咨询与建议

限定检索结果

文献类型

  • 4,622 篇 期刊文献
  • 1,850 篇 会议
  • 3 册 图书

馆藏范围

  • 6,475 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,909 篇 工学
    • 1,587 篇 计算机科学与技术...
    • 1,226 篇 软件工程
    • 509 篇 电子科学与技术(可...
    • 484 篇 化学工程与技术
    • 468 篇 电气工程
    • 454 篇 信息与通信工程
    • 371 篇 控制科学与工程
    • 352 篇 材料科学与工程(可...
    • 341 篇 力学(可授工学、理...
    • 267 篇 光学工程
    • 243 篇 生物工程
    • 241 篇 机械工程
    • 241 篇 动力工程及工程热...
    • 217 篇 核科学与技术
    • 204 篇 仪器科学与技术
    • 187 篇 冶金工程
    • 148 篇 土木工程
    • 147 篇 生物医学工程(可授...
    • 138 篇 水利工程
    • 117 篇 网络空间安全
  • 3,831 篇 理学
    • 2,315 篇 物理学
    • 1,381 篇 数学
    • 502 篇 化学
    • 391 篇 统计学(可授理学、...
    • 323 篇 生物学
    • 215 篇 系统科学
    • 162 篇 地球物理学
  • 529 篇 管理学
    • 379 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 142 篇 医学
  • 88 篇 农学
  • 68 篇 法学
  • 53 篇 经济学
  • 24 篇 军事学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 244 篇 bosons
  • 217 篇 hadron colliders
  • 79 篇 higgs bosons
  • 78 篇 photons
  • 70 篇 machine learning
  • 62 篇 deep learning
  • 61 篇 feature extracti...
  • 60 篇 relativistic hea...
  • 55 篇 semantics
  • 53 篇 w & z bosons
  • 53 篇 training
  • 52 篇 computational mo...
  • 51 篇 particle product...
  • 50 篇 optimization
  • 46 篇 supersymmetric m...
  • 45 篇 top quark
  • 37 篇 data models
  • 36 篇 quark & gluon je...
  • 35 篇 hadrons
  • 35 篇 security

机构

  • 1,030 篇 yerevan physics ...
  • 916 篇 centro brasileir...
  • 890 篇 charles universi...
  • 887 篇 university of de...
  • 887 篇 department of ph...
  • 872 篇 institute rudjer...
  • 865 篇 university of so...
  • 856 篇 helsinki institu...
  • 851 篇 infn sezione di ...
  • 849 篇 infn sezione di ...
  • 846 篇 irfu cea univers...
  • 843 篇 university of sp...
  • 837 篇 indian institute...
  • 837 篇 university of cy...
  • 829 篇 institute of hig...
  • 827 篇 infn laboratori ...
  • 821 篇 national and kap...
  • 817 篇 universidad san ...
  • 808 篇 rwth aachen univ...
  • 806 篇 ghent university...

作者

  • 631 篇 waltenberger w.
  • 622 篇 lowette s.
  • 569 篇 tavernier s.
  • 542 篇 adam w.
  • 540 篇 lemaitre v.
  • 540 篇 schieck j.
  • 539 篇 skovpen k.
  • 538 篇 tytgat m.
  • 532 篇 sznajder a.
  • 529 篇 tumasyan a.
  • 527 篇 jeitler m.
  • 523 篇 vannerom d.
  • 522 篇 delaere c.
  • 518 篇 giammanco a.
  • 507 篇 carvalho w.
  • 502 篇 van mechelen p.
  • 502 篇 delcourt m.
  • 500 篇 alves g.a.
  • 496 篇 chinellato j.
  • 494 篇 wulz c.-e.

