咨询与建议

限定检索结果

文献类型

  • 2,047 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,174 篇 工学
    • 1,190 篇 计算机科学与技术...
    • 982 篇 软件工程
    • 323 篇 信息与通信工程
    • 293 篇 电气工程
    • 289 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 214 篇 生物工程
    • 213 篇 化学工程与技术
    • 173 篇 光学工程
    • 173 篇 材料科学与工程(可...
    • 141 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 108 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 60 篇 交通运输工程
    • 52 篇 安全科学与工程
  • 1,735 篇 理学
    • 842 篇 物理学
    • 763 篇 数学
    • 239 篇 生物学
    • 230 篇 统计学(可授理学、...
    • 223 篇 化学
    • 141 篇 系统科学
    • 92 篇 地球物理学
  • 386 篇 管理学
    • 241 篇 管理科学与工程(可...
    • 153 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 92 篇 医学
    • 75 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 56 篇 deep learning
  • 55 篇 semantics
  • 51 篇 training
  • 47 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 27 篇 computational mo...
  • 27 篇 security
  • 27 篇 cryptography
  • 25 篇 neural networks
  • 23 篇 software
  • 22 篇 data models
  • 21 篇 conferences
  • 21 篇 optimization
  • 20 篇 deep neural netw...
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware

机构

  • 617 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 113 篇 university of ch...
  • 106 篇 university of sc...
  • 95 篇 hebei normal uni...
  • 94 篇 tianfu cosmic ra...
  • 94 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 85 篇 school of physic...
  • 79 篇 center for astro...
  • 78 篇 key laboratory f...
  • 76 篇 college of physi...
  • 74 篇 institute of fro...
  • 74 篇 school of physic...
  • 73 篇 school of physic...
  • 67 篇 national astrono...
  • 67 篇 national space s...
  • 65 篇 moscow institute...

