×
验证码:
换一张
忘记密码?
记住我
×
统一认证登录
登录
中文版
|
English
上海科技大学知识管理系统
ShanghaiTech University Knowledge Management System
统一认证登录
登录
注册
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
DOI
出处
存缴日期
收录类别
出版者
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
知识整合
学习讨论厅
在结果中检索
研究单元&专题
信息科学与技术学院 [20]
物质科学与技术学院 [6]
生命科学与技术学院 [6]
免疫化学研究所 [2]
创意与艺术学院 [2]
更多...
作者
宋富 [3]
耿浩 [3]
江玉海 [1]
叶阳 [1]
吴晶 [1]
杨智策 [1]
更多...
文献类型
期刊论文 [20]
会议论文 [13]
发表日期
2025 [7]
2024 [9]
2023 [5]
2022 [4]
2021 [4]
2020 [2]
更多...
出处
JOURNAL OF... [2]
2019 INTER... [1]
2020 45TH ... [1]
2024 IEEE ... [1]
2025 IEEE/... [1]
ACM TRANSA... [1]
更多...
语种
英语 [32]
中文 [1]
资助项目
CAS Interd... [1]
CAS Projec... [1]
China Agri... [1]
China Post... [1]
DICP Innov... [1]
Dalian Out... [1]
更多...
资助机构
收录类别
EI [30]
SCI [14]
CPCI-S [6]
SCIE [5]
CPCI [4]
ESCI [1]
更多...
状态
已发表 [32]
×
知识图谱
KMS
反馈留言
浏览/检索结果:
共33条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
Significantly enhanced capture efficiency of cell-imprinted material for circulating tumor cells via a flexible and ultra-strong double-armed phenylboronic acid design
期刊论文
BIOMATERIALS, 2025, 卷号: 322
作者:
Sun, Wenjing
;
Zhao, Xinmiao
;
Zhao, Xinjia
;
Meng, Lingkai
;
Tang, Mingliang
Adobe PDF(5815Kb)
|
收藏
|
浏览/下载:15/0
|
提交时间:2025/05/30
Binding sites
Bond strength (chemical)
Cell adhesion
Cell culture
Cells
Covalent bonds
Hydrogen bonds
Proteomics
Biointerfaces
Capture efficiency
Cell viability
Circulating tumour cells
Detection tools
Essential detection
Glycans
Imprinted materials
Phenylboronic acids
Single cells analysis
Manifold-valued models for analysis of EEG time series data
期刊论文
COMPUTATIONAL STATISTICS AND DATA ANALYSIS, 2025, 卷号: 209
作者:
Ding, Tao
;
Nye, Tom M.W.
;
Wang, Yujiang
Adobe PDF(4588Kb)
|
收藏
|
浏览/下载:48/1
|
提交时间:2025/04/11
Electrocardiography
Gaussian noise (electronic)
Matrix algebra
Maximum likelihood estimation
Time series
Time series analysis
Vector spaces
Auto-regressive
Brain electrical activity
Clinical tools
Covariance matrices
Mean-reversion
Modeling results
Neuroscience
Riemannian manifold
Time-series data
Times series
Artemis: Toward Accurate Detection of Server-Side Request Forgeries through LLM-Assisted Inter-procedural Path-Sensitive Taint Analysis
期刊论文
PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES, 2025, 卷号: 9, 期号: 1
作者:
Ji, Yuchen
;
Dai, Ting
;
Zhou, Zhichao
;
Tang, Yutian
Adobe PDF(967Kb)
|
收藏
|
浏览/下载:5/1
|
提交时间:2025/05/30
ARTEMIS
False positive
Inter-procedural
Path sensitives
PHP
PHP web applications
Server sides
Server-side request forgery
Static tools
Taint analyze
RankTuner: When Design Tool Parameter Tuning Meets Preference Bayesian Optimization
会议论文
IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, DIGEST OF TECHNICAL PAPERS, ICCAD, Newark Liberty International Airport, 1 Hotel Rd, New York, NY, United states, October 27, 2024 - October 31, 2024
作者:
Xu, Peng
;
Zheng, Su
;
Ye, Yuyang
;
Bai, Chen
;
Xu, Siyuan
Adobe PDF(1846Kb)
|
收藏
|
浏览/下载:9/1
|
提交时间:2025/05/30
Computer aided logic design
Bayesian optimization
Design tool
Electronic design automation tools
Feature interactions
Machine learning methods
