咨询与建议

限定检索结果

文献类型

  • 737,088 篇 期刊文献
  • 6,648 篇 会议
  • 25 篇 学位论文
  • 4 册 图书

馆藏范围

  • 743,763 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 350,712 篇 工学
    • 45,646 篇 材料科学与工程(可...
    • 36,084 篇 化学工程与技术
    • 35,795 篇 机械工程
    • 30,257 篇 计算机科学与技术...
    • 23,390 篇 软件工程
    • 22,037 篇 电气工程
    • 20,225 篇 土木工程
    • 19,579 篇 仪器科学与技术
    • 17,672 篇 控制科学与工程
    • 17,116 篇 动力工程及工程热...
    • 16,727 篇 电子科学与技术(可...
    • 16,178 篇 交通运输工程
    • 15,363 篇 环境科学与工程(可...
    • 15,332 篇 水利工程
    • 12,966 篇 地质资源与地质工...
  • 208,131 篇 医学
    • 118,439 篇 临床医学
    • 27,392 篇 中西医结合
    • 20,874 篇 公共卫生与预防医...
    • 20,046 篇 药学(可授医学、理...
    • 14,891 篇 医学技术(可授医学...
    • 14,354 篇 基础医学(可授医学...
    • 13,922 篇 中药学(可授医学、...
  • 89,638 篇 理学
    • 20,224 篇 化学
    • 16,771 篇 生物学
  • 67,864 篇 农学
    • 17,577 篇 作物学
    • 14,892 篇 农业资源与环境
  • 60,688 篇 管理学
    • 25,755 篇 管理科学与工程(可...
    • 19,513 篇 公共管理
  • 36,343 篇 教育学
    • 28,876 篇 教育学
  • 25,494 篇 经济学
    • 22,209 篇 应用经济学
  • 18,575 篇 法学
  • 12,321 篇 文学
  • 6,347 篇 艺术学
  • 4,629 篇 历史学
  • 2,975 篇 哲学
  • 2,702 篇 军事学

主题

  • 4,798 篇 数值模拟
  • 4,574 篇 影响因素
  • 3,527 篇 预后
  • 3,110 篇 应用
  • 3,070 篇 儿童
  • 2,587 篇 力学性能
  • 2,503 篇 危险因素
  • 2,351 篇 诊断
  • 2,300 篇 对策
  • 2,204 篇 产量
  • 2,149 篇 大鼠
  • 2,061 篇 治疗
  • 1,942 篇 教学改革
  • 1,919 篇 合成
  • 1,829 篇 中国
  • 1,813 篇 糖尿病
  • 1,809 篇 稳定性
  • 1,762 篇 磁共振成像
  • 1,643 篇 综述
  • 1,593 篇 meta分析

机构

  • 6,106 篇 浙江大学
  • 5,718 篇 武汉大学
  • 5,686 篇 上海交通大学
  • 5,539 篇 中南大学
  • 4,944 篇 华中科技大学
  • 4,633 篇 清华大学
  • 4,571 篇 中国科学院大学
  • 4,478 篇 四川大学
  • 4,027 篇 同济大学
  • 3,945 篇 中国地质大学
  • 3,807 篇 武汉理工大学
  • 3,640 篇 北京大学
  • 3,621 篇 华南理工大学
  • 3,562 篇 合肥工业大学
  • 3,433 篇 重庆大学
  • 3,295 篇 东南大学
  • 3,145 篇 西北农林科技大学
  • 3,082 篇 南昌大学
  • 3,067 篇 中国矿业大学
  • 3,049 篇 复旦大学

作者

  • 3,627 篇 胡伟
  • 3,416 篇 胡斌
  • 2,946 篇 胡敏
  • 2,887 篇 胡静
  • 2,805 篇 胡勇
  • 2,636 篇 胡波
  • 2,225 篇 胡军
  • 2,023 篇 胡涛
  • 1,929 篇 胡鹏
  • 1,882 篇 王虎
  • 1,880 篇 胡杰
  • 1,581 篇 胡俊
  • 1,555 篇 胡蓉
  • 1,517 篇 张虎
  • 1,515 篇 胡健
  • 1,501 篇 胡平
  • 1,450 篇 胡明
  • 1,366 篇 李虎
  • 1,250 篇 胡浩
  • 1,207 篇 胡燕

