咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是131-140 订阅
排序:
A Domain Decomposition Method for Nonconforming Finite Element Approximations of Eigenvalue Problems
收藏 引用
Communications on Applied Mathematics and Computation 2025年 第2期7卷 606-636页
作者: Qigang Liang Wei Wang Xuejun Xu School of Mathematical Science Tongji UniversityShanghai200092China Key Laboratory of Intelligent Computing and Applications(Tongji University) Ministry of EducationShanghai200092China LSEC Institute of Computational Mathematics and Scientific/Engineering ComputingAcademy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing100190China
Since the nonconforming finite elements(NFEs)play a significant role in approximating PDE eigenvalues from below,this paper develops a new and parallel two-level preconditioned Jacobi-Davidson(PJD)method for solving t... 详细信息
来源: 评论
A New Sixth-Order WENO Scheme for Solving Hyperbolic Conservation Laws
收藏 引用
Communications on Applied Mathematics and Computation 2023年 第1期5卷 3-30页
作者: Kunlei Zhao Yulong Du Li Yuan State Key Laboratory of Scientific and Engineering Computing(LSEC)and Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100190China School of Mathematical Sciences Beihang UniversityBeijing 100191China
In this paper,we develop a new sixth-order WENO scheme by adopting a convex combina-tion of a sixth-order global reconstruction and four low-order local *** the classical WENO schemes,the associated linear weights of ... 详细信息
来源: 评论
Few-shot image recognition based on multi-scale features prototypical network
收藏 引用
High Technology Letters 2024年 第3期30卷 280-289页
作者: LIU Jiatong DUAN Yong School of Information Science Engineering Shenyang University of TechnologyShenyang 110870P.R.China Shenyang Key Laboratory of Advanced Computing and Application Innovation Shenyang 110870P.R.China
In order to improve the model􀆳s capability in expressing features during few-shot learning,a multi-scale features prototypical network(MS-PN)algorithm is *** metric learning algo-rithm is employed to extract ... 详细信息
来源: 评论
A Further Understanding of Differential-Linear Cryptanalysis
收藏 引用
Chinese Journal of Electronics 2020年 第4期29卷 660-666页
作者: REN Jiongjiong CHEN Shaozhen State Key Laboratory of Mathematical Engineering and Advanced Computing State Key Laboratory of Cryptology
Differential-linear cryptanalysis has attracted much attention since proposed to attack DES in 1994, and then some generalized theories are developed to complement and unify the ***, the links between differential-lin... 详细信息
来源: 评论
The spectrum and stability of travelling pulses in a coupled FitzHugh-Nagumo equation
收藏 引用
Science China Mathematics 2024年 第5期67卷 975-1010页
作者: Qi Qiao Xiang Zhang School of Mathematical Sciences Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory of Scientific and Engineering Computing(Ministry of Education) and Shanghai Frontier Science Center of Modern Analysis(CMA-Shanghai)Shanghai Jiao Tong UniversityShanghai 200240China
For a coupled slow-fast FitzHugh-Nagumo(FHN)equation derived from a reaction-diffusionmechanics(RDM)model,Holzer et al.(2013)studied the existence and stability of the travelling pulse,which consists of two fast orbit... 详细信息
来源: 评论
An Encoded Double Auxiliary Pilot Channel Estimation Method for Intrinsic Interference Cancellation in FBMC/OQAM Systems  6
An Encoded Double Auxiliary Pilot Channel Estimation Method ...
收藏 引用
6th IEEE International Conference on Artificial Intelligence in engineering and Technology, IICAIET 2024
作者: Xing, Sixuan Xiang, Jianhong Wang, Ying Qi, Liangang Zhong, Yu College of Information and Communication Engineering Harbin Engineering University Harbin China Harbin Engineering University Key Laboratory of Advanced Ship Communication and Information Technology Harbin China Agile and Intelligent Computing Key Laboratory Chengdu China
Filter bank multicarrier technique (FBMC) is considered as a promising modulation technique suitable for future communications. However, the presence of intrinsic interference prevents the efficient implementation of ... 详细信息
来源: 评论
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed Signals on Coprime Array  5
Stepwise DOA Estimation for Coherent and Uncorrelated Mixed ...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Jiang, Heng Li, Lichun Zhang, Hailong Pan, Hongyi Li, Xue College of Information System Engineering Information Engineering University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
The coprime array constructs virtual array to obtain higher degrees of freedom (DOF), but the premise of doing so is that the signals are independent of each other. Once there are coherent signals, the signal model of... 详细信息
来源: 评论
A Modeling Method of Cyberspace Security Structure Based on Layer-Level Division  5
A Modeling Method of Cyberspace Security Structure Based on ...
收藏 引用
5th IEEE International Conference on Computer and Communication engineering Technology, CCET 2022
作者: Zhu, Yuwen Yu, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Security Institute of Information Engineering Beijing100000 China
As the cyberspace structure becomes more and more complex, the problems of dynamic network space topology, complex composition structure, large spanning space scale, and a high degree of self-organization are becoming... 详细信息
来源: 评论
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing  2
Zokfuzz: Detection of Web Vulnerabilities via Fuzzing
收藏 引用
2nd International Conference on Consumer Electronics and Computer engineering, ICCECE 2022
作者: Zhang, Hao Dong, Weiyu Jiang, Liehui School of Cyber Science and Engineering Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Fuzzing is one of the mainstream web application automated vulnerability detection methods. Because of its black box characteristics, it can be used to detect vulnerabilities without knowing the source code of the tar... 详细信息
来源: 评论
Programmable logic controller memory management vulnerability analysis  3
Programmable logic controller memory management vulnerabilit...
收藏 引用
2022 3rd International Conference on Signal Processing and Computer Science, SPCS 2022
作者: Geng, Yangyang Ma, Rongkuan Wei, Qiang Wang, Wenhai State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou310000 China
Programmable logic controller (PLC) is omnipresent in industrial control system (ICS), which plays an imperative part in critical infrastructures. However, once a PLC is compromised by an attacker, it will create dest... 详细信息
来源: 评论