咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是91-100 订阅
排序:
Weakly supervised action anticipation without object annotations
收藏 引用
Frontiers of Computer Science 2023年 第2期17卷 101-110页
作者: Yi ZHONG Jia-Hui PAN Haoxin LI Wei-Shi ZHENG School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 510006China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of EducationGuangzhou 510006China
Anticipating future actions without observing any partial videos of future actions plays an important role in action prediction and is also a challenging *** obtain abundant information for action anticipation,some me... 详细信息
来源: 评论
Path test data generation using adaptive simulated annealing particle swarm optimization
收藏 引用
Soft computing 2024年 第17-18期28卷 9587-9607页
作者: Jiao, Chongyang Zhou, Qinglei State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China Henan Information Engineering School Zhengzhou Vocational College of Industrial Safety Zhengzhou450000 China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou450001 China
Software testing is an effective means of ensuring software quality. The cost of software testing is the main component of the total cost of software development. The generation of test data is very important in testi... 详细信息
来源: 评论
Highly efficient and stable electrocatalyst for hydrogen evolution by molybdenum doped Ni-Co phosphide nanoneedles at high current density
收藏 引用
Nano Research 2024年 第3期17卷 1066-1074页
作者: Chengyu Huang Zhonghong Xia Jing Wang Jing Zhang Chenfei Zhao Xingli Zou Shichun Mu Jiujun Zhang Xionggang Lu Hong Jin Fan Shengjuan Huo Yufeng Zhao College of Sciences&Institute for Sustainable Energy Shanghai UniversityShanghai 200444China State Key Laboratory of Metastable Materials Science and Technology Hebei Key Laboratory of Heavy Metal Deep-Remediation in Water and Resource ReuseYanshan UniversityQinhuangdao 066004China State Key Laboratory of Advanced Special Steel and Shanghai Key Laboratory of Advanced Ferrometallurgy School of Materials Science and EngineeringShanghai UniversityShanghai 200444China State Key Laboratory of Advanced Technology for Materials Synthesis and Processing Wuhan University of TechnologyWuhan 430070China School of Physical and Mathematical Sciences Nanyang Technological UniversitySingapore639798
There is an increasingly urgent need to develop cost-effective electrocatalysts with high catalytic activity and stability as alternatives to the traditional Pt/C in catalysts in water *** this study,microspheres comp... 详细信息
来源: 评论
Research on Web application injection vulnerabilities detection method based on pattern matching
Research on Web application injection vulnerabilities detect...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Ma, Qican Wu, Zehui Wang, Xinlei Wei, Qiang State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
Attackers can exploit vulnerabilities in web applications to commit malicious acts such as corrupting application functionality and Trojan horse implantation. For injection vulnerabilities in Web applications, existin... 详细信息
来源: 评论
Automated Quantum Volume Test  2
Automated Quantum Volume Test
收藏 引用
2022 2nd International Conference on Electronics, Circuits and Information engineering, ECIE 2022
作者: Liu, Xiaonan He, Ming Wang, Junchao Xie, Haoshan Zhao, Chenyan Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As a benchmark for the overall performance of quantum computers, quantum volume has the advantage of being able to reflect the depth of running quantum circuits. But, the quantum volume test code provided by IBM needs... 详细信息
来源: 评论
A HIGH ORDER SCHEME FOR FRACTIONAL DIFFERENTIAL EQUATIONS WITH THE CAPUTO-HADAMARD DERIVATIVE
收藏 引用
Journal of Computational Mathematics 2025年 第3期43卷 615-640页
作者: Xingyang Ye Junying Cao Chuanju Xu School of Science Jimei UniversityXiamen 361021China School of Data Science and Information Engineering Guizhou Minzu UniversityGuiyang 550025China School of Mathematical Sciences and Fujian Provincial Key Laboratory of Mathematical Modeling and High Performance Scientific Computing Xiamen UniversityXiamen 361005China
In this paper,we consider numerical solutions of the fractional diffusion equation with theαorder time fractional derivative defined in the Caputo-Hadamard sense.A high order time-stepping scheme is constructed,analy... 详细信息
来源: 评论
A Vulnerability Automation Exploitation Method Based on Symbolic Execution
A Vulnerability Automation Exploitation Method Based on Symb...
收藏 引用
2023 International Conference on Electronic Information engineering and Data Processing, EIEDP 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information service room Unit 32738 China
With increasing number of software vulnerabilities, the quantity of attacks utilizing malicious samples is also on rise, leading to intensified adversarial competition. In particular, the application of automatic vuln... 详细信息
来源: 评论
Cathodic electrolyte engineering toward durable Zn–Mn aqueous batteries
收藏 引用
National Science Review 2023年 第12期10卷 42-44页
作者: Wanhai Zhou Hong Jin Fan Dongyuan Zhao Dongliang Chao Laboratory of Advanced Materials Shanghai Key Laboratory of Molecular Catalysis and Innovative Materials State Key Laboratory of Molecular Engineering of Polymers College of Chemistry and Materials Fudan University School of Physical and Mathematical Sciences Nanyang Technological University
Zn–Mn aqueous batteries (ZMABs)present potential for grid-scale energy storage with the benefits of low cost,high safety and eco-friendliness [1].Since 1866 (Leclanchéwet cell), we have witnessed the prosperity ...
来源: 评论
A Survey of Automatic Exploitation of Binary Vulnerabilities
A Survey of Automatic Exploitation of Binary Vulnerabilities
收藏 引用
2023 International Conference on Computer Network Security and Software engineering, CNSSE 2023
作者: Ge, Xueshuai Liu, Tieming Xie, Yaobin Zhang, Yuanyuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The mining and exploitation of security vulnerabilities have always been the focus of offensive and defensive confrontations. In recent years, with the application of technologies such as fuzzing in vulnerability mini... 详细信息
来源: 评论
IoT Device Multi-Classification Using Traffic Behavior Analysis  3
IoT Device Multi-Classification Using Traffic Behavior Analy...
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Shi, Jiaqi Liu, Tieming Zhang, Yuanyuan Ren, Huajuan Cyberspace Security Department State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Service Room Unit 32738 China
The management of Internet of Things (IoT) devices is becoming increasingly complex. One of the reasons is that IoT device manufacturers are different, and there are different degrees of heterogeneity in service, tech... 详细信息
来源: 评论