咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是251-260 订阅
排序:
A Riemannian Exponential Augmented Lagrangian Method for computing the Projection Robust Wasserstein Distance  37
A Riemannian Exponential Augmented Lagrangian Method for Com...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Jiang, Bo Liu, Ya-Feng Ministry of Education Key Laboratory of NSLSCS School of Mathematical Sciences Nanjing Normal University Nanjing210023 China State Key Laboratory of Scientific and Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China
Projection robust Wasserstein (PRW) distance is recently proposed to efficiently mitigate the curse of dimensionality in the classical Wasserstein distance. In this paper, by equivalently reformulating the computation... 详细信息
来源: 评论
Adversarial Example Soups: Improving Transferability and Stealthiness for Free
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Bo Zhang, Hengwei Wang, Jindong Yang, Yulong Lin, Chenhao Shen, Chao Zhao, Zhengyu State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China
Transferable adversarial examples cause practical security risks since they can mislead a target model without knowing its internal knowledge. A conventional recipe for maximizing transferability is to keep only the o...
来源: 评论
The Causal Reasoning Ability of Open Large Language Model: A Comprehensive and Exemplary Functional Testing
The Causal Reasoning Ability of Open Large Language Model: A...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Shun-Hang Li Gang Zhou Zhi-Bo Li Ji-Cang Lu Ning-Bo Huang State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod...
来源: 评论
ERROR ANALYSIS OF FRACTIONAL COLLOCATION METHODS FOR VOLTERRA INTEGRO-DIFFERENTIAL EQUATIONS WITH NONCOMPACT OPERATORS
收藏 引用
Journal of Computational Mathematics 2025年 第3期43卷 690-707页
作者: Zheng Ma Chengming Huang Anatoly A.Alikhanov School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China North-Caucasus Center for Mathematical Research North-Caucasus Federal UniversityStavropol 355017Russia North-Eastern Federal University Yakutsk 677000Russia
This paper is concerned with the numerical solution of Volterra integro-differential equations with noncompact *** focus is on the problems with weakly singular *** handle the initial weak singularity of the solution,... 详细信息
来源: 评论
On the Cycle Structure of Some Nonlinear Feedback Shift Registers
收藏 引用
Chinese Journal of Electronics 2025年 第4期23卷 801-804页
作者: Zhongxiao Wang Hong Xu Wenfeng Qi State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou Information Science and Technology Institute Zhengzhou China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers (NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can ... 详细信息
来源: 评论
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning  16th
Polytopic Attack on Round-Reduced Simon32/64 Using Deep Lear...
收藏 引用
16th International Conference on Information Security and Cryptology, Inscrypt 2020
作者: Su, Heng-Chuan Zhu, Xuan-Yong Ming, Duan State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou450001 China
In CRYPTO 2019, Gohr uses the residual network technology of artificial intelligence to build a differential distinguisher, and attacks the reduced-round Speck32/64. We tried this method to recover the keys for ten-ro... 详细信息
来源: 评论
A Selection Strategy for Network Security Defense Based on a Time Game Model
A Selection Strategy for Network Security Defense Based on a...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Sun, Pengyu Zhang, Hengwei Ma, Junqiang Li, Chenwei Mi, Yan Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net... 详细信息
来源: 评论
Timing Strategy for Active Detection of APT Attack Based on FlipIt Model and Q-learning Method
Timing Strategy for Active Detection of APT Attack Based on ...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Liu, Zhilin Zhang, Hengwei Sun, Pengyu Mi, Yan Zhang, Xiaoning Wang, Jindong Key Laboratory of Information Security of Henan Provincial State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr... 详细信息
来源: 评论
Network Attack Intention Recognition Based on Signaling Game Model and Netlogo Simulation
Network Attack Intention Recognition Based on Signaling Game...
收藏 引用
2021 International Conference on Digital Society and Intelligent Systems, DSInS 2021
作者: Zhang, Xiaoning Zhang, Hengwei Li, Chenwei Sun, Pengyu Liu, Zhilin Wang, Jindong State Key Laboratory of Mathematical Engineering and Advanced Computing Key Laboratory of Information Security of Henan Provincial Zhengzhou China
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes... 详细信息
来源: 评论
Imputing DNA Methylation by Transferred Learning Based Neural Network
收藏 引用
Journal of Computer Science & Technology 2022年 第2期37卷 320-329页
作者: Xin-Feng Wang Xiang Zhou Jia-Hua Rao Zhu-Jin Zhang Yue-Dong Yang School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 510000China Key Laboratory of Machine Intelligence and Advanced Computing of Ministry of Education(Sun Yat-sen University)Guangzhou 510000 China
DNA methylation is one important epigenetic type to play a vital role in many diseases including *** the development of the high-throughput sequencing technology,there is much progress to disclose the relations of DNA... 详细信息
来源: 评论