语言

  • 704,242 篇 中文
  • 39,502 篇 英文
  • 19 篇 日文
检索条件"作者=hu ChangZhen"
743765 条 记 录,以下是1-10 订阅
排序:
Calculation of the Behavior Utility of a Network System: Conception and Principle
收藏 引用
Engineering 2018年 第1期4卷 78-84页
作者: changzhen hu Beijing Key Laboratory of Software Security Engineering Technology School of Software Beijing Institute of Technology Beijing 100081 China
The service and application of a network is a behavioral process that is oriented toward its operations and tasks, whose metrics and evaluation are still somewhat of a rough comparison, This paper describes sce- nes o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Study on complicated solid modeling and Cartesian grid generation method
收藏 引用
Science China(Technological Sciences) 2014年 第3期57卷 630-636页
作者: QIN Qiang hu changzhen MA TianBao School of Computer Science and Technology Beijing Institute of Technology School of Software Beijing Institute of Technology State Key Laboratory of Explosion Science and Technology Beijing Institute of Technology
A Cartesian grid generation method is developed in this *** kinds of solid modeling methods,CSG and STL models,are used for complicated solid *** staircase boundary approximation is implemented to handle irregular geo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Concurrent Security Monitoring Method for Virtualization Environments
收藏 引用
China Communications 2016年 第1期13卷 113-123页
作者: TIAN Donghai JIA Xiaoqi CHEN Junhua hu changzhen Beijing Key Laboratory of Software Security Engineering Technique School of SoftwareBeijing Institute of Technology State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Key Laboratory of IOT Application Technology of Universities in Yunnan Province Yunnan Minzu University
Recently,virtualization technologies have been widely used in *** order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Improved ID-Based Group Key Agreement Protocol
收藏 引用
Tsinghua Science and Technology 2014年 第5期19卷 421-428页
作者: Kangwen hu Jingfeng Xue changzhen hu Rui Ma Zhiqiang Li School of Software Beijing Institute of Technology
ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Semi-valid Fuzz Testing Case Generation for Stateful Network Protocol
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 458-468页
作者: Rui Ma Shuaimin Ren Ke Ma changzhen hu Jingfeng Xue the Beiiing Key Laboratory of Software Security Engineering Technology School of SoftwareBeijing Institute of TechnologyBering 100081China the Internet Center Institute of Communication Standard Research.China Academy of Information and Communication TechnologyBering 100191China
Network protocols are divided into stateless and stateful. Stateful network protocols have complex communication interactions and state transitions. However, the existing network protocol fuzzing does not support stat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Test Data Generation for Stateful Network Protocol Fuzzing Using a Rule-Based State Machine
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 352-360页
作者: Rui Ma Daguang Wang changzhen hu Wendong Ji Jingfeng Xue Beijing Key Laboratory of Software Security Engineering Technology School of Software Beijing Institute of Technology
To improve the efficiency and coverage of stateful network protocol fuzzing, this paper proposes a new method, using a rule-based state machine and a stateful rule tree to guide the generation of fuzz testing data. Th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI hua SHAN Chun hu changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Software System Evolution Analysis Method Based on Algebraic Topology
收藏 引用
Tsinghua Science and Technology 2018年 第5期23卷 599-609页
作者: Chun Shan Liyuan Liu Jingfeng Xue changzhen hu Hongjin Zhu School of Software Beijing Institute of Technology Beijing 100081 China
The analysis of software system evolution is highly significant in software research as the evolution runs throughout the lifecycle of a software system. Considering a software system as an algebraic engineering syste... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules
收藏 引用
China Communications 2016年 第11期13卷 143-152页
作者: Donghai Tian Xiaoqi Jia Junhua Chen changzhen hu Jingfeng Xue Beijing Key Laboratory of Software Security Engineering Technique School of SoftwareBeijing Institute of Technology Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai Jiao Tong University State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences & University of Chinese Academy of Sciences Key Laboratory of IOT Application Technology of Universities in Yunnan Province Yunnan Minzu University
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Software Defect Distribution Prediction Model Based on NPE-SVM
收藏 引用
China Communications 2018年 第5期15卷 173-182页
作者: hua Wei Chun Shan changzhen hu huizhong Sun Min Lei School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China China Information Technology Security Evaluation Center Beijing 100085China Beijing Key Laboratory of Software Security Engineering Technology School of SoftwareBeijing Institute of TechnologyBeijing 100081China Information Security Center Beijing University of Posts and TelecommunicationsBeijing 100876China Guizhou University Guizhou Provincial Key Laboratory of Public Big DataGuizhou Guiyang 550025China
During the prediction of software defect distribution, the data redundancy caused by the multi-dimensional measurement will lead to the decrease of prediction accuracy. In order to solve this problem, this paper propo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论