咨询与建议

限定检索结果

文献类型

  • 2,050 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,208 篇 工学
    • 1,188 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 321 篇 信息与通信工程
    • 301 篇 电子科学与技术(可...
    • 300 篇 电气工程
    • 255 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 194 篇 材料科学与工程(可...
    • 165 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 76 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,742 篇 理学
    • 844 篇 物理学
    • 771 篇 数学
    • 243 篇 生物学
    • 237 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 385 篇 管理学
    • 238 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 67 篇 feature extracti...
  • 56 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 28 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 616 篇 state key labora...
  • 165 篇 school of comput...
  • 125 篇 key laboratory o...
  • 118 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 tianfu cosmic ra...
  • 99 篇 hebei normal uni...
  • 98 篇 state key labora...
  • 93 篇 yunnan observato...
  • 88 篇 school of physic...
  • 87 篇 department of ph...
  • 82 篇 key laboratory f...
  • 82 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 institute of fro...
  • 78 篇 school of physic...
  • 77 篇 school of physic...
  • 73 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 80 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 jiang k.
  • 74 篇 bastieri d.
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 guo y.q.
  • 66 篇 liu b.
  • 66 篇 danzengluobu
  • 65 篇 bao y.w.
  • 64 篇 li cheng
  • 64 篇 li xin
  • 64 篇 hu h.b.
  • 62 篇 liu h.d.

