咨询与建议

限定检索结果

文献类型

  • 1,040 篇 期刊文献
  • 860 篇 会议
  • 1 册 图书

馆藏范围

  • 1,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,202 篇 工学
    • 685 篇 计算机科学与技术...
    • 556 篇 软件工程
    • 169 篇 电子科学与技术(可...
    • 168 篇 信息与通信工程
    • 164 篇 电气工程
    • 114 篇 控制科学与工程
    • 114 篇 化学工程与技术
    • 94 篇 生物工程
    • 91 篇 光学工程
    • 90 篇 材料科学与工程(可...
    • 75 篇 网络空间安全
    • 61 篇 机械工程
    • 55 篇 仪器科学与技术
    • 51 篇 力学(可授工学、理...
    • 49 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 35 篇 冶金工程
    • 34 篇 核科学与技术
  • 983 篇 理学
    • 536 篇 物理学
    • 381 篇 数学
    • 122 篇 统计学(可授理学、...
    • 116 篇 化学
    • 112 篇 生物学
    • 76 篇 地球物理学
    • 57 篇 系统科学
  • 212 篇 管理学
    • 135 篇 管理科学与工程(可...
    • 83 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 38 篇 医学
    • 33 篇 临床医学
  • 37 篇 法学
    • 31 篇 社会学
  • 16 篇 经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 1 篇 艺术学

主题

  • 38 篇 feature extracti...
  • 35 篇 semantics
  • 34 篇 deep learning
  • 28 篇 machine learning
  • 28 篇 network security
  • 28 篇 training
  • 27 篇 cosmic rays
  • 26 篇 security
  • 23 篇 software
  • 21 篇 malware
  • 21 篇 cryptography
  • 20 篇 gamma rays
  • 17 篇 optimization
  • 17 篇 data models
  • 16 篇 computational mo...
  • 16 篇 algorithm design...
  • 14 篇 network topology
  • 14 篇 topology
  • 13 篇 data mining
  • 12 篇 computer archite...

机构

  • 613 篇 state key labora...
  • 105 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 91 篇 university of ch...
  • 86 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 college of physi...
  • 77 篇 school of physic...
  • 76 篇 institute of fro...
  • 76 篇 school of physic...
  • 76 篇 moscow institute...
  • 75 篇 national space s...
  • 73 篇 school of astron...
  • 66 篇 national astrono...
  • 66 篇 department of en...

作者

  • 80 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 danzengluobu
  • 70 篇 liu d.
  • 69 篇 kuleshov d.
  • 67 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 65 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 liu b.
  • 64 篇 hu h.b.
  • 61 篇 min z.
  • 59 篇 qin j.j.

语言

  • 1,802 篇 英文
  • 59 篇 其他
  • 43 篇 中文
检索条件"机构=China State Key Laboratory of Mathematical Engineering and Advanced Computing"
1901 条 记 录,以下是31-40 订阅
排序:
Methods for solving equations with errors based on the HHL algorithm
收藏 引用
The Journal of china Universities of Posts and Telecommunications 2022年 第4期29卷 9-20页
作者: LüLihui Wang Hong Ma Zhi Duan Qianheng Fei Yangyang Meng Xiangdong State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Di... 详细信息
来源: 评论
A Network Deception Defense Mechanism Based on Virtual Topology Generation
A Network Deception Defense Mechanism Based on Virtual Topol...
收藏 引用
2023 International Conference on Intelligent Systems, Communications, and Computer Networks, ISCCN 2023
作者: Wang, Binghui Lu, Bin State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
To address the problem that traditional network defense techniques are difficult to cope with scanning attacks launched by internal attackers, this paper proposes a Virtual Network Topology Deception Defense mechanism... 详细信息
来源: 评论
Towards optimized tensor code generation for deep learning on sunway many-core processor
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 1-15页
作者: Mingzhen LI Changxi LIU Jianjin LIAO Xuegui ZHENG Hailong YANG Rujun SUN Jun XU Lin GAN Guangwen YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China National University of Singapore Singapore 119077Singapore State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214000China Science and Technology on Special System Simulation Laboratory Beijing Simulation Center Beijing 100854China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing dee... 详细信息
来源: 评论
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing  23
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
23rd IEEE International Conference on Software Quality, Reliability, and Security, QRS 2023
作者: Li, Shun-Hang Zhou, Gang Li, Zhi-Bo Lu, Ji-Cang Huang, Ning-Bo State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod... 详细信息
来源: 评论
Network traffic classification based on multi-head attention and deep metric learning  8
Network traffic classification based on multi-head attention...
收藏 引用
8th International Conference on Electronic Technology and Information Science, ICETIS 2023
作者: Lv, Zhuo Lu, Bin Li, Xue Qi, Zan State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Information Engineering University Zhengzhou China
Network traffic classification plays an important role in network resource management and security. The application of encryption techniques and the rapid increase in the size of network traffic have placed higher dem... 详细信息
来源: 评论
Resolving Anonymous Nodes Based on "Watermelon Patterns" Towards Constructing Router-Level Topology in Mesh Network  29th
Resolving Anonymous Nodes Based on "Watermelon Patterns" Tow...
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Li, Ruixiang Feng, Xinzhu Liu, Chong Yuan, Fuxiang Ding, Shichang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China Sichuan University Chengdu China
Router-level topology, portraying the connection relationship between network devices, is important for discovering key devices in network. In actual networks, there are some anonymous routers, which do not respond tr... 详细信息
来源: 评论
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions  25th
Towards Efficient and Privacy-Preserving Anomaly Detection ...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Song, Yuhan Zhu, Yuefei Wei, Fushan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
In recent years, a growing number of breaches targeting cryptocurrency exchanges have damaged the credibility of the entire cryptocurrency ecosystem. To prevent further harm, it’s crucial to detect the anomalous beha... 详细信息
来源: 评论
Stance Detection for Social Text: Inference-Enhanced Multi-Task Learning with Machine-Annotated Supervision
Stance Detection for Social Text: Inference-Enhanced Multi-T...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Pi, Qiankun Lu, Jicang Sun, Yepeng Fan, Qinlong Zhou, Xukun Shang, Shouxin State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou China School of Information Renmin University of China Beijing China
Stance detection, a natural language processing technique, captures user attitudes on controversial social media topics. However, the semantic ambiguity of social texts makes accurate stance determination challenging.... 详细信息
来源: 评论
LENSER: A Channel state Information Based Indoor Localization Scheme for Malicious Devices  20
LENSER: A Channel State Information Based Indoor Localizatio...
收藏 引用
20th IEEE International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023
作者: Ma, Yongqiang Luo, Xiangyang Li, Ruixiang Du, Shaoyong Liu, Wenyan State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou China
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to e... 详细信息
来源: 评论
An Opposition-Based Learning Adaptive Chaotic Particle Swarm Optimization Algorithm
收藏 引用
Journal of Bionic engineering 2024年 第6期21卷 3076-3097页
作者: Chongyang Jiao Kunjie Yu Qinglei Zhou State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering UniversityZhengzhou450001China Henan Information Engineering School Zhengzhou Vocational College of Industrial SafetyZhengzhou450000China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou450001China School of Computer and Artificial Intelligence Zhengzhou UniversityZhengzhou450001China
To solve the shortcomings of Particle Swarm Optimization(PSO)algorithm,local optimization and slow convergence,an Opposition-based Learning Adaptive Chaotic PSO(LCPSO)algorithm was *** chaotic elite opposition-based l... 详细信息
来源: 评论