Parameters tuning
Search spaces
Statistical learning methods
Tool parameter
Verylarge-scale integrations (VLSI)
Specific and efficient RNA A-to-I editing through cleavage of an ADAR inhibitor
期刊论文
NATURE BIOTECHNOLOGY, 2025
作者:
Guangye Li
;
Guo Chen
;
Guo-Hua Yuan
;
Jia Wei
;
Qingyang Ni
Adobe PDF(11217Kb)
|
收藏
|
浏览/下载:109/7
|
提交时间:2025/03/27
Adeno-associated virus
Adenosine deaminases
Ectopic expressions
Editing systems
Editing tools
High specificity
RNA editing
Target sites
MLLM-Tool: A Multimodal Large Language Model for Tool Agent Learning
会议论文
2025 IEEE/CVF WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV), Tucson, AZ, USA, 26 Feb.-6 March 2025
作者:
Chenyu Wang
;
Weixin Luo
;
Sixun Dong
;
Xiaohua Xuan
;
Zhengxin Li
Adobe PDF(2982Kb)
|
收藏
|
浏览/下载:34/4
|
提交时间:2025/04/14
Agent learning
Agent systems
Application scenario
External tools
Language comprehensions
Language generation
Language model
Multi-modal
Natural languages
Performance
Compositional Verification of Cryptographic Circuits Against Fault Injection Attacks
会议论文
FORMAL METHODS, PT II, FM 2024, null,Milan,ITALY, SEP 09-13, 2024
作者:
Tan, Huiyu
;
Yang, Xi
;
Song, Fu
;
Chen, Taolue
;
Wu, Zhilin
Adobe PDF(595Kb)
|
收藏
|
浏览/下载:351/1
|
提交时间:2024/10/11
Benchmarking
Boolean functions
Open source software
Compositional verification
Cryptographic algorithms
CryptoGraphics
Design and implementations
Error prones
Fault injection attacks
Hardware implementations
Open source tools
Physical attacks
Sub-circuits
Detecting Malicious Accounts in Web3 through Transaction Graph
会议论文
PROCEEDINGS - 2024 39TH ACM/IEEE INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, ASE 2024, Sacramento, CA, United states, October 28, 2024 - November 1, 2024
作者:
Li, Wenkai
;
Liu, Zhijie
;
Li, Xiaoqi
;
Nie, Sen
Adobe PDF(98Kb)
|
收藏
|
浏览/下载:152/30
|
提交时间:2024/12/27
Anonymity
'current
Deep learning
Detection tools
Graph features
Large-scale transactions
Malicious account
Phishing
Sampling algorithm
Transaction graph
Web3 scam
CLAY: A Controllable Large-scale Generative Model for Creating High-quality 3D Assets
期刊论文
ACM TRANSACTIONS ON GRAPHICS, 2024, 卷号: 43, 期号: 4
作者:
Zhang, Longwen
;
Wang, Ziyu
;
Zhang, Qixuan
;
Qiu, Qiwei
;
Pang, Anqi
Adobe PDF(21021Kb)
|
收藏
|
浏览/下载:509/98
|
提交时间:2024/08/09
3D modeling
Diffusion
Digital devices
Geometry
Interactive computer graphics
Large datasets
Rendering (computer graphics)
Three dimensional computer graphics
3d asset generation
3D geometry
Diffusion transformer
Digital tools
Generative model
High quality
Large-scale modeling
Large-scales
Multi modal control
Physically based rendering
Enforcing End-to-end Security for Remote Conference Applications
会议论文
2024 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), San Francisco, CA, USA, 19-23 May 2024
作者:
Yuelin Liu
;
Huangxun Chen
;
Zhice Yang
Adobe PDF(3697Kb)
|
收藏
|
浏览/下载:270/2
|
提交时间:2024/09/18
Anonymity
Audio streaming
Cryptography
Data privacy
Differential privacy
Audio videos
Data encryption
Dial-in
E2EE
Encryption methods
End-to-end security
Privacy
Privacy breaches
Production tools
Remote conference
首页
上一页
1
2
3
4
下一页
末页