语言

  • 2,908 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3344 条 记 录,以下是381-390 订阅
排序:
A Multi-Variant Voting Algorithm Based on Dynamic Feedback  2
A Multi-Variant Voting Algorithm Based on Dynamic Feedback
收藏 引用
2nd International Conference on Computer Communication and Network Security, CCNS 2021
作者: Yuwen, Shao Zheng, Zhang Bingzheng, Li Xinsheng, Ji State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China National Digital Switching System Engineering Technological RD Center Zhengzhou China
Multi-variant execution framework can protect software security. For the problem of performance loss caused by too many voting times in the existing multi-variant execution framework, this paper proposes a multi-varia... 详细信息
来源: 评论
HRPDF: A Software-Based Heterogeneous Redundant Proactive Defense Framework for Programmable Logic Controller
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1307-1324页
作者: Ke Liu Jing-Yi Wang Qiang Wei Zhen-Yong Zhang Jun Sun Rong-Kuan Ma Rui-Long Deng State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou 450001China College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China College of Computer Science and Technology Guizhou UniversityGuiyang 550025China School of Information Systems Singapore Management UniversitySingapore 689867Singapore
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ... 详细信息
来源: 评论
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon via exploiting mitigations  23
KextFuzz: fuzzing macOS Kernel EXTensions on apple silicon v...
收藏 引用
Proceedings of the 32nd USENIX Conference on Security Symposium
作者: Tingting Yin Zicong Gao Zhenghang Xiao Zheyu Ma Min Zheng Chao Zhang Tsinghua University and Ant Group State Key Laboratory of Mathematical Engineering and Advanced Computing Hunan University Tsinghua University Ant Group Tsinghua University and Zhongguancun Laboratory
macOS drivers, i.e., Kernel EXTensions (kext), are attractive attack targets for adversaries. However, automatically discovering vulnerabilities in kexts is extremely challenging because kexts are mostly closed-source...
来源: 评论
94LVI Algorithms of OIpU(One-Iteration-per-Update) Type Handling Time-Dependent QP(Quadratic Programming) with Two Constraints  41
94LVI Algorithms of OIpU(One-Iteration-per-Update) Type Hand...
收藏 引用
第41届中国控制会议
作者: Yunong Zhang Zhiwen Yuan School of Computer Science and Engineering Sun Yat-sen University Guangdong Key Laboratory of Modern Control Technology Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Research Institute of Sun Yat-sen University
This paper presents three relatively effective numerical algorithms,i.e.,94 LVI algorithms of OIpU(one-iteration-perupdate) type,to handle time-dependent QP(quadratic programming) problems subject to two constraints r... 详细信息
来源: 评论
BA-Audit: Blockchain-Based Public Auditing for Aggregated Data Sharing in Edge-Assisted IoT  1
收藏 引用
4th EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2021
作者: Liu, Mingxi Lu, Ning Yin, Jingli Cheng, Qingfeng Shi, Wenbo School of Computer Science and Engineering Northeastern University Shenyang China School of Computer Science and Technology Xidian University Xi’an China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Strategic Support Force Information Engineering University Zhengzhou China
With the massive placement of sensors leading to a surge in IoT data, it is wise for system administrators to use data aggregation strategies to collect and share data in edge-assisted IoT scenarios because traditiona... 详细信息
来源: 评论
Modelization and analysis of dynamic heterogeneous redundant system
Modelization and analysis of dynamic heterogeneous redundant...
收藏 引用
作者: Wang, Wei Li, Guangsong Gai, Keke Tang, Yazhe Yang, Benchao Si, Xueming State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Xi'an Jiaotong University Xi'an China Shanghai Key Laboratory of Data Science Fudan University Shanghai China
With the development and popularization of Internet technology, network security has become the focus of attention. Vulnerabilities and back doors are regarded as two of the main reasons of network security problems. ... 详细信息
来源: 评论
Analysis of Factors Influencing Driver Lane-Changing Intentions Based on a Naturalistic Trajectory Data Set on Highways  24
Analysis of Factors Influencing Driver Lane-Changing Intenti...
收藏 引用
24th COTA International Conference of Transportation Professionals: Resilient, Intelligent, Connected, and Lowcarbon Multimodal Transportation, CICTP 2024
作者: Wang, Guangchen Lu, Guangquan Wang, Jinghua Liu, Miaomiao School of Transportation Science and Engineering Beihang Univ. Beijing China Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control National Engineering Laboratory for Comprehensive Transportation Big Data Application Technology Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang Univ. Beijing China
Accurately analyzing and predicting driver lane-changing intentions is of paramount importance, as it significantly enhances the safety of self-driving vehicles in their decision-making processes, holding great promis... 详细信息
来源: 评论
Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center
收藏 引用
Journal of Computer Science & Technology 2023年 第4期38卷 773-792页
作者: 田文洪 徐敏贤 周光耀 吴逵 须成忠 Rajkumar Buyya School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054China Yangtze Delta Region Institute(Huzhou) University of Electronic Science and Technology of ChinaHuzhou 313001China Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Department of Computer Science University of VictoriaVictoriaBCV8W 3P6Canada State Key Laboratory of Internet of Things for Smart City University of MacaoMacao 999078China School of Computing and Information Systems University of MelbourneMelbourne 3010Australia
Load balancing is vital for the efficient and long-term operation of cloud data *** virtualization,post(reactive)migration of virtual machines(VMs)after allocation is the traditional way for load balancing and consoli... 详细信息
来源: 评论
A Deep Learning Capacity Estimation Method Based on Incremental Capacity Analysis and Differential Thermal Voltammetry  5
A Deep Learning Capacity Estimation Method Based on Incremen...
收藏 引用
5th International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2023
作者: Zeng, Sibo Chen, Sheng Yu, Yang Hubei Key Laboratory of Advanced Technology for Automotive Components School of Automotive Engineering Wuhan University of Technology Wuhan China Hubei Collaborative Innovation Center for Automotive Components Technology Wuhan China School of Computing Engineering and Built Environment Glasgow Caledonian University Glasgow United Kingdom
Precise estimation of Lithium-ion battery capacity is critical for the battery management system (BMS). This paper proposed an innovative method that combinates convolutional neural network and feature curves which ar... 详细信息
来源: 评论
Adaptive energy-preserving algorithms for guiding center system
收藏 引用
Plasma Science and Technology 2023年 第4期25卷 11-22页
作者: 朱贝贝 刘健 张嘉炜 祝爱卿 唐贻发 Department of Applied Mathematics School of Mathematics and PhysicsUniversity of Science and Technology BeijingBeijing 100083Peopleʼs Republic of China School of Nuclear Science and Technology University of Science and Technology of ChinaHefei 230026Peopleʼs Republic of China Advanced algorithm Joint Lab Shandong Computer Science CenterQilu University of TechnologyJinan 250014Peopleʼs Republic of China The State Key Laboratory of Scientific and Engineering Computing The Institute of Computational Mathematics and Scientific/Engineering ComputingAcademy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190Peopleʼs Republic of China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049Peopleʼs Republic of China
We develop two types of adaptive energy preserving algorithms based on the averaged vector field for the guiding center dynamics,which plays a key role in magnetized *** adaptive scheme is applied to the Gauss Legendr... 详细信息
来源: 评论