作者

  • 81 篇 zheng wei-shi
  • 80 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 3,079 篇 英文
  • 201 篇 其他
  • 67 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3341 条 记 录,以下是271-280 订阅
排序:
DSSA: Dual-Side Sparse Systolic Array Architecture for Accelerating Convolutional Neural Network Training  22
DSSA: Dual-Side Sparse Systolic Array Architecture for Accel...
收藏 引用
Proceedings of the 51st International Conference on Parallel Processing
作者: Zhengbo Chen Qi Yu Fang Zheng Feng Guo Zuoning Chen Information Engineering University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Chinese Academy of Engineering China
Ever-growing CNN size incurs a significant amount of redundancy in model parameters, which in turn, puts considerable burden on hardware. Unstructured pruning is widely used to reduce model sparsity. While, the irregu... 详细信息
来源: 评论
Utilization-Aware Data Variable Allocation on NVM- Based SPM in Real-Time Embedded Systems
收藏 引用
Journal of Electronic Science and Technology 2021年 第2期19卷 163-172页
作者: Jin-Yu Zhan Yi-Xin Li Wei Jiang Jun-Huan Yang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610054 State Key Lab of Mathematical Engineering and Advanced Computing Wuxi 214000
With the development of the nonvolatile memory(NVM),using NVM in the design of the cache and scratchpad memory(SPM)has been *** paper presents a data variable allocation(DVA)algorithm based on the genetic algorithm fo... 详细信息
来源: 评论
Software Vulnerability Mining Techniques Based on Data Fusion and Reverse engineering
收藏 引用
Wireless Communications and Mobile computing 2022年 第0期2022卷
作者: Liu, Tieming State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Zhengzhou450001 China
Software vulnerability mining is an important component of network attack and defense technology. To address the problems of high leakage rate and false positive rate of existing static analysis methods, this paper pr... 详细信息
来源: 评论
Gravitational wave search by time-scale-recursive denoising and matched filtering
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2024年 第12期67卷 166-182页
作者: Cunliang Ma Chenyang Ma Zhoujian Cao Mingzhen Jia School of Information Engineering Jiangxi University of Science and TechnologyGanzhou341000China Institute for Frontiers in Astronomy and Astrophysics Beijing Normal UniversityBeijing102206China School of Fundamental Physics and Mathematical Sciences Hangzhou Institute for Advanced StudyUCASHangzhou310024China Jiangxi Provincial Key Laboratory of Multidimensional Intelligent Perception and Control Ganzhou341000China
In our previous work [Physical Review D,2024,109(4):043009],we introduced MSNRnet,a framework integrating deep learning and matched filtering methods for gravitational wave(GW) *** with end-to-end classification metho... 详细信息
来源: 评论
Cube Attacks Against Trivium, Kreyvium and ACORN with Practical Complexity  20th
Cube Attacks Against Trivium, Kreyvium and ACORN with Prac...
收藏 引用
20th International Conference on Information Security and Cryptology, Inscrypt 2024
作者: Chen, Yanqi Li, Ting Sun, Yao Key Laboratory of Cyberspace Security Defense Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
The cube attack is a powerful cryptanalysis technique used against stream ciphers. It enables the retrieval of secret key information by computing the values of superpolys, with unknown secret key bits as variables. A... 详细信息
来源: 评论
Vulnerability Sample Analysis Based on Dynamic Binary Platform
Vulnerability Sample Analysis Based on Dynamic Binary Platfo...
收藏 引用
2021 International Conference on Aviation Safety and Information Technology, ICASIT 2021
作者: Bu, Wenjuan Kang, Fei Zhao, Yuntian Xu, Jianbo State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Henan Zhengzhou450000 China
Based on the existing vulnerability exploitation detection technology, this paper analyzes the buffer overflow vulnerability exploitation process, and detects vulnerability triggering, protection mechanism bypassing a... 详细信息
来源: 评论
Open Set Recognition for Encrypted Traffic using Intra-class Partition and Boundary Sample Generation  5
Open Set Recognition for Encrypted Traffic using Intra-class...
收藏 引用
5th IEEE advanced Information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Li, Xue Fei, Jinlong Qi, Zan Lv, Zhuo Jiang, Heng PLA Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China PLA Information Engineering University National Digital Switching System Engineering Technological Research Center Zhengzhou China
Existing deep learning-based encrypted traffic recognition methods can achieve high precision identification performance while protecting user privacy, but almost all of them focus on closed sets, in which training da... 详细信息
来源: 评论
Blockchain Privacy Protection Based on Post Quantum Threshold Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 957-973页
作者: Faguo Wu Bo Zhou Jie Jiang Tianyu Lei Jiale Song Institute of Artificial Intelligence Beihang UniversityBeijing100191China Zhongguancun Laboratory Beijing100094China Key Laboratory of Mathematics Informatics and Behavioral Semantics(LMIB)Beihang UniversityBeijing100191China Bejing Advanced Innovation Center for Future Blockchain and Privacy Computing Beihang UniversityBeijing100191China LMIB and School of Mathematical Sciences Beihang UniversityBeijing100191China
With the rapid increase in demand for data trustworthiness and data security,distributed data storage technology represented by blockchain has received unprecedented *** technologies have been suggested for various us... 详细信息
来源: 评论
MFN: Explainable DNA triple helixes Stabilized Design based on mCGR and flow network
MFN: Explainable DNA triple helixes Stabilized Design based ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wen, Xiaoru Sun, Lijun Xie, Lei Zheng, Yanfen Cao, Ben Wang, Bin Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian China Dalian University of Technology School of Computer Science and Technology Dalian China
DNA triple helix structure, as a highly specific gene targeting tool, enable gene regulation by precisely identifying and binding to target DNA sequences. However, the limits of design quality and efficiency affect th... 详细信息
来源: 评论
Convergence of Physics-Informed Neural Networks Applied to Linear Second-Order Elliptic Interface Problems
收藏 引用
Communications in Computational Physics 2023年 第2期33卷 596-627页
作者: Sidi Wu Aiqing Zhu Yifa Tang Benzhuo Lu State Key Laboratory of Scientific and Engineering Computing National Center for Mathematics and Interdisciplinary SciencesAcademy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China.
With the remarkable empirical success of neural networks across diverse scientific disciplines,rigorous error and convergence analysis are also being developed and ***,there has been little theoretical work focusing o... 详细信息
来源: 评论