao Fei Kang Ju Yang Hui Shu Zhengzhou University Zhengzhou Henan 450001 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Henan 450001 China
Aiming at the cryptographic algorithm that may be contained in the binary program, combined with existing research results, several cryptographic algorithm identification techniques are analyzed, including control flo...
来源: 评论