咨询与建议

限定检索结果

文献类型

  • 2,058 篇 期刊文献
  • 1,291 篇 会议
  • 3 册 图书

馆藏范围

  • 3,352 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,203 篇 工学
    • 1,189 篇 计算机科学与技术...
    • 980 篇 软件工程
    • 321 篇 信息与通信工程
    • 297 篇 电子科学与技术(可...
    • 296 篇 电气工程
    • 257 篇 控制科学与工程
    • 215 篇 生物工程
    • 213 篇 化学工程与技术
    • 187 篇 材料科学与工程(可...
    • 166 篇 光学工程
    • 140 篇 机械工程
    • 135 篇 生物医学工程(可授...
    • 107 篇 力学(可授工学、理...
    • 98 篇 网络空间安全
    • 94 篇 仪器科学与技术
    • 93 篇 动力工程及工程热...
    • 74 篇 核科学与技术
    • 60 篇 交通运输工程
  • 1,741 篇 理学
    • 843 篇 物理学
    • 769 篇 数学
    • 243 篇 生物学
    • 235 篇 统计学(可授理学、...
    • 222 篇 化学
    • 142 篇 系统科学
    • 92 篇 地球物理学
  • 387 篇 管理学
    • 240 篇 管理科学与工程(可...
    • 155 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 93 篇 医学
    • 75 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 50 篇 training
  • 48 篇 machine learning
  • 29 篇 cosmic rays
  • 29 篇 network security
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 25 篇 computational mo...
  • 23 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting
  • 20 篇 gamma rays

机构

  • 619 篇 state key labora...
  • 174 篇 school of comput...
  • 128 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 77 篇 school of physic...
  • 74 篇 national space s...
  • 70 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 66 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,916 篇 英文
  • 374 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3352 条 记 录,以下是501-510 订阅
排序:
A software upgrade security analysis method on network traffic classification using deep learning
A software upgrade security analysis method on network traff...
收藏 引用
2020 International Conference on Urban engineering and Management Science, ICUEMS 2020
作者: Zhang, Bing State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450000 China
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current... 详细信息
来源: 评论
Brain MR Images Super-Resolution with the Consistent Features  2022
Brain MR Images Super-Resolution with the Consistent Feature...
收藏 引用
14th International Conference on Machine Learning and computing, ICMLC 2022
作者: You, Senrong Shen, Yanyan Wu, Guocheng Wang, Shuqiang Center for Biomedical Information Technology Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Center for Internet of Things Computing Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China Data Recovery Key Laboratory of Sichuan Province College of Mathematics and Information Science Neijiang Normal University China
Magnetic resonance imaging plays an important role in auxiliary diagnosis and brain exploration. However, limited by hardware, scanning time and cost, it's challenging to acquire high-resolution (HR) magnetic reso... 详细信息
来源: 评论
Distributed Deep Learning System for Efficient Face Recognition in Surveillance System  21
Distributed Deep Learning System for Efficient Face Recognit...
收藏 引用
Proceedings of the 3rd International Conference on advanced Information Science and System
作者: Jinjin Liu Zhifeng Chen Xiaonan Li Tongxin Wei School of Computer Science Zhongyuan University of Technology China and State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Mathematical Engineering and Advanced Computing China School of Computer Science Zhongyuan University of Technology China School of Cyberspace Security Zhengzhou University China
In view of the bandwidth consumption caused by data stream transmission in video analysis system and the demand for accurate online real-time analysis of massive data, this paper proposes a deep learning model framewo... 详细信息
来源: 评论
The Executors Scheduling Algorithm for the Web Server Based on the Attack Surface
The Executors Scheduling Algorithm for the Web Server Based ...
收藏 引用
2020 IEEE International Conference on Advances in Electrical engineering and Computer Applications, AEECA 2020
作者: Nie, Guanglai Zhang, Zheng Zhao, Yufeng Meac State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith... 详细信息
来源: 评论
Hot Spot Locating and Optimization of Calculation Errors in Arithmetic Expressions  7
Hot Spot Locating and Optimization of Calculation Errors in ...
收藏 引用
7th International Symposium on Advances in Electrical, Electronics, and Computer engineering
作者: Jinchen, Xu Yuanyuan, Xia Jiangwei, Hao Hao, Cao State Key Laboratory of Mathematical Engineering and Advanced Computing No. 62 Science Avenue High-Tech Zone Henan Zhengzhou450001 China National Key Laboratory of Science and Technology on Integrated Information Systems Technology Institute of Software Chinese Academy of Sciences No. 4 Zhongguancun South Fourth Street Haidian District Beijing10190 China
Error analysis is an important support for improving the precision of floating-point calculations. However, the floating-point error distribution does not have dominant characteristics, making it difficult to optimize... 详细信息
来源: 评论
Cluster-Based Routing Algorithm for WSN Based on Subtractive Clustering  16
Cluster-Based Routing Algorithm for WSN Based on Subtractive...
收藏 引用
16th IEEE International Wireless Communications and Mobile computing Conference, IWCMC 2020
作者: Chen, Ling Liu, Wenwen Gong, Daofu Chen, Yan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China
The Cluster-based Routing Algorithm for Wireless Sensor Network based on Subtractive Clustering (SCC algorithm) generates nodes of cluster head in dense area of the node by relying on subtractive clustering. The appli... 详细信息
来源: 评论
Noise Detection and Removal for Underground Communication Systems Based on L2 N onnal Inner Product
Noise Detection and Removal for Underground Communication Sy...
收藏 引用
IEEE International Conference on Artificial Intelligence in engineering and Technology (IICAIET)
作者: Bangwei Yu Yong Wang Liangang Qi Yang Liu College of Information and Communication Engineering Harbin Engineering University Harbin China Key Laboratory of Advanced Ship Communication and Information Technology Harbin Engineering University Harbin China Sichuan Key Laboratory of Agile Intelligent Computing Chengdu China
In underground communication systems, continuous mud pulse signals are susceptible to pump noise during transmission, resulting in a high bit error rate(BER). In this paper, a Normal Inner Product Orthogonal Matching ... 详细信息
来源: 评论
An evaluation algorithm of the importance of network node based on community influence  1
收藏 引用
5th International Conference on Data Mining and Big Data, DMBD 2020
作者: He, Gongzhen Luo, Junyong Yin, Meijuan State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Identifying nodes in social networks that have great influence on information dissemination is of great significance for monitoring and guiding information dissemination. There are few methods to study the influence o... 详细信息
来源: 评论
Network representation learning based extended matrix factorization for recommendation  6th
Network representation learning based extended matrix factor...
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Xu, Jinmao Gong, Daofu Liu, Fenlin Tan, Lei State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
The growing heterogeneous data in the Internet effectively improves the performance of recommender systems (RS). The main problem faced by the traditional matrix factorization (MF) is how to fuse more heterogeneous in... 详细信息
来源: 评论
Research on the Protection Mechanism of Cisco IOS Exploit  4
Research on the Protection Mechanism of Cisco IOS Exploit
收藏 引用
4th International Conference on Data Mining, Communications and Information Technology, DMCIT 2020
作者: Wang, Jinzhu Cai, Ruijie Liu, Shengli State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001 China
Cisco IOS is an operating system that runs on Cisco routing and switching equipment. Its security is important to the entire network. Since vulnerability attacks have become one of the main sources of threat to Cisco ... 详细信息
来源: 评论