咨询与建议

限定检索结果

文献类型

  • 2,050 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,208 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 321 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 300 篇 电气工程
    • 255 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 194 篇 材料科学与工程(可...
    • 165 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 76 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,742 篇 理学
    • 844 篇 物理学
    • 771 篇 数学
    • 243 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 67 篇 feature extracti...
  • 56 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 28 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 616 篇 state key labora...
  • 165 篇 school of comput...
  • 125 篇 key laboratory o...
  • 118 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 98 篇 state key labora...
  • 93 篇 yunnan observato...
  • 88 篇 school of physic...
  • 87 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 institute of fro...
  • 78 篇 school of physic...
  • 77 篇 school of physic...
  • 73 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 80 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 66 篇 danzengluobu
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.

语言

  • 2,908 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3344 条 记 录,以下是311-320 订阅
排序:
Pruned-F1DCN: A lightweight network model for traffic classification  22
Pruned-F1DCN: A lightweight network model for traffic classi...
收藏 引用
Proceedings of the 2022 International Conference on Cyber Security
作者: Ruo nan Wang Jin long Fei Rong kai Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou China China
With the continuous development of deep learning, deep neural networks are gradually applied to traffic classification problems. However, the large network structure and parameter number of deep neural networks hinder... 详细信息
来源: 评论
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection
arXiv
收藏 引用
arXiv 2024年
作者: Song, Chengyu Ma, Linru Zheng, Jianming Liao, Jinzhi Kuang, Hongyu Yang, Lin Systems Engineering Institute Academy of Military Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China National University of Defense Technology National Key Laboratory of Information Systems Engineering Changsha China
Log-based insider threat detection (ITD) detects malicious user activities by auditing log entries. Recently, Large Language Models (LLMs) with strong common sense knowledge are emerging in the domain of ITD. Neverthe... 详细信息
来源: 评论
Disentangling Ensemble Models on Adversarial Generalization in Image Classification
Disentangling Ensemble Models on Adversarial Generalization ...
收藏 引用
International Conference on Electronic engineering and Informatics (EEI)
作者: Chenwei Li Mengyuan Pan Bo Yang Hengwei Zhang State Key Laboratory of Mathematical Engineering and Advanced Computing Henan Key Laboratory of Information Security Zhengzhou China Guizhou University School of Chemistry and Chemical Engineering Guiyang China
Convolutional neural networks are widely used in computer vision and image processing. However, when the original input is added with manually imperceptible perturbations, these deep network models mostly tend to outp...
来源: 评论
A Binary Function Name Prediction Method Based on Variable Alignment and Translation Model  23
A Binary Function Name Prediction Method Based on Variable A...
收藏 引用
Proceedings of the 2023 4th International Conference on Machine Learning and Computer Application
作者: Bing Xia Jiabin Yin Yunxiang Ge Ruinan Yang Key Laboratory of Mathematical Engineering and Advanced Computing ZhongYuan University of Technology China Henan Key Laboratory on Public Opinion Intelligent Analysis ZhongYuan University of Technology China ZhongYuan University of Technology China
Binary function naming is a code analysis task that generates functional descriptions of functions, and its results can be applied in the fields of malicious code analysis, vulnerability causation analysis, and algori...
来源: 评论
Boosting Performance and QoS for Concurrent GPU B+trees by Combining-Based Synchronization  23
Boosting Performance and QoS for Concurrent GPU B+trees by C...
收藏 引用
28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, PPoPP 2023
作者: Zhang, Weihua Zhao, Chuanlei Peng, Lu Lin, Yuzhe Zhang, Fengzhe Lu, Yunping School of Computer Science Fudan University China Institute of Big Data Fudan University China State Key Laboratory of Mathematical Engineering and Advanced Computing China Parallel Processing Institute Fudan University China Department of Computer Science Tulane University United States
Concurrent B+trees have been widely used in many systems. With the scale of data requests increasing exponentially, the systems are facing tremendous performance pressure. GPU has shown its potential to accelerate con... 详细信息
来源: 评论
Exploiting Multiple Features for Hash Codes Learning with Semantic-Alignment-Promoting Variational Auto-encoder  12th
Exploiting Multiple Features for Hash Codes Learning with Se...
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese computing, NLPCC 2023
作者: Chen, Jiayang Su, Qinliang School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Beijing China
Semantic hashing is an effective technique to empower information retrieval. Currently, considerable efforts have been dedicated to generating high-quality hash codes by modeling document features using generative mod... 详细信息
来源: 评论
A Neighbor Immunization Strategy to Block Virus Spreading on Networks  2
A Neighbor Immunization Strategy to Block Virus Spreading on...
收藏 引用
2nd Information Communication Technologies Conference, ICTC 2021
作者: Yaohui, Hao Yingze, Liu Baole, Zhao Qingxian, Wang Information Engineering University State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Information Engineering University Zhengzhou China
In order to achieve better effect on blocking virus propagation, a neighbor immunization strategy was proposed and verified in this paper. On email-EU real networks and on scale-free model network, the efficiencies of... 详细信息
来源: 评论
Mitigating Barren Plateaus of Variational Quantum Eigensolvers
IEEE Transactions on Quantum Engineering
收藏 引用
IEEE Transactions on Quantum engineering 2024年 第1期5卷 1-19页
作者: Liu, Xia Liu, Geng Zhang, Hao-Kai Huang, Jiaxin Wang, Xin Thrust of Artificial Intelligence Information Hub Guangzhou510530 China Institute of Information Engineering Chinese Academy of Sciences Key Laboratory of Cyberspace Security Defense Beijing100085 China Baidu Research Institute for Quantum Computing Beijing100193 China Tsinghua University Institute for Advanced Study Beijing100084 China
Variational quantum algorithms (VQAs) are expected to establish valuable applications on near-term quantum computers. However, recent works have pointed out that the performance of VQAs greatly relies on the expressib... 详细信息
来源: 评论
Can We Half the Work with Double Results: Rethinking Machine Learning Algorithms for Network Intrusion Detection System  9
Can We Half the Work with Double Results: Rethinking Machine...
收藏 引用
9th International Conference on advanced Cloud and Big Data, CBD 2021
作者: Li, Shuren Lu, Yifei Li, Jingqi Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Machine Learning algorithms have been wildly applied in the intrusion detection system(IDS). However, in the IoT environment where the resources are limited and the flow data is of huge amount, we need more efficient ... 详细信息
来源: 评论
Extraction of Secret Message Based on Uniformly Most Powerful Test
SSRN
收藏 引用
SSRN 2022年
作者: Du, Hansong Liu, Jiufen Luo, Xiangyang Zhang, Yi The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
As the ultimate goal of steganalysis, secret message extraction is a bottleneck and difficulty that has long plagued the development of steganalysis technology. Existing pioneering work on secret message extraction fo... 详细信息
来源: 评论