咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是121-130 订阅
排序:
OFDM-structure based waveform designs for integrated sensing and communication
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 267-284页
作者: Jiaqi LIU Ping YANG Ke JIANG Jiarong ZHAO Wei XIANG Jianping WEI Ruixiang DUAN Saviour ZAMMIT Tony Q.S.QUEK National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China School of Computing Engineering and Mathematical Sciences La Trobe University Meituan Academy of Robotics Department of Communications and Computer Engineering University of Malta Information Systems Technology and Design Pillar Singapore University of Technology and Design
The future sixth-generation(6G) paradigm aims to seamlessly integrate communication and environmental sensing capabilities into a single radio signal, promising improved efficiency and cost-effectiveness through simul... 详细信息
来源: 评论
Whole-Function Vectorization Based on Simplified Openmp Directives
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Lili Yao, Jinyang Li, Yingying Zhang, Ping Xu, Jinlong Zhao, Bo Shan, Zheng State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
With the continuous development of computing technology, an increasing number of vendors have integrated SIMD extension components into processors. These components can accelerate program execution efficiency and have... 详细信息
来源: 评论
An Abnormal Domain Name Generation Method Based on a Character-Level Model  22
An Abnormal Domain Name Generation Method Based on a Charact...
收藏 引用
Proceedings of the 2022 4th International Conference on Robotics, Intelligent Control and Artificial Intelligence
作者: Chunbing Wu Jinlong Fei State Key Laboratory of Mathematical Engineering and Advanced Computing China
Internet technology develops by leaps and bounds, new types of botnet attacks are springing up. Currently, most malware are stealthy when implementing attacks since they can bypass detection strategies such as blackli...
来源: 评论
Automatically Generating High-performance Matrix Multiplication Kernels on the Latest Sunway Processor  22
Automatically Generating High-performance Matrix Multiplicat...
收藏 引用
Proceedings of the 51st International Conference on Parallel Processing
作者: Xiaohan Tao Yu Zhu Boyang Wang Jinlong Xu Jianmin Pang Jie Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing China
We present an approach to the automatic generation of efficient matrix multiplication code on the latest Sunway processor, which will be employed by the next-generation machine of Sunway TaihuLight, one of the fastest... 详细信息
来源: 评论
Searching for similar binary code based on the influence of basic block vertex  3
Searching for similar binary code based on the influence of ...
收藏 引用
2021年第三届先进计算机技术、信息科学与通信国际会议(CTISC2021)
作者: Xiaodong Zhu Liehui Jiang Zeng Chen Lin Yan State key laboratory of mathematical engineering and advanced computing
Binary code similarity detection(BCSD) has many security applications and has attracted a lot of focus. But existing solutions for BCSD problems mainly focus on comparing the similarity between two binary functions an... 详细信息
来源: 评论
Accelerating Command Injection Vulnerability Discovery in Embedded Firmware with Static Backtracking Analysis  22
Accelerating Command Injection Vulnerability Discovery in Em...
收藏 引用
Proceedings of the 12th International Conference on the Internet of Things
作者: Xiaokang Yin Ruijie Cai Yizheng Zhang Lukai Li Qichao Yang Shengli Liu State Key Laboratory of Mathematical Engineering and Advanced Computing China
Command injection vulnerability is a severe threat to the embedded device. Most methods detect command injection vulnerability with taint analysis and symbolic execution and achieve promising results. However, they wa... 详细信息
来源: 评论
The convergence properties of infeasible inexact proximal alternating linearized minimization
收藏 引用
Science China Mathematics 2023年 第10期66卷 2385-2410页
作者: Yukuan Hu Xin Liu State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China
The proximal alternating linearized minimization(PALM)method suits well for solving blockstructured optimization problems,which are ubiquitous in real *** the cases where subproblems do not have closed-form solutions,... 详细信息
来源: 评论
Passive on-chip isolators based on the thin-film lithium niobate platform
收藏 引用
Chinese Physics B 2025年 第3期34卷 408-413页
作者: Jiacheng Liu Gongyu Xia Qilin Hong Pingyu Zhu Kai-Kai Zhang keyu Xia Ping Xu Shiqiao Qin Zhihong Zhu College of Advanced Interdisciplinary Studies&Hunan Provincial Key Laboratory of Novel Nano Optoelectronic Information Materials and Devices National University of Defense TechnologyChangsha 410073China Institute for Quantum Information and State Key Laboratory of High-Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China College of Engineering and Applied Sciences National Laboratory of Solid State Microstructuresand Collaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210023China
Optical isolators,the photonic analogs of electronic diodes,are essential for ensuring the unidirectional flow of light in optical systems,thereby mitigating the destabilizing effects of back ***-film lithium niobate(... 详细信息
来源: 评论
A Honeywords Generation Method Based on Deep Learning and Rule-Based Password Attack  4th
A Honeywords Generation Method Based on Deep Learning and Ru...
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Yang, Kunyu Hu, Xuexian Zhang, Qihui Wei, Jianghong Liu, Wenfen State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Guilin University of Electronic Technology Guilin China
Honeywords is a simple and efficient method that can help the authentication server to detect password leaks. The indistinguishability between generated honeywords and real passwords is the key to the honeywords gener... 详细信息
来源: 评论
Improving Performance of Virtual Machine Covert Timing Channel Through Optimized Run-Length Encoding
收藏 引用
Journal of Computer Science & Technology 2023年 第4期38卷 793-806页
作者: 王翀 陈荣亮 古亮 Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Sangfor Technologies Inc. Shenzhen 518055China Shenzhen Key Laboratory for Exascale Engineering and Scientific Computing Shenzhen 518055China
With its wider acceptability,cloud can host a diverse set of data and applications ranging from entertainment to personal to *** foundation of cloud computing is based on virtual machines where boundaries among the a... 详细信息
来源: 评论