语言

  • 6,004 篇 英文
  • 315 篇 其他
  • 150 篇 中文
  • 3 篇 德文
  • 3 篇 法文
检索条件"机构=the State Key Laboratory of Scientific and Engineering Computing"
6475 条 记 录,以下是441-450 订阅
排序:
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer  21
HDBFuzzer-Target-oriented Hybrid Directed Binary Fuzzer
收藏 引用
5th International Conference on Computer Science and Application engineering, CSAE 2021
作者: Yu, Yingchao Qin, Xiaojun Gan, Shuitao State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China
In this paper, we propose a target-oriented hybrid directed binary fuzzer (HDBFuzzer) to solve the vulnerability confirmation problem based on binary code similarity comparison. HDBFuzzer combines macro function level... 详细信息
来源: 评论
Code Obfuscation Based on Inline Split of Control Flow Graph
Code Obfuscation Based on Inline Split of Control Flow Graph
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Computer Applications, ICAICA 2021
作者: Li, Yang Sha, Zihan Xiong, Xiaobing Zhao, Yuntian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Control flow graph is an important concept in the field of program analysis, which represents the source program in the form of graph. On the control flow graph, we can easily analyze the predecessor and successor rel... 详细信息
来源: 评论
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Classification Scheme Based on Convolution Neural Network and Long Short-Term Memory Network
TCLD-Net: A Transfer Learning Internet Encrypted Traffic Cla...
收藏 引用
2021 IEEE International Conference on Communications, computing, Cybersecurity and Informatics, CCCI 2021
作者: Hu, Xinyi Gu, Chunxiang Chen, Yihang Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The Internet is about to enter the era of full encryption. Traditional traffic classification methods only work well in non-encrypted environments. How to identify the specific types of network encrypted traffic in an... 详细信息
来源: 评论
Inter-domain Link Inference with Confidence Using Naïve Bayes Classifier  2021
Inter-domain Link Inference with Confidence Using Naïve Bay...
收藏 引用
2021 13th International Conference on Machine Learning and computing, ICMLC 2021
作者: Zhao, Yi Liu, Yan Guo, XiaoYu Sui, ZhongHang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Inter-domain link inference is not only important for network security and fault diagnosis, but also helps to conduct research on inter-domain congestion detection and network resilience assessment. Current researches... 详细信息
来源: 评论
Semantic Understanding of Source and Binary Code based on Natural Language Processing  4
Semantic Understanding of Source and Binary Code based on Na...
收藏 引用
4th IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2021
作者: Zhang, Zhongtang Liu, Shengli Yang, Qichao Guo, Shichen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op... 详细信息
来源: 评论
Dynamic Instrumentation Framework Based on Entity Equipment  6
Dynamic Instrumentation Framework Based on Entity Equipment
收藏 引用
6th IEEE International Conference on Computer and Communication Systems, ICCCS 2021
作者: Jiangtao, Zhao Dong, Weiyu Zhang, Haotian Lin, Jian State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Dynamic binary analysis is an important way of program analysis. Most of the existing dynamic analysis tools are based on dynamic binary instrumentation platforms. The existing gdb tool, which is often used for debugg... 详细信息
来源: 评论
WELL-POSEDNESS AND INVARIANT MEASURES FOR THE STOCHASTICALLY PERTURBED LANDAU-LIFSHITZ-BARYAKHTAR EQUATION
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Fan Zhang, Lei Liu, Bin School of Mathematics and Statistics Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Hubei Wuhan430074 China
In this paper, we study the initial-boundary value problem for the stochastic Landau-Lifshitz-Baryakhtar (SLLBar) equation with Stratonovich-type noise in bounded domains O ⊂ Rd, d = 1, 2, 3. Our main results can be b... 详细信息
来源: 评论
A Two Dimensional Feature engineering Method for Relation Extraction  5
A Two Dimensional Feature Engineering Method for Relation Ex...
收藏 引用
5th International Conference on Control, Robotics, and Intelligent System, CCRIS 2024
作者: Wang, Hao Chen, Yanping Yang, Weizhe Lin, Chuan Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry Huaxi District Guizhou China State Key Laboratory of Public Big Data Huaxi District Guizhou China Guizhou University Huaxi District Guizhou China
Transforming a sentence into a 2D representation, similar to table structures, reveals a semantic plane where elements can represent potential relations between paired entities. The 2D representation effectively addre... 详细信息
来源: 评论
Hierarchical vectorization for facial images
收藏 引用
Computational Visual Media 2024年 第1期10卷 97-118页
作者: Qian Fu Linlin Liu Fei Hou Ying He School of Computer Science and Engineering Nanyang Technological University639798SingaporeSingapore Data61 Commonwealth Scientific and Industrial Research OrganisationSydney2015Australia Interdisciplinary Graduate School Nanyang Technological University and Alibaba Group639798SingaporeSingapore State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing100190China University of Chinese Academy of Sciences Beijing100049China
The explosive growth of social media means portrait editing and retouching are in high *** portraits are commonly captured and stored as raster images,editing raster images is non-trivial and requires the user to be h... 详细信息
来源: 评论
Parent-based Powershell Script Fusion Technology
Parent-based Powershell Script Fusion Technology
收藏 引用
2021 International Symposium on Computer Technology and Information Science, ISCTIS 2021
作者: Cheng, Sipeng Sha, Zihan Yu, Pu Bu, Wenjuan Huo, Guovu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses... 详细信息
来源: 评论